Please use this identifier to cite or link to this item: https://ptsldigital.ukm.my/jspui/handle/123456789/513426
Title: A multi layer security method for image and key steganography
Authors: Samar Kamil Khudhair (P88051)
Supervisor: Siti Norul Huda Sheikh Abdullah, Assoc. Prof. Dr.
Keywords: Universiti Kebangsaan Malaysia -- Dissertations
Dissertations, Academic -- Malaysia
Steganography algorithms
Computer security
Issue Date: 23-Sep-2021
Description: Steganography algorithms hide the secret data into cover media, and its challenge is to provide confidentiality. Thus, combined cryptography and steganography algorithms able to provide multi-layer security. Although lightweight cryptography consumes better memory consumption, it does not improve authentication and the long encryption time of the data encryption. The embedding capacity, security, visual quality are three basics successful factors of multi-layer security. Upon compromising the above factors, such as high embedding capacity and security with better visual quality, preferable data hiding algorithms use optimization algorithms for handling variability issues in steganography. Yet, those methods affect embedding capacity adversely. Additionally, the available key wrapping methods such as DNA, puzzle, and histogram shifting techniques, are less secure because it provides reference information needs to communicate with the receiver. Such optimal mechanisms are vital for improving authentication and key wrapping techniques to better security, plus low variability in the data hiding technique for better performance. Therefore, the main aim is to design lightweight multi-layer security that secure data and keys using hybridization of cryptography and steganography. Three objectives are to 1) To increase the security of lightweight cryptography method with less encryption time using encryptionauthentication scheme and one-time padding (OTP) key for the first layer in multi-layer security method, 2) To design a new data hiding method based on the spatial domain that embeds higher capacity and reduces the variability between the cover and stego image for the second layer in multi-layer security method, and 3) To design a secure key wrapping method based on the puzzle that hides the random key and OTP key used for data encryption in the cover image without communicating the reference information with the receiver for the third layer in multi-layer security method. In the first layer, secret data, OTP key, and random key are inputted to the proposed BORON lightweight algorithm. It generates the encrypted data and authentication tag, which simultaneously improves its security level. The cover image, encrypted data, and authentication tags in the second layer use the proposed flipping method. This method hides the data using the k-bits LSB technique in the cover image blue plane and adjusts the adjacent pixel bit that reduces variability. In the third layer, cover image, random key, and OTP key are the input of the proposed key wrapping algorithm with the employment of a nonogram puzzle; finally, it generates the stego image. The proposed methods are implemented on the standard dataset images taken from a USC-SIPI image database. The proposed methods are implemented on the standard dataset images taken from a USC-SIPI image dataset. The experimental results demonstrate that the proposed methods significantly increase the embedding capacity to 524288 bits, maintains the visual image quality to 52.78 dB, and reducing variability by 0.32. Hence, the proposed multilayer security complies with authentication with less variability and high embedding capacity. It also hides keys randomly without communicating any reference information with the receiver.,Ph.D
Pages: 235
Publisher: UKM, Bangi
Appears in Collections:Faculty of Information Science and Technology / Fakulti Teknologi dan Sains Maklumat

Files in This Item:
File Description SizeFormat 
ukmvital_130613+Source01+Source010.PDF
  Restricted Access
8.17 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.