Yazed Alsaawy, Adnan Ahmed Abi Sen, A. Alkhodre, N. Bahbouh, Nuha Abdulrazak Baghanim, Hajar Barrak Alharbi
{"title":"Double Steganography - New Algorithm for More Security","authors":"Yazed Alsaawy, Adnan Ahmed Abi Sen, A. Alkhodre, N. Bahbouh, Nuha Abdulrazak Baghanim, Hajar Barrak Alharbi","doi":"10.1109/INDIACom51348.2021.00064","DOIUrl":null,"url":null,"abstract":"The 9thand 20th centuries have given rise to great technologies and tools which are making our lives comfortable. In the field of technology and communications, we have billions of electronic services and applications. These technological developments and the unprecedented increase technology, applications and services combined, with the expansion and proliferation of the internet, have greatly increased the frequency of data transfer over the internet. Sharing data over the internet has become a de facto standard of data transfer. This has led to an increase in the vulnerability of data being hacked during its transfer from one port to another. On the other hand, the capabilities of malicious parties in breaking the methods of protection and disclosing confidential information has also advanced and increased tremendously. Thus, organizations and individuals are looking for ways to protect their data from being hacked while it is shared with third parties. Steganography is one of the most effective ways to protect information as it uses encryption algorithms and hides information in a way that prevents attention being drawn from hackers. This research presents a new algorithm in the field of Steganography to increase the level of protection. Compared with the earlier methods, it has a double effect of the Steganography process. We call it ‘Multi-Layered Steganography Algorithm’ (MLSA). We also provide the results of the implementation and testing of the MLSA, which indicate the effectiveness of MLSA according to the protection level and resistant to revealing attacks. But, in contrast, MLSA is suitable only for small sized data sets, and does not have adequate immunity to jamming or compressing data, which we shall study in future.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDIACom51348.2021.00064","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The 9thand 20th centuries have given rise to great technologies and tools which are making our lives comfortable. In the field of technology and communications, we have billions of electronic services and applications. These technological developments and the unprecedented increase technology, applications and services combined, with the expansion and proliferation of the internet, have greatly increased the frequency of data transfer over the internet. Sharing data over the internet has become a de facto standard of data transfer. This has led to an increase in the vulnerability of data being hacked during its transfer from one port to another. On the other hand, the capabilities of malicious parties in breaking the methods of protection and disclosing confidential information has also advanced and increased tremendously. Thus, organizations and individuals are looking for ways to protect their data from being hacked while it is shared with third parties. Steganography is one of the most effective ways to protect information as it uses encryption algorithms and hides information in a way that prevents attention being drawn from hackers. This research presents a new algorithm in the field of Steganography to increase the level of protection. Compared with the earlier methods, it has a double effect of the Steganography process. We call it ‘Multi-Layered Steganography Algorithm’ (MLSA). We also provide the results of the implementation and testing of the MLSA, which indicate the effectiveness of MLSA according to the protection level and resistant to revealing attacks. But, in contrast, MLSA is suitable only for small sized data sets, and does not have adequate immunity to jamming or compressing data, which we shall study in future.