Improved Security Based on Combined Encryption and Steganography Techniques

被引:0
作者
Mocanu, Stefan [1 ]
Duluta, Andrei [1 ]
Merezeanu, Daniel [1 ]
Pietraru, Radu [1 ]
机构
[1] Univ Politehn Bucuresti, Fac Automat Control & Comp Sci, Splaiul Independentei 313, Bucharest 060042, Romania
来源
STUDIES IN INFORMATICS AND CONTROL | 2017年 / 26卷 / 01期
关键词
Digital steganography; encryption; pseudo random matrix; message hiding;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For some people a science, for other people just an art, steganography is in fact an ancient method of embedding a message into an apparently uninteresting carrier. Aiming to protect information, steganography is considered to be a close relative of encryption although they have different approaches. While encryption scrambles the message based on a certain algorithm so it can't be understood by anyone that does not hold the unscrambling key, steganography works on hiding the message without the need to deteriorate it. Minor alteration of the carrier file is accepted since steganography does not affect its useful content. Actually, steganography exploits file redundancy, file headers or, in case of multimedia content, replaces information that can't be used or perceived by the human eyes or ears. In this paper, a combination of image based steganography with encryption is presented. The encryption and decryption are based on two different files in which, by steganographic means, important information is hidden. The original message (the secret message) can be restored only if both files arrive safe at destination. There are no constraints regarding the image file types. The most important contribution resides in how the original information is encrypted and embedded into different graphic files, sent to the destination through different channels and then restored. Comparative performance tests were performed.
引用
收藏
页码:115 / 126
页数:12
相关论文
共 50 条
[21]   A New Image Encryption and Steganography Scheme [J].
Tang, Hongmei ;
Jin, Gaochan ;
Wu, Cuixia ;
Song, Peijiao .
PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, :60-63
[22]   Encryption based LSB Steganography Technique for Digital Images and Text Data [J].
Kaur, Manpreet ;
Sharma, Vinod Kumar .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (09) :90-97
[23]   Text Steganography Based on Parallel Encryption Using Cover Text (PECT) [J].
Panwar, Subhash ;
Kumar, Mukesh ;
Sharma, Sakshi .
4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2020, 1122 :303-313
[24]   Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption [J].
Juneja, Mamta ;
Sandhu, Parvinder Singh .
2009 INTERNATIONAL CONFERENCE ON ADVANCES IN RECENT TECHNOLOGIES IN COMMUNICATION AND COMPUTING (ARTCOM 2009), 2009, :302-305
[25]   Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment [J].
Ragab, Mahmoud ;
Alshehri, Samah ;
Alhadrami, Hani A. ;
Kateb, Faris ;
Ashary, Ehab Bahaudien ;
Abdel-khalek, S. .
CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01) :1323-1338
[26]   Digital Image Steganography with Encryption Based on Rubik's Cube Principle [J].
Raniprima, Sevierda ;
Hidayat, Bambang ;
Andini, Nur .
2016 INTERNATIONAL CONFERENCE ON CONTROL, ELECTRONICS, RENEWABLE ENERGY AND COMMUNICATIONS (ICCEREC), 2016, :198-201
[27]   Enhancing Internet Data Security: A Fusion of Cryptography, Steganography, and Machine Learning Techniques [J].
Rashid, Omar Fitian ;
Subhi, Mohammed Ahmed ;
Hussein, Marwa Khudhur ;
Mahdi, Mohammed Najah .
BAGHDAD SCIENCE JOURNAL, 2025, 22 (03) :1005-1015
[28]   Blockchain-based image encryption with spiral mapping and hashing techniques in dual level security scheme [J].
Chithra, P. L. ;
Aparna, R. .
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 21 (1-2) :185-204
[29]   Encryption-based Security in Wearable Devices [J].
Budzik, Adriano ;
Srivastava, Gautam ;
Baza, Mohamed .
2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
[30]   Big Data Security Framework Based on Encryption [J].
Wu, Shaobing ;
Wang, Changmei .
CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 :528-540