Improved Security Based on Combined Encryption and Steganography Techniques

被引:0
作者
Mocanu, Stefan [1 ]
Duluta, Andrei [1 ]
Merezeanu, Daniel [1 ]
Pietraru, Radu [1 ]
机构
[1] Univ Politehn Bucuresti, Fac Automat Control & Comp Sci, Splaiul Independentei 313, Bucharest 060042, Romania
来源
STUDIES IN INFORMATICS AND CONTROL | 2017年 / 26卷 / 01期
关键词
Digital steganography; encryption; pseudo random matrix; message hiding;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For some people a science, for other people just an art, steganography is in fact an ancient method of embedding a message into an apparently uninteresting carrier. Aiming to protect information, steganography is considered to be a close relative of encryption although they have different approaches. While encryption scrambles the message based on a certain algorithm so it can't be understood by anyone that does not hold the unscrambling key, steganography works on hiding the message without the need to deteriorate it. Minor alteration of the carrier file is accepted since steganography does not affect its useful content. Actually, steganography exploits file redundancy, file headers or, in case of multimedia content, replaces information that can't be used or perceived by the human eyes or ears. In this paper, a combination of image based steganography with encryption is presented. The encryption and decryption are based on two different files in which, by steganographic means, important information is hidden. The original message (the secret message) can be restored only if both files arrive safe at destination. There are no constraints regarding the image file types. The most important contribution resides in how the original information is encrypted and embedded into different graphic files, sent to the destination through different channels and then restored. Comparative performance tests were performed.
引用
收藏
页码:115 / 126
页数:12
相关论文
共 50 条
  • [21] Medical IoT: A Comprehensive Survey of Different Encryption and Security Techniques
    kharroub, Suleiman K.
    Abualsaud, Khalid
    Guizani, Mohsen
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1891 - 1896
  • [22] Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption
    Juneja, Mamta
    Sandhu, Parvinder Singh
    2009 INTERNATIONAL CONFERENCE ON ADVANCES IN RECENT TECHNOLOGIES IN COMMUNICATION AND COMPUTING (ARTCOM 2009), 2009, : 302 - 305
  • [23] Digital Image Steganography with Encryption Based on Rubik's Cube Principle
    Raniprima, Sevierda
    Hidayat, Bambang
    Andini, Nur
    2016 INTERNATIONAL CONFERENCE ON CONTROL, ELECTRONICS, RENEWABLE ENERGY AND COMMUNICATIONS (ICCEREC), 2016, : 198 - 201
  • [24] Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment
    Ragab, Mahmoud
    Alshehri, Samah
    Alhadrami, Hani A.
    Kateb, Faris
    Ashary, Ehab Bahaudien
    Abdel-khalek, S.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 1323 - 1338
  • [25] Encryption based LSB Steganography Technique for Digital Images and Text Data
    Kaur, Manpreet
    Sharma, Vinod Kumar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (09): : 90 - 97
  • [26] Text Steganography Based on Parallel Encryption Using Cover Text (PECT)
    Panwar, Subhash
    Kumar, Mukesh
    Sharma, Sakshi
    4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2020, 1122 : 303 - 313
  • [27] Enhancing Internet Data Security: A Fusion of Cryptography, Steganography, and Machine Learning Techniques
    Rashid, Omar Fitian
    Subhi, Mohammed Ahmed
    Hussein, Marwa Khudhur
    Mahdi, Mohammed Najah
    BAGHDAD SCIENCE JOURNAL, 2025, 22 (03) : 1005 - 1015
  • [28] Blockchain-based image encryption with spiral mapping and hashing techniques in dual level security scheme
    Chithra, P. L.
    Aparna, R.
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 21 (1-2) : 185 - 204
  • [29] Encryption-based Security in Wearable Devices
    Budzik, Adriano
    Srivastava, Gautam
    Baza, Mohamed
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [30] Big Data Security Framework Based on Encryption
    Wu, Shaobing
    Wang, Changmei
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 528 - 540