A novel combination of information hiding and confidentiality scheme

  • PDF / 2,653,375 Bytes
  • 23 Pages / 439.37 x 666.142 pts Page_size
  • 22 Downloads / 193 Views

DOWNLOAD

REPORT


A novel combination of information hiding and confidentiality scheme Majid Khan 1,2

3

& Sajjad Shaukat Jamal & Umer Aziz Waqas

4

Received: 27 May 2019 / Revised: 6 August 2020 / Accepted: 12 August 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract

Due to exponential technological advancement, secure transmission of multimedia content is a serious challenge. These days, securing and hiding digital information most efficiently is the focus of the digital computer world. Information confidentiality and information hiding namely steganography, are the most promising techniques that can protect digital information. In this paper, a combination of encryption and steganography is used efficiently to have a double level of security to achieve confidentiality, privacy, secrecy in addition to integrity and authentication. Firstly, encryption parameters are set by using a chaotic Lorenz system (CLS), then by using CLS encryption parameter encryption is performed on the secret image. This enciphered confidential digital medium is inserted in the cover image by using the least significant bits (LSBs) steganographic scheme. Due to the double level of security, it is hard for an eavesdropper to attack the proposed scheme. All experimental and simulation results verify the efficiency of the proposed information hiding scheme. Keywords Chaotic Lorenz system . Information confidentiality . Information hiding

1 Introduction The use of digital content spread in limitless skies of online internet services. This spreading of digital content over social media and other online services made our lives so easy and portable. However, it is in a general law of nature every simplicity creates a large-scale difficulty in long runs. It happened in the digital world. The copying of digital content is one of the issues, which

* Majid Khan [email protected]

1

Cyber and Information Security Laboratory, Institute of Space Technology, Islamabad, Pakistan

2

Department of Applied Mathematics & Statistics, Institute of Space Technology, Islamabad, Pakistan

3

Department of Mathematics, College of Science, King Khalid University, Abha, Saudi Arabia

4

Department of Electrical Engineering, Institute of Space Technology, Islamabad, Pakistan

Multimedia Tools and Applications

belongs to the intellectual property of any individual. The intellectual property of any single person is not safe even after a human being laid down his feet at the moon. To secure digital information, researchers developed different information hiding techniques, which include cryptography, digital watermarking, and steganography. Cryptography is used to provide confidentiality by encrypting the digital data in an unintelligent layout. The fundamental variance between cryptography and steganography is that cryptography hides the actual contents of digital information, whereas information hiding techniques mainly to protect the secret information in some carrier medium. When digital information passes through any encryption technique, it