Open Access   Article Go Back

Smart Grid Database Security Using Steganography Algorithm

Mandeep Kaur Sidhu1 , Anantdeep Kaur2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 1421-1425, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.14211425

Online published on Jul 31, 2018

Copyright © Mandeep Kaur Sidhu, Anantdeep Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Mandeep Kaur Sidhu, Anantdeep Kaur, “Smart Grid Database Security Using Steganography Algorithm,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1421-1425, 2018.

MLA Style Citation: Mandeep Kaur Sidhu, Anantdeep Kaur "Smart Grid Database Security Using Steganography Algorithm." International Journal of Computer Sciences and Engineering 6.7 (2018): 1421-1425.

APA Style Citation: Mandeep Kaur Sidhu, Anantdeep Kaur, (2018). Smart Grid Database Security Using Steganography Algorithm. International Journal of Computer Sciences and Engineering, 6(7), 1421-1425.

BibTex Style Citation:
@article{Sidhu_2018,
author = {Mandeep Kaur Sidhu, Anantdeep Kaur},
title = {Smart Grid Database Security Using Steganography Algorithm},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {1421-1425},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2621},
doi = {https://doi.org/10.26438/ijcse/v6i7.14211425}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.14211425}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2621
TI - Smart Grid Database Security Using Steganography Algorithm
T2 - International Journal of Computer Sciences and Engineering
AU - Mandeep Kaur Sidhu, Anantdeep Kaur
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 1421-1425
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
1559 469 downloads 253 downloads
  
  
           

Abstract

Smart Grids are the efficient network for manage and distribute the electricity in the power grids. The smart grid is provided the two-way communication between customers and distributors. In this paper, double layer security technique is designed using steganography spatial domain and cryptography AES algorithm for smart grid database security. In the proposed technique, one time padding initialization vector (IV) is generated based on the edges information of cover image, which resolved the replay attack. The encryption of secret data is done using AES_IV algorithm. Further, the data embedding is done in smooth reason of the image using 2-bit LSB technique. At the receiver end, based on the edges information IV is determined and data extraction is done. The avalanche effect, Peak-signal-to-noise ratio, embedding capacity parameters are measured for performance analysis. The experimental results show that for different images, different IV is generated and quality of output image not degraded.

Key-Words / Index Term

Steganography, Cryptography, Smart Grid, Avalanche Effect, Initialization Vector, One Time Padding

References

[1] Suleiman, H., Alqassem, I., Diabat, A., Arnautovic, E. and Svetinovic, D., 2015. Integrated smart grid systems security threat model. Information Systems, 53, pp.147-160.
[2] Kumar, A. and Agarwal, A., 2016, November. Research issues related to cryptography algorithms and key generation for smart grid: A survey. In Power Electronics (IICPE), 2016 7th India International Conference on (pp. 1-5). IEEE.
[3] Ferrag, M.A., Maglaras, L.A., Janicke, H., Jiang, J. and Shu, L., 2018. A systematic review of data protection and privacy preservation schemes for smart grid communications. Sustainable Cities and Society, 38, pp.806-835.
[4] Chaudhary, S., Dave, M., Sanghi, A. and Manocha, J., 2016, March. An elucidation on steganography and cryptography. In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies (p. 43). ACM.
[5] Jiang, Y., Zhang, L., Tang, S. and Zhou, Z., 2013, August. Real-Time Covert VoIP Communications over Smart Grids by Using AES-Based Audio Steganography. In Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing (pp. 2102-2107). IEEE.
[6] Abood, O.G., Elsadd, M.A. and Guirguis, S.K.2017, December. Investigation of cryptography algorithms used for security and privacy protection in smart grid. In Power Systems Conference (MEPCON), 2017 Nineteenth International Middle East (pp. 644-649). IEEE.
[7] Abuadbba, A., Khalil, I., Ibaida, A. and Atiquzzaman, M., 2016. Resilient to shared spectrum noise scheme for protecting cognitive radio smart grid readings− BCH based steganographic approach. Ad Hoc Networks, 41, pp.30-46.
[8] Ghane, A.H. and Harsini, J.S., 2018. A network steganographic approach to overlay cognitive radio systems utilizing systematic coding. Physical Communication, 27, pp.63-73.
[9] Mouachi, R., Ait-Mlouk, A., Gharnati, F. and Raoufi, M., 2017. A Choice of Symmetric Cryptographic Algorithms based on Multi-Criteria Analysis Approach for Securing Smart Grid. Indian Journal of Science and Technology, 10(39).
[10] Neeta, D., Snehal, K. and Jacobs, D., 2006, December. Implementation of LSB steganography and its evaluation for various bits. In Digital Information Management, 2006 1st International Conference on (pp. 173-178). IEEE.
[11] Vincent, O.R. and Folorunso, O., 2009, June. A descriptive algorithm for sobel image edge detection. In Proceedings of Informing Science & IT Education Conference (InSITE) (Vol. 40, pp. 97-107). California: Informing Science Institute.
[12] Heron, S., 2009. Advanced encryption standard (AES). Network Security, 2009(12), pp.8-12.
[13] Bansod, G., Pisharoty, N. and Patil, A., 2016. PICO: An Ultra Lightweight and Low Power Encryption Design for Ubiquitous Computing. Defence Science Journal, 66(3).
[14] Chakraborty, S., Jalal, A.S. and Bhatnagar, C., 2017. LSB based non blind predictive edge adaptive image steganography. Multimedia Tools and Applications, 76(6), pp.7973-7987.