增强安全性的隐写术中混合密码的实现

V. Kalaichelvi, P. Devi, S. Hemamalini, S. Swaminathan, S. Suganya
{"title":"增强安全性的隐写术中混合密码的实现","authors":"V. Kalaichelvi, P. Devi, S. Hemamalini, S. Swaminathan, S. Suganya","doi":"10.1109/ICSTSN57873.2023.10151554","DOIUrl":null,"url":null,"abstract":"Now-a-days, many billions and trillions of data exchanged over the internet per second. Ensuring the security of data is a major priority in the realm of information technology.To provide data security, many technologies have been evolved like cryptography, steganography, visual cryptography, watermarking, etc,. This article combines both cryptography and steganography for providing security. Using modified hill cipher algorithms, it first turns the original message into a secret message. Traditionally, only the alphabets are encrypted with hill cipher. But, the proposed modified hill cipher algorithm can encrypt any type of message using Radix64 encoding/decoding conversion. And the keys which are used in hill cipher algorithm encrypted using modified RSA algorithm. The 2-bit LSB technique is then used to embed the encrypted keys and secret message into the cover image to create the stego-image. Then, the stego-image is transferred to the recipient side through secure channel. The recipient must follow the entire process backwards after receiving the stego-image in order to receive the original message. Finally, the parameters of several performance measures such as Entropy, MSE, PSNR, and histogram are measured. A substantial improvement in efficiency and security can be observed with the proposed system.","PeriodicalId":325019,"journal":{"name":"2023 2nd International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Implementation of Hybrid Cryptography in Steganography for Augmented Security\",\"authors\":\"V. Kalaichelvi, P. Devi, S. Hemamalini, S. Swaminathan, S. Suganya\",\"doi\":\"10.1109/ICSTSN57873.2023.10151554\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Now-a-days, many billions and trillions of data exchanged over the internet per second. Ensuring the security of data is a major priority in the realm of information technology.To provide data security, many technologies have been evolved like cryptography, steganography, visual cryptography, watermarking, etc,. This article combines both cryptography and steganography for providing security. Using modified hill cipher algorithms, it first turns the original message into a secret message. Traditionally, only the alphabets are encrypted with hill cipher. But, the proposed modified hill cipher algorithm can encrypt any type of message using Radix64 encoding/decoding conversion. And the keys which are used in hill cipher algorithm encrypted using modified RSA algorithm. The 2-bit LSB technique is then used to embed the encrypted keys and secret message into the cover image to create the stego-image. Then, the stego-image is transferred to the recipient side through secure channel. The recipient must follow the entire process backwards after receiving the stego-image in order to receive the original message. Finally, the parameters of several performance measures such as Entropy, MSE, PSNR, and histogram are measured. A substantial improvement in efficiency and security can be observed with the proposed system.\",\"PeriodicalId\":325019,\"journal\":{\"name\":\"2023 2nd International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN)\",\"volume\":\"59 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 2nd International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSTSN57873.2023.10151554\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 2nd International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSTSN57873.2023.10151554","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

如今,每秒有数十亿甚至数万亿的数据通过互联网交换。确保数据安全是信息技术领域的一个主要优先事项。为了保证数据的安全性,许多技术已经发展起来,如密码学、隐写术、视觉密码学、水印等。本文结合了密码学和隐写术来提供安全性。采用改进的hill密码算法,首先将原始消息转换为秘密消息。传统上,只有字母用希尔密码加密。但是,本文提出的改进hill密码算法可以使用Radix64编解码转换对任何类型的消息进行加密。并且采用改进的RSA算法对hill密码算法中使用的密钥进行加密。然后使用2位LSB技术将加密密钥和秘密信息嵌入到封面图像中以创建隐写图像。然后,将隐写图像通过安全通道传输到接收端。接收方在接收到隐写图像后,必须逆向执行整个过程,才能接收到原始信息。最后,测量了熵、MSE、PSNR和直方图等性能指标的参数。该系统在效率和安全性方面都有很大的提高。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Implementation of Hybrid Cryptography in Steganography for Augmented Security
Now-a-days, many billions and trillions of data exchanged over the internet per second. Ensuring the security of data is a major priority in the realm of information technology.To provide data security, many technologies have been evolved like cryptography, steganography, visual cryptography, watermarking, etc,. This article combines both cryptography and steganography for providing security. Using modified hill cipher algorithms, it first turns the original message into a secret message. Traditionally, only the alphabets are encrypted with hill cipher. But, the proposed modified hill cipher algorithm can encrypt any type of message using Radix64 encoding/decoding conversion. And the keys which are used in hill cipher algorithm encrypted using modified RSA algorithm. The 2-bit LSB technique is then used to embed the encrypted keys and secret message into the cover image to create the stego-image. Then, the stego-image is transferred to the recipient side through secure channel. The recipient must follow the entire process backwards after receiving the stego-image in order to receive the original message. Finally, the parameters of several performance measures such as Entropy, MSE, PSNR, and histogram are measured. A substantial improvement in efficiency and security can be observed with the proposed system.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信