Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm
The steganography is a graceful tactic to convey the confidential information to an authorized recipient with the most reliable safety measure which leads to avoiding the breaches of data security. Nowadays the significance of taking strong protection measures in data communication medium has a chal...
Gespeichert in:
Veröffentlicht in: | Multimedia tools and applications 2020-02, Vol.79 (5-6), p.3975-3991 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The steganography is a graceful tactic to convey the confidential information to an authorized recipient with the most reliable safety measure which leads to avoiding the breaches of data security. Nowadays the significance of taking strong protection measures in data communication medium has a challenging task because of the security related issues which are developed by unauthorized intervention. This presentation intends to provide a new approach based on a combination of Steganography and Cryptography procedure for inserting the hidden data into a cover object and obtain high data embedding capacity with an improved security level. In this approach, the Elliptic Curve Cryptography algorithm is used to encrypt the hidden information and the encrypted data inserted into a cover object by the process of the LSB Inversion algorithm. This blend of technology has successfully reached the benchmark level of some essential properties known as data confidentiality, integrity verification, capacity and robustness which are the evidence to prove the excellent performance and effective implementation of this steganography process. This new approach intensely tested through several steganalysis attacks such as analysis of visual, histogram, and chi-square. The outcome of the experimental result shown that the stego image has delivered the strong opposition force against all attacks. The data embedding capacity has attained at an improved level compared with typical methods. |
---|---|
ISSN: | 1380-7501 1573-7721 |
DOI: | 10.1007/s11042-019-7584-6 |