Images Steganography Approach Supporting Chaotic Map Technique for the Security of Online Transfer
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 4
Abstract
One of the most important issue in this domain is the security concern of the transfer data. The online transfer data may access illegally through attack the communication gate between the servers and the users. The main aim of this study is to enhance the security level of the online data transfer using two integrated methods; images steganography to hide the transfer data in image media, and chaotic map to remap the original format of the transfer data. The integration between these two methods is effective to secure the data in several format such as text, audio, and images. The proposed algorithm is the prototyped using JAVA programming, 20 images and text messages of usable sizes (plain data) were tested on the dataset using the developed programming. The simulation using local server is accomplished to analyze the security performance based on two factors; the plain data size and the data transfer distance. Many attacking attempts are performed on the simulation test using known attacking techniques such as observe the stego images quality. The experiment results show that about 85% of the attacking attempts fail to catch the stego images. 95% of the attacks fail in remap meaningful parts of the chaotic data. The results indicate the very good level of the propose security methods to secure the online transfer data. The contribution of this study is the effective integration between the steganography and chaotic map approaches to assure high security level of online data transfer.
Authors and Affiliations
Yasser Mohammad Al-Sharo
A study on classification of EEG Data using the Filters
In the field of data mining, classification of data is being a difficult task for further analysis. Classifying the EEG data would require more efficient algorithms. In this paper the classification filters such a...
Implementation, Verification and Validation of an OpenRISC-1200 Soft-core Processor on FPGA
An embedded system is a dedicated computer system in which hardware and software are combined to per-form some specific tasks. Recent advancements in the Field Programmable Gate Array (FPGA) technology make it possible t...
Evaluation and Improvement of Procurement Process with Data Analytics
Analytics can be applied in procurement to benefit organizations beyond just prevention and detection of fraud. This study aims to demonstrate how advanced data mining techniques such as text mining and cluster analysis...
Toward the Integration of Traditional and Agile Approaches
The agile approach uses continuous delivery, instead of distinct procedure, to work closer with customers and to respond faster requirement changes. All of these are against the traditional plan driven approach. Due to a...
Systematic Evaluation of Social Recommendation Systems: Challenges and Future
The issue of information overload could be effectively managed with the help of intelligent system which is capable of proactively supervising the users in accessing relevant or useful information in a tailored way, by p...