METHOD OF THE ADAPTIVE MULTILAYER INFORMATION PROTECTION ON THE BASIS OF STEGANOGRAPHY AND CRYPTOGRAPHY

Authors

  • Vitalii Lukichov Vinnytsia National Technical University, Vinnytsia
  • Yurii Baryshev Vinnytsia National Technical University, Vinnytsia
  • Natalia Kondratenko Vinnytsia National Technical University, Vinnytsia
  • Vadym Malinovskyi Vinnytsia National Technical University, Vinnytsia

DOI:

https://doi.org/10.31649/1999-9941-2023-58-3-4-11

Keywords:

steganography, cryptography, cyber security, critical systems, metrics

Abstract

An analysis of known solutions to the problem of steganographic and cryptographic methods combining to achieve multilayer information protection is presented. Results of the analysis allowed us to identify trends and prospects for the development of these kink of methods. Based on the results of the analysis, the research task was determined concerning the adaptation of the used cryptographic and steganographic methods in order to achieve the best level of protection, which is needed at critical systems. Metrics were defined, those allowed to choose the best combination of cryptographic and steganographic protection methods parameters. A method of multilayered information protection is presented, which combines cryptographic and steganographic approaches to ensure an increased level of information’s confidentiality and integrity protection. It is proposed to introduce criteria for the selection of cryptographic transformations in such a way that their combination together with steganographic transformations gives the best impact. An instance of the proposed method implementation is given in order to prove the concept. An algorithm has been developed that implements the proposed method of adaptive multilayer information protection. The perspective of further research is determined.

Author Biographies

Vitalii Lukichov, Vinnytsia National Technical University, Vinnytsia

к. т. н., доцент кафедри захисту інформації Вінницького національного технічного університету, м. Вінниця

Yurii Baryshev, Vinnytsia National Technical University, Vinnytsia

к. т. н., доцент кафедри захисту інформації Вінницького національного технічного університету, м. Вінниця

Natalia Kondratenko, Vinnytsia National Technical University, Vinnytsia

к. т. н., професор кафедри захисту інформації Вінницького національного технічного університету, м. Вінниця

Vadym Malinovskyi, Vinnytsia National Technical University, Vinnytsia

к. т. н., доцент кафедри захисту інформації Вінницького національного технічного університету, м. Вінниця

References

Shifa, A., Afgan, M. S., Asghar, M. N., Fleury, M., Memon, I., Abdullah, S., Rasheed, N. “Joint Crypto-Stego Scheme for Enhanced Image Protection With Nearest-Centroid Clustering” IEEE Access, vol. 6, 2018. pp. 16189-16206, 2018, doi: 10.1109/ACCESS.2018.2815037.

Bandela, H. B., Babu, M. G., Venkata, D., Deepthi, V. “Crypto-Stego Technique for Secure Data Transmission.” Journal of Physics: Conference Series. 1228, 012012, 2019. 11 p. doi:10.1088/1742-6596/1228/1/012012.

Kerckhoffs, A. “La cryptographie militaire” Journal des sciences militaires IX: 5–38, 1883. pp. 161–191. http://www.petitcolas.net/fabien/kerckhoffs/

Almomani, I., Alkhayer, A., El-Shafai, W. A. “Crypto-Steganography Approach for Hiding Ransom-ware within HEVC Streams in Android IoT Devices.” Sensors, 22(6), 2281. 2022. https://doi.org/10.3390/s22062281

Abikoye, O. C., Adewole, K. S., Oladipupo, A. J. “Efficient Data Hiding System using Cryptography and Steganography.” International Journal of Applied Information Systems. Volume 4– No.11. 2012. pp. 6-11. doi: 10.5120/ijais12-450763.

Jan, A., Parah, S.A., Hussan, M., Malik, B. A. “Double layer security using crypto-stego techniques: a comprehensive review.” Health and Technology. 12, 2022. pp. 9–31. https://doi.org/10.1007/s12553-021-00602-1

Rasras, R. J., AlQadi, Z. A., Sara, M. R. A. A “Methodology Based on Steganography and Cryptog-raphy to Protect Highly Secure Messages.” Engineering, Technology & Applied Science Research, 9(1), 2019. pp. 3681–3684. https://doi.org/10.48084/etasr.2380

Singhal, V., Singh, D., & Gupta S. K. “Crypto STEGO Techniques to Secure Data Storage Using DES, DCT, Blowfish and LSB Encryption Algorithms.” Journal of Algebraic Statistics.Volume 13, No. 3, 2022. p. 1162-117. https://www.publishoa.com/index.php/journal/article/view/734/624

Kara, O., Manap, C. “A New Class of Weak Keys for Blowfish. In: Biryukov, A. (eds) Fast Software Encryption.” Lecture Notes in Computer Science, vol 4593. 2007. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74619-5_11

Biham, E., Shamir, A. “Differential cryptanalysis of DES-like cryptosystems.” Journal of Cryptology 4, 1991. pp. 3–72. https://doi.org/10.1007/BF00630563

Biham, E., Perle, S. “Conditional Linear Cryptanalysis - Cryptanalysis of DES with Less Than 242 Complexity” IACR Trans. Symmetric Cryptol., 2018, pp. 215-264.

Mawla, N. A., Khafaji, H. K. “Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography” Computers, 12(8), 166. 2023. https://doi.org/10.3390/computers12080166

Pointy Castle. URL: https://github.com/bcgit/pc-dart

References

Shifa, A., Afgan, M. S., Asghar, M. N., Fleury, M., Memon, I., Abdullah, S., & Rasheed, N. (2018). Joint Crypto-Stego Scheme for Enhanced Image Protection With Nearest-Centroid Clustering, IEEE Access, vol. 6, pp. 16189-16206, 2018, doi: 10.1109/ACCESS.2018.2815037.

Bandela, H. B., Babu, M. G., Venkata, D., Deepthi, V. (2019) Crypto-Stego Technique for Secure Data Transmission. Journal of Physics: Conference Series. 1228, 012012. 11 p. doi:10.1088/1742-6596/1228/1/012012.

Kerckhoffs, A. (1883). La cryptographie militaire. Journal des sciences militaires IX: 5–38, 161–191. http://www.petitcolas.net/fabien/kerckhoffs/ [in French]

Almomani, I.; Alkhayer, A.; El-Shafai, W. A. (2022). Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices. Sensors, 22(6), 2281. https://doi.org/10.3390/s22062281

Abikoye, O. C., Adewole, K. S., Oladipupo, A. J. (2012). Efficient Data Hiding System using Cryptography and Steganography. International Journal of Applied Information Systems. Volume 4– No.11. pp. 6-11. doi: 10.5120/ijais12-450763.

Jan, A., Parah, S.A., Hussan, M., & Malik, B. A. (2022). Double layer security using crypto-stego techniques: a comprehensive review. Health and Technology. 12, pp. 9–31. https://doi.org/10.1007/s12553-021-00602-1

Rasras, R. J., AlQadi, Z. A., & Sara, M. R. A. (2019). A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages. Engineering, Technology & Applied Science Research, 9(1), pp. 3681–3684. https://doi.org/10.48084/etasr.2380

Singhal, V., Singh, D., & Gupta S. K., (2022). Crypto STEGO Techniques to Secure Data Storage Using DES, DCT, Blowfish and LSB Encryption Algorithms. Journal of Algebraic Statistics.Volume 13, No. 3, p. 1162-117. https://www.publishoa.com/index.php/journal/article/view/734/624

Kara, O., Manap, C. (2007). A New Class of Weak Keys for Blowfish. In: Biryukov, A. (eds) Fast Software Encryption. FSE 2007. Lecture Notes in Computer Science, vol 4593. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74619-5_11

Biham, E., Shamir, A. (1991) Differential cryptanalysis of DES-like cryptosystems. Journal of Cryptology 4, pp. 3–72. https://doi.org/10.1007/BF00630563

Biham, E., & Perle, S. (2018). Conditional Linear Cryptanalysis - Cryptanalysis of DES with Less Than 242 Complexity. IACR Trans. Symmetric Cryptol., 2018, pp. 215-264.

Mawla, N. A., Khafaji, H. K (2023). Enhancing Data Security: A Cutting-Edge Approach Utilizing Protein Chains in Cryptography and Steganography. Computers, 12(8), 166. https://doi.org/10.3390/computers12080166

Pointy Castle. URL: https://github.com/bcgit/pc-dart

Downloads

Abstract views: 195

Published

2023-12-29

How to Cite

[1]
V. Lukichov, Y. Baryshev, N. Kondratenko, and V. . Malinovskyi, “METHOD OF THE ADAPTIVE MULTILAYER INFORMATION PROTECTION ON THE BASIS OF STEGANOGRAPHY AND CRYPTOGRAPHY”, ІТКІ, vol. 58, no. 3, pp. 4–11, Dec. 2023.

Issue

Section

Information technology and coding theory

Metrics

Downloads

Download data is not yet available.