Reseed Skipping of Linear Congruential Generator for Multi-level Image Steganography Security of Financial Data

被引:0
作者
Danso J.M. [1 ,2 ,3 ]
Missah Y.M. [1 ]
Gyamfi E.O. [3 ,4 ]
Dankwa S. [5 ]
Kwabena S. [3 ]
机构
[1] Department of Computer Science, Kwame Nkrumah University of Science and Technology (KNUST), Kumasi
[2] School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu
[3] School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu
[4] Department of Cyber Security and Computer Engineering Technology, School of Computing and Information Sciences, C.K. Tedam University of Technology and Applied Sciences, Upper East Region, Navrongo
[5] School of Automation Engineering, University of Electronic Science and Technology of China, Chengdu
关键词
AES encryption scheme; Dynamic difference expansion principle; Linear congruential generator; Pseudo-random number generator; Reserving room before encryption; Steganography;
D O I
10.1007/s42979-022-01540-z
中图分类号
学科分类号
摘要
This paper proposed a multi-level image steganography model that integrates with image and plaintext encryption schemes. The model starts by partitioning the cover-image pixel positions into two regions of respective purposes, one is reserved to hold the data, and through the implementation of the dynamic difference expansion principle, the other sloughs some parts to the reserved region in responsive to the size of the data to embed. Continuously reseeding and initializing the parameter values of a Linear Congruential Generator (LCG), generate a set of random pixel positions as members of the reserved region. Before data embedding, the region reserved to hold the data as well as the data bits to embed, are then encrypted using AES with respective keys. Encryption keys are randomly generated using a Cryptographically Secure Pseudo-Random Number Generator (CSPRNG), the Fortuna algorithm. Multiplex security nature of using a randomization generator to reserve image region for encryption and encrypting plaintext data before performing steganography still ensures stability in computational complexities better than a logarithmic O(n log n). A visual inspection by evaluators who made 3000 choices to correctly differentiate stego images from its cover-images shows that only 47 choices were correct, 1884 choices were wrong, while 1069 choices were uncertain. An experiment shows an average Embedding Rates (ERs) of 0.00109 bpp and an average PSNR of 72. This concludes, as our integrated steganography and image encryption which implements the dynamic difference expansion principle, outputs encrypted stego mages that can deceive the naked human eyes into identifying them as rather cover-images, its embedding rate is faster (i.e. ER < 0.1), suitably good, and ensures better imperceptibility of cover-image alterations. When comparing these experimental results with existing methods, our proposed model shows significant competitiveness. We even show real-life scenarios on how this idea is just not a proof-of-concept but typically applicable in protecting sensitive financial data. © 2022, The Author(s), under exclusive licence to Springer Nature Singapore Pte Ltd.
引用
收藏
相关论文
共 49 条
[1]  
Zhou W., Jia Y., Peng A., Zhang Y., Liu P., The effect of IOT new features on security and privacy: new threats, existing solutions, and challenges yet to be solved, IEEE Internet Things J, 6, 2, pp. 1606-1616, (2018)
[2]  
Qian Z., Choo K.K.R., Cogranne R., Zhang X., Multimedia security: Novel steganography and privacy preserving [Editorial], Secur Commun Networks, 2018, pp. 1-2, (2018)
[3]  
Catak F.O., Mustacoglu A.F., CPP-ELM: Cryptographically privacy-preserving extreme learning machine for cloud systems, Int J Comput Intell Syst, 11, 1, pp. 33-44, (2018)
[4]  
Kadhim I.J., Premaratne P., Vial P.J., Halloran B., Comprehensive survey of image steganography: techniques, evaluations, and trends in future research, Neurocomputing, 335, 2019, pp. 299-326, (2019)
[5]  
Thangadurai K., Devi G.S., An analysis of LSB based image steganography technique, 2014 International Conference on Computer Communication and Informatics (ICCCI), pp. 1-4, (2014)
[6]  
Zielinska E., Mazurczyk W., Szczypiorski K., Trends in steganography, Commun ACM, 57, 3, pp. 86-95, (2014)
[7]  
Bhattacharyya S., Banerjee I., Sanyal G., A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier, J Glob Res Comput Sci, 2, 4, pp. 1-16, (2011)
[8]  
Hussain M., Wahab A.W.A., Idris Y.I.B., Ho A.T., Jung K.H., Image steganography in spatial domain: a survey, Signal Process Image Commun, 65, pp. 46-66, (2018)
[9]  
Jiang S., Ye D., Huang J., Shang Y., Zheng Z., SmartSteganogaphy: light-weight generative audio steganography model for smart embedding application, J Netw Comput Appl, 165, pp. 1-7, (2020)
[10]  
Baawi S.S., Mokhtar M.R., Sulaiman R., A comparative study on the advancement of text steganography techniques in digital media, ARPN J Eng Appl Sci, 13, 5, pp. 1854-1863, (2018)