Cryptography and Steganography: New Approach

Journal Title: Transactions on Networks and Communications - Year 2017, Vol 5, Issue 6

Abstract

Digital communication witnesses a noticeable and continuous development in many applications in the Internet. Hence, secure communication sessions must be provided. The security of data transmitted across a global network has turned into a key factor on the network performance measures. So, the confidentiality and the integrity of data are needed to prevent eavesdroppers from accessing and using transmitted data. Steganography and Cryptography are two important techniques that are used to provide network security. In this paper, we survey a number of methods combining cryptography and steganography techniques in one system. Moreover, we present some differences between cryptography and steganography. The aim of this paper is to develop a new approach to hiding a secret information in an image or audio or video, by taking advantage of benefits of combining cryptography and steganography. In this method first, the message is encrypted by using AES algorithm and hashed the key using SHA-2 to prevent from attacks. After that, we performed some modifications on LSB algorithm by adding a key to make hiding process non sequential. Results achieved indicate that our proposed method is encouraging in terms of robustness and security.

Authors and Affiliations

Ahmed AL-Shaaby, Talal AlKharobi

Keywords

Related Articles

Outlier Resistant Time Series Operations via Qualitative Robustness and Saddle‐Point Game Formalizations‐ A Review: Filtering and Smoothing

Time series operations are sought in numerous applications, while the observations used in such operations are generally contaminated by data outliers. The objective is thus to design outlier resistant or “robust” time s...

Exploiting Cryptocurrency Miners with OSINT Techniques

Collection of intelligence is one of the key elements to organize more sophisticated methods of attacks. Open Source Intelligence (OSINT) is a technique used by attackers for reconnaissance purposes to gather information...

Setting an Optimization Problem of Distributing Traffic Across Multiple Independent Paths

Communication network development is considered as an urgent need for the world. The proposed work in this paper is to solve the problem of the traffic engineering, using the multi-path routing mechanisms by applying a d...

Water Wave Optimization Algorithm based Congestion Control and Quality of Service Improvement in Wireless Sensor Networks

Many researchers have implemented various machine learning algorithms and verify their results with the existing algorithms to control congestion in Wireless Sensor Networks. The major challenge lies in developing an alg...

TCSC: A Trustworthy and Communal Social Classifieds

Today, everyone relies heavily on the Internet to access information, and it changes the way we live, including our use of social networking services and community-based classified systems. However, two major problems lu...

Download PDF file
  • EP ID EP265976
  • DOI 10.14738/tnc.56.3914
  • Views 102
  • Downloads 0

How To Cite

Ahmed AL-Shaaby, Talal AlKharobi (2017). Cryptography and Steganography: New Approach. Transactions on Networks and Communications, 5(6), 25-38. https://europub.co.uk/articles/-A-265976