Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
University of Baghdad, College of Science for Women
2022-12-01
|
| Series: | مجلة بغداد للعلوم |
| Subjects: | |
| Online Access: | https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/6142 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849416492500647936 |
|---|---|
| author | Mohammed Abdullah Naser Saif M. Kh. Al-alak Ahmed Mohammed Hussein Majid Jabbar Jawad |
| author_facet | Mohammed Abdullah Naser Saif M. Kh. Al-alak Ahmed Mohammed Hussein Majid Jabbar Jawad |
| author_sort | Mohammed Abdullah Naser |
| collection | DOAJ |
| description |
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods.
|
| format | Article |
| id | doaj-art-2a48a7e7b2e24959907d13c49af1f179 |
| institution | Kabale University |
| issn | 2078-8665 2411-7986 |
| language | English |
| publishDate | 2022-12-01 |
| publisher | University of Baghdad, College of Science for Women |
| record_format | Article |
| series | مجلة بغداد للعلوم |
| spelling | doaj-art-2a48a7e7b2e24959907d13c49af1f1792025-08-20T03:33:10ZengUniversity of Baghdad, College of Science for Womenمجلة بغداد للعلوم2078-86652411-79862022-12-0119610.21123/bsj.2022.6142Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network ChannelMohammed Abdullah Naser0Saif M. Kh. Al-alak1Ahmed Mohammed Hussein2Majid Jabbar Jawad 3Department of Computer Science, College of Science for Women, University of Babylon, Babylon, Iraq Department of Computer Science, College of Science for Women, University of Babylon, Babylon, Iraq Department of Computer Science, College of Science for Women, University of Babylon, Babylon, Iraq Department of Computer Science, College of Science for Women, University of Babylon, Babylon, Iraq Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels with two secret random keys. Therefore, the hidden message remains protected even if the stego-object is hacked because the attacker is unable to know the correct frames and pixels that hold each bit of the secret message in addition to difficulty to successfully rebuild the message. The results refer to that the proposed scheme provides a good performance for evaluation metric that is used in this purpose when compared to a large number of related previous methods. https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/6142Information Security, Least Significant Bit (LSB), Randomness Public Network Channel, RC4, Video Steganography |
| spellingShingle | Mohammed Abdullah Naser Saif M. Kh. Al-alak Ahmed Mohammed Hussein Majid Jabbar Jawad Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel مجلة بغداد للعلوم Information Security, Least Significant Bit (LSB), Randomness Public Network Channel, RC4, Video Steganography |
| title | Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel |
| title_full | Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel |
| title_fullStr | Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel |
| title_full_unstemmed | Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel |
| title_short | Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel |
| title_sort | steganography and cryptography techniques based secure data transferring through public network channel |
| topic | Information Security, Least Significant Bit (LSB), Randomness Public Network Channel, RC4, Video Steganography |
| url | https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/6142 |
| work_keys_str_mv | AT mohammedabdullahnaser steganographyandcryptographytechniquesbasedsecuredatatransferringthroughpublicnetworkchannel AT saifmkhalalak steganographyandcryptographytechniquesbasedsecuredatatransferringthroughpublicnetworkchannel AT ahmedmohammedhussein steganographyandcryptographytechniquesbasedsecuredatatransferringthroughpublicnetworkchannel AT majidjabbarjawad steganographyandcryptographytechniquesbasedsecuredatatransferringthroughpublicnetworkchannel |