Hiding Data Using Efficient Combination of RSA Cryptography, and Compression Steganography Techniques

被引:51
作者
Wahab, Osama Fouad Abdel [1 ,2 ]
Khalaf, Ashraf A. M. [1 ]
Hussein, Aziza I. [3 ]
Hamed, Hesham F. A. [1 ,4 ]
机构
[1] Minia Univ, Fac Engn, El Minia 61111, Egypt
[2] Menou Univ, Fac Elect Engn, Menoufia 32952, Egypt
[3] Effat Univ, Dept Elect & Comp Engn, Jeddah 8482, Saudi Arabia
[4] Egyptian Russian Univ, Dept Telecommun Engn, Badr 11829, Egypt
关键词
Image coding; Media; Cryptography; Encryption; Huffman coding; Discrete wavelet transforms; Public key; data compression; DWT; LSB; MSE; PSNR; SSIM; RSA; steganography; IMAGE COMPRESSION; ENCRYPTION; SCHEME;
D O I
10.1109/ACCESS.2021.3060317
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data compression is an important part of information security because compressed data is more secure and easy to handle. Effective data compression technology creates efficient, secure, and easy-to-connect data. There are two types of compression algorithm techniques, lossy and lossless. These technologies can be used in any data format such as text, audio, video, or image file. The main objective of this study was to reduce the physical space on the various storage media and reduce the time of sending data over the Internet with a complete guarantee of encrypting this data and hiding it from intruders. Two techniques are implemented, with data loss (Lossy) and without data loss (Lossless). In the proposed paper a hybrid data compression algorithm increases the input data to be encrypted by RSA (Rivest-Shamir-Adleman) cryptography method to enhance the security level and it can be used in executing lossy and lossless compacting Steganography methods. This technique can be used to decrease the amount of every transmitted data aiding fast transmission while using slow internet or take a small space on different storage media. The plain text is compressed by the Huffman coding algorithm, and also the cover image is compressed by Discrete wavelet transform DWT based that compacts the cover image through lossy compression in order to reduce the cover image's dimensions. The least significant bit LSB will then be used to implant the encrypted data in the compacted cover image. We evaluated that system on criteria such as percentage Savings percentage, Compression Time, Compression Ratio, Bits per pixel, Mean Squared Error, Peak Signal to Noise Ratio, Structural Similarity Index, and Compression Speed. This system shows a high-level performance and system methodology compared to other systems that use the same methodology.
引用
收藏
页码:31805 / 31815
页数:11
相关论文
共 37 条
[1]  
Abdelwahab O. F., 2019, J. Telecommun. Comput. Electron. Control, V17, P1168, DOI [10.12928/telkomnika.v17i3.12230, DOI 10.12928/TELKOMNIKA.V17I3.12230]
[2]  
Adhanadi F., 2020, TELKOMNIKA, V18, P1095
[3]   RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust [J].
Anada, Hiroaki ;
Yasuda, Takanori ;
Kawamoto, Junpei ;
Weng, Jian ;
Sakurai, Kouichi .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 :10-19
[4]   An improved DWT-SVD domain watermarking for medical information security [J].
Anand, Ashima ;
Singh, Amit Kumar .
COMPUTER COMMUNICATIONS, 2020, 152 :72-80
[5]  
[Anonymous], 2019, Hybrid and advanced compression techniques for medical images, DOI DOI 10.1007/978-3-030-12575-2_1
[6]  
[Anonymous], 2014, INT J COMPUTER APPL
[7]   Lossy Hyperspectral Image Compression on a Reconfigurable and Fault-Tolerant FPGA-Based Adaptive Computing Platform [J].
Barrios, Yubal ;
Rodriguez, Alfonso ;
Sanchez, Antonio ;
Perez, Arturo ;
Lopez, Sebastian ;
Otero, Andres ;
de la Torre, Eduardo ;
Sarmiento, Roberto .
ELECTRONICS, 2020, 9 (10) :1-23
[8]   An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding [J].
Chai, Xiuli ;
Wu, Haiyang ;
Gan, Zhihua ;
Zhang, Yushu ;
Chen, Yiran ;
Nixon, Kent W. .
OPTICS AND LASERS IN ENGINEERING, 2020, 124
[9]   A new lossy compression algorithm for wireless sensor networks using Bayesian predictive coding [J].
Chen, Chen ;
Zhang, Limao ;
Tiong, Robert Lee Kong .
WIRELESS NETWORKS, 2020, 26 (08) :5981-5995
[10]  
Dehshiri M, 2021, J OPT SOC AM A, V38, P1, DOI 10.1364/JOSAA.401280