Open Access   Article Go Back

A Proposed Algorithm to Reinforce the Security of Steganograpy in conjunction with Cryptography to Assure Privacy and Integrity of the Communication by using Native OS Batch Programming Technique

J. Sebastian Nixon1 , Mesele Gebre Awgichew2 , Akalu Assefa Afaro3 , Fisaha Solomon4 , Paulos Bogale Wada5 , Fevan Tafari6

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 1805-1819, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.18051819

Online published on May 31, 2019

Copyright © J. Sebastian Nixon, Mesele Gebre Awgichew, Akalu Assefa Afaro, Fisaha Solomon, Paulos Bogale Wada, Fevan Tafari . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: J. Sebastian Nixon, Mesele Gebre Awgichew, Akalu Assefa Afaro, Fisaha Solomon, Paulos Bogale Wada, Fevan Tafari, “A Proposed Algorithm to Reinforce the Security of Steganograpy in conjunction with Cryptography to Assure Privacy and Integrity of the Communication by using Native OS Batch Programming Technique,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1805-1819, 2019.

MLA Style Citation: J. Sebastian Nixon, Mesele Gebre Awgichew, Akalu Assefa Afaro, Fisaha Solomon, Paulos Bogale Wada, Fevan Tafari "A Proposed Algorithm to Reinforce the Security of Steganograpy in conjunction with Cryptography to Assure Privacy and Integrity of the Communication by using Native OS Batch Programming Technique." International Journal of Computer Sciences and Engineering 7.5 (2019): 1805-1819.

APA Style Citation: J. Sebastian Nixon, Mesele Gebre Awgichew, Akalu Assefa Afaro, Fisaha Solomon, Paulos Bogale Wada, Fevan Tafari, (2019). A Proposed Algorithm to Reinforce the Security of Steganograpy in conjunction with Cryptography to Assure Privacy and Integrity of the Communication by using Native OS Batch Programming Technique. International Journal of Computer Sciences and Engineering, 7(5), 1805-1819.

BibTex Style Citation:
@article{Nixon_2019,
author = {J. Sebastian Nixon, Mesele Gebre Awgichew, Akalu Assefa Afaro, Fisaha Solomon, Paulos Bogale Wada, Fevan Tafari},
title = {A Proposed Algorithm to Reinforce the Security of Steganograpy in conjunction with Cryptography to Assure Privacy and Integrity of the Communication by using Native OS Batch Programming Technique},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {1805-1819},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4490},
doi = {https://doi.org/10.26438/ijcse/v7i5.18051819}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.18051819}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4490
TI - A Proposed Algorithm to Reinforce the Security of Steganograpy in conjunction with Cryptography to Assure Privacy and Integrity of the Communication by using Native OS Batch Programming Technique
T2 - International Journal of Computer Sciences and Engineering
AU - J. Sebastian Nixon, Mesele Gebre Awgichew, Akalu Assefa Afaro, Fisaha Solomon, Paulos Bogale Wada, Fevan Tafari
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 1805-1819
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
389 237 downloads 152 downloads
  
  
           

Abstract

This present digital world is made up of both secure and insecure data communication. So, it is imperative to secure our data from adversaries. To protect our data while communications, lots of mechanisms are there, but still some vulnerability exists. Steganography is one of the security techniques where we can hide our data inside different mediums like video, image, and audio files. There are also some vulnerable exists. Since it hides the data in the least significant bit [LSB], attacks could be performed easily if the adversary knows some data concealed in the object. In this research, we proposed a new multi-layered security algorithm to reinforce security of steganography along with Cryptography to ensure the privacy and integrity of the data by using the native Operating System batch programming. In this Algorithm, we used several encryption techniques with many undercover keys, did ASCII to Binary conversions, exchange of symbols and Hash function. This Proposed mechanism reinforced the security of steganography by ensuring confidentiality and integrity. It would be a big challenge for the adversary. In this research, we used our coding to perform Steganography and to produce the hash code.

Key-Words / Index Term

Steganography, Cryptography, Hash function, Plain Text, Cipher Text, LSB, Pixel, Undercover key, Operating System [OS], SHA512

References

[1] Bani Younes, M. A., & Jantan, A.,”Image encrytion using block based transformation Algorithm”,International journal of computer sciences,35:1,IJCS _35_1_03. pp(407- 415), 2008
[2] Moreland, T, ‘Steganography and Steganalysis’, Leiden Institute of Advanced Computing Science, 2003.
[3] Morkel, T., Eloff, J. H., and Olivier, M. S, “An overview of image steganography”, In ISSA, pp.1-11, 2005.
[4] Sheth, R. K., & Tank, R. M.,”Image Steganography Techniques “, International Journal Of Computer Engineering And Sciences, 1(2), 10-15, (2015).
[5] R. Indrayani, H. A. Nugroho, R. Hidayat, and I. Pratama, “Increasing the security of MP3 steganography using AES Encryption and MD5 hash function,” in Proceedings - 2016 2nd International Conference on Science and Technology-Computer, ICST 2016, 2017, pp. 129–132.
[6] Uzair Nisar1*, Craig Stewart2 , Implementation of Email System With Steganography”, International Journal of Computer Sciences and Engineering , EISSN: 2347-2693, Vol-3, issue 1, Dec 2019.
[7] Robbi Rahim1*, Heri Nurdiyanto, “Combination Base64 Algorithm and EOF Technique for Steganography”, IOP Conf. Series: Journal of Physics: Conf. Series 1007 (2018) 012003 doi :10.1088/1742-6596/1007/1/012003
[8] S. M. Masud Karim, M. S. Rahman, and M. I. Hossain, “A new approach for LSB based image steganography using undercover key,” in 14th International Conference on Computer and Information Technology, ICCIT 2011, 2011, pp. 286–291.
[9] Hajduk, V., Broda, M., Kováč, O., & Levický, D. (2016, April). Image steganography with using QR code and cryptography. In Radioelektronika (RADIOELEKTRONIKA), 2016 26th International Conference (pp. 350-353). IEEE.
[10] M. Juneja and P. S. Sandhu, “Designing of robust image steganography technique based on LSB insertion and encryption,” in ARTCom 2009 - International Conference on Advances in Recent Technologies in Communication and Computing, 2009, pp. 302–305.
[11] Puja Mahajan, Prajakta Nimbalkar and Prtiksha Pawar,‖ Improved FPGA base X-Box Mapping of an image using Steganography Technique‖, International Journal of computer Application (0975-8887), 2016
[12] Dey, A. S., Nath, B. J., & Nath, C. A. (2012, January). A New Technique to Hide Encrypted Data in QR Codes (TM). In Proceedings on the International Conference on Internet Computing (ICOMP) (p. 1). The Steering committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
[13] Sharma, S., & Sejwar, V. (2016). QR Code Steganography for Multiple Image and Text Hiding using Improved RSA-3DWT Algorithm. International Journal of Security and Its Applications, 10(7), 393-406.
[14] K. Nandhini, B. Gomathi, “ Implementation of LSB Based Steganography Algorithms in FPGA”, Int. J. Sc. Res. in Network Security and Communication, ISSN: 2321-3256, Volume-6, Issue-5, June 2017.
[15] G. Hamed, M. Marey, S. A. El-Sayed, and M. F. Tolba, “Hybrid technique for steganography-based on DNA with n-bits binary coding rule,” in Proceedings of the 2015 7th International Conference of Soft Computing and Pattern Recognition, SoCPaR 2015, 2016, pp. 95–102.