Double Steganography - New Algorithm for More Security

Yazed Alsaawy, Adnan Ahmed Abi Sen, A. Alkhodre, N. Bahbouh, Nuha Abdulrazak Baghanim, Hajar Barrak Alharbi
{"title":"Double Steganography - New Algorithm for More Security","authors":"Yazed Alsaawy, Adnan Ahmed Abi Sen, A. Alkhodre, N. Bahbouh, Nuha Abdulrazak Baghanim, Hajar Barrak Alharbi","doi":"10.1109/INDIACom51348.2021.00064","DOIUrl":null,"url":null,"abstract":"The 9thand 20th centuries have given rise to great technologies and tools which are making our lives comfortable. In the field of technology and communications, we have billions of electronic services and applications. These technological developments and the unprecedented increase technology, applications and services combined, with the expansion and proliferation of the internet, have greatly increased the frequency of data transfer over the internet. Sharing data over the internet has become a de facto standard of data transfer. This has led to an increase in the vulnerability of data being hacked during its transfer from one port to another. On the other hand, the capabilities of malicious parties in breaking the methods of protection and disclosing confidential information has also advanced and increased tremendously. Thus, organizations and individuals are looking for ways to protect their data from being hacked while it is shared with third parties. Steganography is one of the most effective ways to protect information as it uses encryption algorithms and hides information in a way that prevents attention being drawn from hackers. This research presents a new algorithm in the field of Steganography to increase the level of protection. Compared with the earlier methods, it has a double effect of the Steganography process. We call it ‘Multi-Layered Steganography Algorithm’ (MLSA). We also provide the results of the implementation and testing of the MLSA, which indicate the effectiveness of MLSA according to the protection level and resistant to revealing attacks. But, in contrast, MLSA is suitable only for small sized data sets, and does not have adequate immunity to jamming or compressing data, which we shall study in future.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDIACom51348.2021.00064","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The 9thand 20th centuries have given rise to great technologies and tools which are making our lives comfortable. In the field of technology and communications, we have billions of electronic services and applications. These technological developments and the unprecedented increase technology, applications and services combined, with the expansion and proliferation of the internet, have greatly increased the frequency of data transfer over the internet. Sharing data over the internet has become a de facto standard of data transfer. This has led to an increase in the vulnerability of data being hacked during its transfer from one port to another. On the other hand, the capabilities of malicious parties in breaking the methods of protection and disclosing confidential information has also advanced and increased tremendously. Thus, organizations and individuals are looking for ways to protect their data from being hacked while it is shared with third parties. Steganography is one of the most effective ways to protect information as it uses encryption algorithms and hides information in a way that prevents attention being drawn from hackers. This research presents a new algorithm in the field of Steganography to increase the level of protection. Compared with the earlier methods, it has a double effect of the Steganography process. We call it ‘Multi-Layered Steganography Algorithm’ (MLSA). We also provide the results of the implementation and testing of the MLSA, which indicate the effectiveness of MLSA according to the protection level and resistant to revealing attacks. But, in contrast, MLSA is suitable only for small sized data sets, and does not have adequate immunity to jamming or compressing data, which we shall study in future.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
双重隐写术-提高安全性的新算法
9世纪和20世纪产生了伟大的技术和工具,使我们的生活舒适。在技术和通信领域,我们有数十亿的电子服务和应用。这些技术的发展和前所未有的技术、应用和服务的增长,加上互联网的扩展和扩散,大大增加了互联网上数据传输的频率。在互联网上共享数据已经成为事实上的数据传输标准。这导致数据在从一个端口传输到另一个端口时被黑客攻击的脆弱性增加。另一方面,恶意方破坏保护方法和泄露机密信息的能力也大大提高和增加。因此,组织和个人都在寻找方法来保护他们的数据在与第三方共享时不被黑客入侵。隐写术是保护信息最有效的方法之一,因为它使用加密算法,并以一种防止黑客注意的方式隐藏信息。本研究提出了一种新的隐写算法,以提高隐写保护水平。与早期的隐写方法相比,它具有双重的隐写效果。我们称之为“多层隐写算法”(MLSA)。本文还提供了该算法的实现和测试结果,从保护级别和抗泄露攻击的角度说明了该算法的有效性。但是,相比之下,MLSA只适用于小型数据集,并且对干扰或压缩数据没有足够的免疫力,这是我们未来需要研究的问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Stochastic Scheduling of Parking Lot Operator in Energy and Regulation Markets amalgamating PBDR Social Synchrony: An Analytical Contemplation of Contemporary State of Art Frameworks The AI enabled Chatbot Framework for Intelligent Citizen-Government Interaction for Delivery of Services Biometric System - Challenges and Future Trends Solving SIS Epidemic Disease Model by Flower Pollination Algorithm
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1