Combining RSA and audio steganography on personal computers for enhancing security

被引:29
作者
Al-Juaid, Nouf [1 ]
Gutub, Adnan [2 ]
机构
[1] Taif Univ, Comp Sci Dept, At Taif, Saudi Arabia
[2] Umm Al Qura Univ, Comp Engn Dept, Mecca, Saudi Arabia
来源
SN APPLIED SCIENCES | 2019年 / 1卷 / 08期
关键词
Audio steganography; Hiding text on PC; RSA cryptography; Security for personal computer;
D O I
10.1007/s42452-019-0875-8
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
This paper proposed an enhanced system for securing sensitive text data on personal computer benefitting from the combination of both techniques: cryptography and steganography. The system security is generated by involving RSA cryptography followed by audio-based steganography as two sequential layers to ensure the best possible security gaining the advantages from both. The study modeled the system and implemented it to be tested to explore the relation between security, capacity, and data dependency. The experimentations covered securing data within 15 differently sized audios showing interesting results. The results gave enhancement in capacity versus security trade-off, allowing the user and application to be the decision maker in the choice. The work showed the possibility of accepting security of 1-LSB, 2-LSB, and 3-LSB methods and their reasonable effect on the cover. The study also shows that using 3-LSB is giving acceptable security benefitting extra capacity more than 1-LSB and 2-LSB found in the literature.
引用
收藏
页数:11
相关论文
共 19 条
[1]  
Abikoye O. C., 2012, INT J ACCOUNT INF SY, V4, P6
[2]  
Al-Nofaie SM, 2016, Journal of Computer Science & Computational Mathematics, V6, P59, DOI [10.20967/jcscm.2016.03.004, DOI 10.20967/JCSCM.2016.03.004]
[3]  
Al-Otaibi Nouf A., 2014, Lecture Notes on Information Theory, V2, P151, DOI 10.12720/lnit.2.2.151-157
[4]  
Alanizy N, 2018, J Res Eng Appl Sci, V3, P118
[5]  
Alsaidi A., 2018, J COMPUTER SCI COMPU, V8, DOI [10.20967/jcscm.2018.03.002, DOI 10.20967/jcscm.2018.03.002]
[6]  
[Anonymous], 2015, 12 LEARN TECHN C WEA
[7]  
[Anonymous], 2014, INT C ADV ENG TECHN
[8]  
Asad M., 2011, Proceedings of the 1st International Conference on Computer Networks and Information Technology (ICCNIT 2011), P143, DOI 10.1109/ICCNIT.2011.6020921
[9]  
Deshmukh R, 2011, INT J ADV RES COMPUT, V2, P492
[10]  
Goshwe NY, 2013, INT J COMPUT SCI NET, V13, P9