Crypto-Steganographic LSB-based System for AES-Encrypted Data
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 10
Abstract
The purpose of this work is to increase the level of concealment of information from unauthorized access by pre-encrypting and hiding it in multimedia files such as images. A crypto-steganographic information protection algorithm with LSB-method was implemented. The algorithm hides AES pre-encrypted confidential information in the form of text or images into target containing image files. This method uses the concept of data concealing in the least significant pixel bits of the target image files. The proposed method relies on the use of Diffie-Hellman public key exchange protocol for securely exchanging the stego-key used for LSB as well as the public key used for encrypting the secret information. The algorithm ensures that the visual quality of the image remains unchanged, with no distortions perceived by the human eye. The algorithm also complicates the detection of concealed information embedded in the target image with use of PRNG as an enhancement for LSB. The proposed system scheme achieved competitive results. On an average, the system achieved a Peak Signal-to-Noise Ratio (PSNR) of 96.3 dB and a Mean Square Error (MSE) of 0.00408. The results obtained demonstrate that the proposed system offers high payload capabilities with immunity against visual degradation of resultant stego images.
Authors and Affiliations
Mwaffaq Abu-Alhaija
Leisure Technology for the Elderly: A Survey, User Acceptance Testing and Conceptual Design
The Alzheimer’s disease damages neuronal and synaptic system due to the high level of amyloid beta in the brain. It is the common cause of dementia which is more common to afflict the elderly where they will gradually lo...
Empirical Analysis of Metrics Using UML Class Diagram
Lots of Organizations before they are setup survey the maintainability of programming frameworks. To give quality program design there exists a critical strategy called Object-Oriented Framework. Object–Oriented estimati...
A Secure User Authentication Scheme with Biometrics for IoT Medical Environments
Internet of Things (IoT) is a ubiquitous network that devices are interconnected and users can access those devices through the Internet. Recently, medical healthcare systems are combined with these IoT networks and prov...
Heterogeneous HW/SW FPGA-Based Embedded System for Database Sequencing Applications
Database sequencing applications including sequence comparison, searching, and analysis are considered among the most computation power and time consumers. Heuristic algorithms suffer from sensitivity while traditional s...
Artificial Intelligence Chatbots are New Recruiters
The purpose of the paper is to assess the artificial intelligence chatbots influence on recruitment process. The authors explore how chatbots offered service delivery to attract and candidates engagement in the recruitme...