Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohammed Abdullah Naser, Saif M. Kh. Al-alak, Ahmed Mohammed Hussein, Majid Jabbar Jawad
Format: Article
Language:English
Published: University of Baghdad, College of Science for Women 2022-12-01
Series:مجلة بغداد للعلوم
Subjects:
Online Access:https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/6142
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849416492500647936
author Mohammed Abdullah Naser
Saif M. Kh. Al-alak
Ahmed Mohammed Hussein
Majid Jabbar Jawad
author_facet Mohammed Abdullah Naser
Saif M. Kh. Al-alak
Ahmed Mohammed Hussein
Majid Jabbar Jawad
author_sort Mohammed Abdullah Naser
collection DOAJ
description Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
format Article
id doaj-art-2a48a7e7b2e24959907d13c49af1f179
institution Kabale University
issn 2078-8665
2411-7986
language English
publishDate 2022-12-01
publisher University of Baghdad, College of Science for Women
record_format Article
series مجلة بغداد للعلوم
spelling doaj-art-2a48a7e7b2e24959907d13c49af1f1792025-08-20T03:33:10ZengUniversity of Baghdad, College of Science for Womenمجلة بغداد للعلوم2078-86652411-79862022-12-0119610.21123/bsj.2022.6142Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network ChannelMohammed Abdullah Naser0Saif M. Kh. Al-alak1Ahmed Mohammed Hussein2Majid Jabbar Jawad 3Department of Computer Science, College of Science for Women, University of Babylon, Babylon, Iraq Department of Computer Science, College of Science for Women, University of Babylon, Babylon, Iraq Department of Computer Science, College of Science for Women, University of Babylon, Babylon, Iraq Department of Computer Science, College of Science for Women, University of Babylon, Babylon, Iraq Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods. https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/6142Information Security, Least Significant Bit (LSB), Randomness Public Network Channel, RC4, Video Steganography
spellingShingle Mohammed Abdullah Naser
Saif M. Kh. Al-alak
Ahmed Mohammed Hussein
Majid Jabbar Jawad
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
مجلة بغداد للعلوم
Information Security, Least Significant Bit (LSB), Randomness Public Network Channel, RC4, Video Steganography
title Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
title_full Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
title_fullStr Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
title_full_unstemmed Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
title_short Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
title_sort steganography and cryptography techniques based secure data transferring through public network channel
topic Information Security, Least Significant Bit (LSB), Randomness Public Network Channel, RC4, Video Steganography
url https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/6142
work_keys_str_mv AT mohammedabdullahnaser steganographyandcryptographytechniquesbasedsecuredatatransferringthroughpublicnetworkchannel
AT saifmkhalalak steganographyandcryptographytechniquesbasedsecuredatatransferringthroughpublicnetworkchannel
AT ahmedmohammedhussein steganographyandcryptographytechniquesbasedsecuredatatransferringthroughpublicnetworkchannel
AT majidjabbarjawad steganographyandcryptographytechniquesbasedsecuredatatransferringthroughpublicnetworkchannel