ENHANCEMENT OF SECURED DATA TRANSMISSION USING n*3 INCOMPREHENSIBLE STEGO FILES BASED ON LS, SL, AND LC ALGORITHMS
-
Published:2023
Issue:1
Volume:82
Page:19-51
-
ISSN:0040-2508
-
Container-title:Telecommunications and Radio Engineering
-
language:en
-
Short-container-title:Telecom Rad Eng
Author:
Srinivasu Lingamallu Naga,Veeramani Vijayaraghavan
Abstract
In this paper, security of covert communication is increased by using <i>n</i><sup>*</sup>3 incomprehensible stego files based on the novel algorithms, which are logical and statistical (LS), split logical (SL), and logical concealing (LC). Generally, cryptography and steganography techniques are used to achieve a secured data transmission. Cryptography is used to generate the "ciphertext" and steganography is used to produce the understandable stego image. The results of these two techniques alert the intruder to the fact that secret information is being exchanged. To overcome this drawback, this paper generates n*3 incomprehensible stego files with four levels of security using covert data and a container (cover) image. The main novelty of the proposed framework is that it provides multilevel security for data transmission by converting understandable stego images into non-understandable (incomprehensible) stego files. The LS encryption algorithm generates the lesser length of ciphertext with the input of covert data. The steganography generates a good visual quality of an understandable stego image by using discrete framelet transform (DFT) and random pixel embedding (RPE) techniques. Finally, the SL and LC algorithms produce <i>n</i><sup>*</sup>3 incomprehensible stego files using the understandable stego image. These stego files are incomprehensible, meaningless, and invisible in nature. The experimental results have shown that the incomprehensible stego files improve the payload capacity, quality metrics (peak signal-to-noise ratio, correlation, and number of pixels change in rate), and also four levels of security to the secret data. It is also able to face the various steganalysis attacks, such as files deletion, data deletion, and data modification.
Subject
Electrical and Electronic Engineering
Reference29 articles.
1. Ahmed, A., Sabhany, A., Hussain, A., and Rosmadi, M., Digital Audio Steganography: Systematic Review, Classification, and Analysis of the Current State of the Art, Comput. Sci. Rev., vol. 38, no. 1, pp. 1-27, 2020. 2. Almomani, A., Atawneh, S., Sumari, P., and Gupta, B., Secure and Imperceptible Digital Image Steganographic Algorithm Based on Diamond Encoding in DWT Domain, Multimed. Tools Appl., vol. 76, no. 18, pp. 18451-18472, 2017. 3. Bolin, C., Weiqi, L., Peijia, Z., and Jiwu, H., Universal Stego Post-Processing for Enhancing Image Steganography, J. Inf. Secur. Appl., vol. 55, p. 10164, 2020. 4. Chao, R., A Novel Image Data Hiding Scheme with Diamond Encoding, EURASIP J. Inf. Secur., vol. 1, no. 1, pp. 1-9, 2009. 5. Ghanbari, M. and Randa, A., A High Payload Steganography Mechanism Based on Wavelet Packet Transformation and Neutrosophic Set, J. Vis. Commun. Image Rep., vol. 3, no. 9, pp. 1-28, 2018.
|
|