Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
Main Article Content
Abstract
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
Received 17/3/2021
Accepted 6/10/2021
Published Online First 20/5/2022
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
Easttom C. Modern Cryptography: Applied Mathematics for Encryption and Information Security. New York: McGraw-Hill Education. 1st Ed, Chap16 Steganography; 2015 October: 337-356 P .
Pfleeger CP. Security in Computing. Upper Saddle River, NJ 07458: Prentice Hall, Inc. 1st Ed, Introduction Chap1; 1988 Sep 1: 1-34 P.
Jeremy Schatten "Using Client-Certificate based authentication with NGINX on Ubuntu - SSLTrust". SSLTrust. Retrieved 13 June 2019. https://www.ssltrust.com.au/help/setup-guides/client-certificate-authentication.
Yahya A. Steganography Techniques for Digital Images. Springer International Publishing; Chapter 2 Steganography Techniques; 2019, 1st Ed: 9-42 P.
Cheddad A, Condell J, Curran K, Mc Kevitt P. Digital image steganography: Survey and analysis of current methods Signal Process. 2010 Mar 1;90(3):727-52.
Ansari AS, Mohammadi MS, Parvez MT. A comparative study of recent steganography techniques for multiple image formats, Int J Comput Netw Inf Secur.. 2019;11(1):11-25.
Abdulmunem IA, Harba ES, Harba HS. Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks. Baghdad Sci J. 2021;18(4):1317-.
Mstafa RJ. Efficient and Robust Video Steganography Algorithms for Secure Data Communication, , Doctoral Dissertation. The School of Engineering, University of Bridgeport. 2017 June: 1-123P
Dalal M, Juneja M. Evaluation of orthogonal and biorthogonal wavelets for video steganography. Inf. Secur. J.: A Global Perspective. 2020 Jan 2;29(1):40-50.
Alia MA, Maria KA, Alsarayreh MA, Maria EA, Almanasra S. An improved video steganography: using random key-dependent. In 2019 IEEE Jordan International Joint Conference on JEEIT 2019 Apr 9 (pp. 234-237). IEEE.
Cao M, Tian L, Li C. A secure video steganography based on the intra-prediction mode (IPM) for H264. Sensors. 2020 Jan;20(18):5242
Sadek MM, Khalifa AS, Mostafa MG. Robust video steganography algorithm using adaptive skin-tone detection. Multimed. Tools Appl. 2017 Jan 1;76(2):3065-85.
Reddy V. Improved Secure Data Transfer Using Video Steganographic Technique. IJRSDA. 2017;4(3):55-70.
Rajalakshmi K, Mahesh K. Video steganography based on embedding the video using PCF technique. In 2017 International Conference on ICICES 2017 Feb 23 : 1-4. IEEE. doi: 10.1109/ICICES.2017.8070726.
Gupta H, Gupta R, Sharma B, Gandotra S. Review On Various Techniques Of Video Steganography. IJSTA. 2018;4(1):161-4.
Alwan IM. Image Steganography by Using Multiwavelet Transform. Baghdad Sci. J. 2014;11(2):275-83.
Rana S, Bhogal RK. A highly secure video steganography inside dwt domain hinged on bcd codes. In Singh R., Choudhury S., Gehlot A. (eds) Intelligent Communication, Control and Devices. ADV INTELL SYST (624) 2018 : 719-729. Springer, Singapore. https://doi.org/10.1007/978-981-10-5903-2_74
Khan S, Bianchi T. Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region. Int. J. Electr. Comput. Eng. 2018 Feb 1;8(1):2088-8708.
Neamah RM, Abed JA, Abbood EA. Hide text depending on the three channels of pixels in color images using the modified LSB algorithm. Int J Electr Comput Eng. 2020 Feb 1;10(1):809.
Salim KG, Al-alak SM, Jawad MJ. Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES. Baghdad Sci. J. 2021;18(2):0417-.