Improved Security Based on Combined Encryption and Steganography Techniques

被引:0
作者
Mocanu, Stefan [1 ]
Duluta, Andrei [1 ]
Merezeanu, Daniel [1 ]
Pietraru, Radu [1 ]
机构
[1] Univ Politehn Bucuresti, Fac Automat Control & Comp Sci, Splaiul Independentei 313, Bucharest 060042, Romania
来源
STUDIES IN INFORMATICS AND CONTROL | 2017年 / 26卷 / 01期
关键词
Digital steganography; encryption; pseudo random matrix; message hiding;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For some people a science, for other people just an art, steganography is in fact an ancient method of embedding a message into an apparently uninteresting carrier. Aiming to protect information, steganography is considered to be a close relative of encryption although they have different approaches. While encryption scrambles the message based on a certain algorithm so it can't be understood by anyone that does not hold the unscrambling key, steganography works on hiding the message without the need to deteriorate it. Minor alteration of the carrier file is accepted since steganography does not affect its useful content. Actually, steganography exploits file redundancy, file headers or, in case of multimedia content, replaces information that can't be used or perceived by the human eyes or ears. In this paper, a combination of image based steganography with encryption is presented. The encryption and decryption are based on two different files in which, by steganographic means, important information is hidden. The original message (the secret message) can be restored only if both files arrive safe at destination. There are no constraints regarding the image file types. The most important contribution resides in how the original information is encrypted and embedded into different graphic files, sent to the destination through different channels and then restored. Comparative performance tests were performed.
引用
收藏
页码:115 / 126
页数:12
相关论文
共 50 条
[41]   An enhanced Hill cipher approach for image encryption in steganography [J].
Karthikeyan, B. ;
Chakravarthy, Jagannathan ;
Vaithiyanathan, V. .
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (3-4) :178-187
[42]   Enhancing the Security of a Gateway Through Steganography [J].
Nwanebu, Docas .
PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2019), 2019, :287-293
[43]   Chaotic coyote optimization algorithm for image encryption and steganography [J].
Huawei Tong ;
Tianyou Li ;
Youyun Xu ;
Xinzhong Su ;
Guopeng Qiao .
Multimedia Tools and Applications, 2024, 83 :20861-20887
[44]   On the Gold Standard for Security of Universal Steganography [J].
Berndt, Sebastian ;
Liskiewicz, Maciej .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT I, 2018, 10820 :29-60
[45]   Implementation of cryptography in steganography for enhanced security [J].
Antonio, Harianto ;
Prasad, P. W. C. ;
Alsadoon, Abeer .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (23) :32721-32734
[46]   Implementation of cryptography in steganography for enhanced security [J].
Harianto Antonio ;
P. W. C. Prasad ;
Abeer Alsadoon .
Multimedia Tools and Applications, 2019, 78 :32721-32734
[47]   EncryScation: A Novel Framework for Cloud IaaS, DaaS security using Encryption and Obfuscation Techniques [J].
Suthar, Krunal ;
Patel, Jayesh .
2015 5TH NIRMA UNIVERSITY INTERNATIONAL CONFERENCE ON ENGINEERING (NUICONE), 2015,
[48]   A novel encryption with bacterial foraging optimization algorithm based pixel selection scheme for video steganography [J].
M N Sharath ;
T M Rajesh ;
Mallanagouda Patil .
Multimedia Tools and Applications, 2023, 82 :25197-25216
[49]   Image steganography technique based on bald eagle search optimal pixel selection with chaotic encryption [J].
Bahaddad, Adel A. ;
Almarhabi, Khalid Ali ;
Abdel-Khalek, Sayed .
ALEXANDRIA ENGINEERING JOURNAL, 2023, 75 :41-54
[50]   A novel encryption with bacterial foraging optimization algorithm based pixel selection scheme for video steganography [J].
Sharath, M. N. ;
Rajesh, T. M. ;
Patil, Mallanagouda .
MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (16) :25197-25216