Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel

被引:3
|
作者
Naser, Mohammed Abdullah [1 ]
Al-alak, Saif M. Kh. [1 ]
Hussein, Ahmed Mohammed [1 ]
Jawad, Majid Jabbar [1 ]
机构
[1] Univ Babylon, Dept Comp Sci, Coll Sci Women, Babylon, Iraq
关键词
Information Security; Least Significant Bit (LSB); Randomness Public Network Channel; RC4; Video Steganography;
D O I
10.21123/bsj.2022.6142
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
引用
收藏
页码:1362 / 1368
页数:7
相关论文
共 7 条
  • [1] Secure Data Transfer in IoT environment: adopting both Cryptography and Steganography techniques
    Das, Ria
    Das, Indrajit
    2016 SECOND IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN), 2016, : 296 - 301
  • [2] Robust and Secure Image Steganography Based on Elliptic Curve Cryptography
    Ahmed, Diaa E. M.
    Khalifa, Othman O.
    2014 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE), 2014, : 288 - 291
  • [3] Huffman coding-based data reduction and quadristego logic for secure image steganography
    Ramadhan, Irsyad Fikriansyah
    de la Croix, Ntivuguruzwa Jean
    Ahmad, Tohari
    Uzamurengera, Andre
    ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2025, 65
  • [4] Color Image Steganography Based on Two-Channel Preprocessing and U-Net Network
    Liu, Lianshan
    Huang, Yu
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT VIII, ICIC 2024, 2024, 14869 : 56 - 68
  • [5] Secure compartmented data access over an untrusted network using a COTS-based architecture
    Clark, PC
    Meissner, MC
    Vance, KO
    16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 217 - 223
  • [6] Anonymization of Network Traces Data through Condensation-based Differential Privacy
    Aleroud A.
    Yang F.
    Pallaprolu S.C.
    Chen Z.
    Karabatis G.
    Digital Threats: Research and Practice, 2021, 2 (04):
  • [7] Assessing the Impact of Batch-Based Data Aggregation Techniques for Feature Engineering on Machine Learning-Based Network IDSs
    Magan-Carrion, Roberto
    Urda, Daniel
    Diaz-Cano, Ignacio
    Dorronsoro, Bernabe
    14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS AND 12TH INTERNATIONAL CONFERENCE ON EUROPEAN TRANSNATIONAL EDUCATIONAL (CISIS 2021 AND ICEUTE 2021), 2022, 1400 : 116 - 125