Enhancing Secure Communication Through Hybrid Steganography and Public Key Cryptography

Authors

  • Ushaa Eswaran Principal and Professor, Department of Electrical Communication Engineering, Indira Institute of Technology and Sciences, Markapur, Andhra Pradesh, India
  • Vivek Eswaran Senior Software Engineer, Tech Lead at Medallia, Austin, Texas, United States
  • Keerthna Murali Secure Connection: Cybersecurity, Site Reliability Engineer II (SRE) at Dell EMC, CKAD, AWS CSAA, Austin, Texas, United States
  • Vishal Eswaran Senior Data Engineer at CVS Health Centre, Dallas, Texas, United States

Keywords:

Public Key Cryptography, RSA Algorithm, Digital Image Steganography, F5 Steganographic Technique, Matrix Embedding, Secure Data Communication, Steganographic Capacity, Processing Speed, Robustness

Abstract

This research pioneers an innovative paradigm in secure data communication by seamlessly merging Public Key Digital Image Steganography with public key cryptography. The proposed method leverages the formidable strength of the RSA algorithm, employing a robust 1024-bit key size for secure data encryption. In parallel, the imperceptibility of the F5 steganographic technique is harnessed to clandestinely embed the encrypted message within a cover image. Unlike conventional methods, our scheme introduces matrix embedding, a technique that minimizes alterations to the message length while providing unparalleled steganographic capacity, expedited processing, and resilience against both visual and statistical attacks. The RSA algorithm, with its robust 1024-bit key size, forms the bedrock of our cryptographic framework. This asymmetric encryption technique not only facilitates secure data transmission through robust key exchange but also ensures the confidentiality of the concealed message. Simultaneously, the F5 steganographic technique is employed to achieve imperceptible embedding, seamlessly integrating the encrypted message within the cover image without compromising visual integrity. In a departure from traditional approaches, our scheme introduces matrix embedding, a novel technique that optimizes the concealment process. This innovative method minimizes changes to the message length, thereby preserving the integrity of the concealed information. The result is a system characterized by high steganographic capacity, expedited processing speed, and a robust defense against both visual and statistical attacks. The experimental validation of our proposed method encompasses a thorough assessment of steganographic capacity, processing speed, and robustness. The results not only endorse the effectiveness of the RSA-F5-matrix embedding hybrid but also underscore its practical viability. The scheme emerges as a robust solution for secure data communication, offering a delicate balance between security, efficiency, and concealment integrity.

References

Inam S, Kanwal S, Zahid A, Abid M. A novel public key cryptosystem and digital signatures. Eur J Eng Sci Technol. 2020; 3(1): 22–30.

Westfeld A. F5—a steganographic algorithm: High capacity despite better steganalysis. In International workshop on information hiding. Berlin, Heidelberg: Springer; 2001 Apr 25; 289–302.

Sedighi V, Cogranne R, Fridrich J. Content-adaptive steganography by minimizing statistical detectability. IEEE Trans Inf Forensics Secur. 2015 Oct 5; 11(2): 221–34.

Lyu S, Farid H. Steganalysis using color wavelet statistics and one-class support vector machines. In Security, steganography, and watermarking of multimedia contents VI. 2004 Jun 22; 5306: 35–45. SPIE.

Hassaballah M, editor. Digital media steganography: principles, algorithms, and advances. Academic Press; 2020 Jun 27.

Hussain M, Wahab AW, Idris YI, Ho AT, Jung KH. Image steganography in spatial domain: A survey. Signal Process: Image Commun. 2018 Jul 1; 65: 46–66.

Eze PU, Parampalli U, Evans RJ, Liu D. Spread spectrum steganographic capacity improvement for medical image security in teleradiology. In 2018 IEEE 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC). 2018 Jul 18; 1–4.

Al-Dazdaae SK. Image Steganography by LSB Substitution and Optimal Key Permutation Using Genetic Algorithm. Master's thesis. Cyprus: Eastern Mediterranean University (EMU)-Doğu Akdeniz Üniversitesi (DAÜ); 2017.

Schneier B. Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons; 2007.

Menezes AJ, Van Oorschot PC, Vanstone SA. Handbook of applied cryptography. CRC press; Florida, United States. 2018 Dec 7.

Shih FY. Digital watermarking and steganography: fundamentals and techniques. CRC press; 2017 Apr 10.

Provos N, Honeyman P. Hide and seek: An introduction to steganography. IEEE Secur Priv. 2003 Jun 11; 1(3): 32–44.

Kessler GC. (2004). Steganography for the computer forensics examiner. [Online]. Forensic Focus. Accessed: May 2015 Feb; 26.

Published

2024-01-31