scholarly journals Secure Group Message Transfer Stegosystem

Cryptography ◽  
2020 ◽  
pp. 373-390
Author(s):  
Mahinder Pal Singh Bhatia ◽  
Manjot Kaur Bhatia ◽  
Sunil Kumar Muttoo

Grid environment is a virtual organization with varied resources from different administrative domains; it raises the requirement of a secure and reliable protocol for secure communication among various users and servers. The protocol should guarantee that an attacker or an unidentified resource will not breach or forward the information. For secure communication among members of a grid group, an authenticated message transferring system should be implemented. The key objective of this system is to provide a secure transferring path between a sender and its authenticated group members. In recent times, many researchers have proposed various steganographic techniques for secure message communications. This paper proposes a new secure message broadcasting system to hide the messages in such a way that an attacker cannot sense the existence of messages. In the proposed system, the authors use steganography and image encryption to hide group keys and secret messages using group keys in images for secure message broadcasting. The proposed system can withstand against conspiracy attack, message modification attack and various other security attacks. Thus, the proposed system is secure and reliable for message broadcasting.

2015 ◽  
Vol 9 (4) ◽  
pp. 59-76
Author(s):  
Mahinder Pal Singh Bhatia ◽  
Manjot Kaur Bhatia ◽  
Sunil Kumar Muttoo

Grid environment is a virtual organization with varied resources from different administrative domains; it raises the requirement of a secure and reliable protocol for secure communication among various users and servers. The protocol should guarantee that an attacker or an unidentified resource will not breach or forward the information. For secure communication among members of a grid group, an authenticated message transferring system should be implemented. The key objective of this system is to provide a secure transferring path between a sender and its authenticated group members. In recent times, many researchers have proposed various steganographic techniques for secure message communications. This paper proposes a new secure message broadcasting system to hide the messages in such a way that an attacker cannot sense the existence of messages. In the proposed system, the authors use steganography and image encryption to hide group keys and secret messages using group keys in images for secure message broadcasting. The proposed system can withstand against conspiracy attack, message modification attack and various other security attacks. Thus, the proposed system is secure and reliable for message broadcasting.


Author(s):  
Padmapriya Praveenkumar ◽  
G. Dhanalakshmi ◽  
K. Thenmozhi ◽  
J.B.B. Rayappan ◽  
Rengarajan Amirtharajan

2018 ◽  
Vol 2018 ◽  
pp. 1-13 ◽  
Author(s):  
Guangya Peng ◽  
Fuhong Min ◽  
Enrong Wang

The four-wing memristive chaotic system used in synchronization is applied to secure communication which can increase the difficulty of deciphering effectively and enhance the security of information. In this paper, a novel four-wing memristive chaotic system with an active cubic flux-controlled memristor is proposed based on a Lorenz-like circuit. Dynamical behaviors of the memristive system are illustrated in terms of Lyapunov exponents, bifurcation diagrams, coexistence Poincaré maps, coexistence phase diagrams, and attraction basins. Besides, the modular equivalent circuit of four-wing memristive system is designed and the corresponding results are observed to verify its accuracy and rationality. A nonlinear synchronization controller with exponential function is devised to realize synchronization of the coexistence of multiple attractors, and the synchronization control scheme is applied to image encryption to improve secret key space. More interestingly, considering different influence of multistability on encryption, the appropriate key is achieved to enhance the antideciphering ability.


2019 ◽  
Vol 8 (3) ◽  
pp. 4481-4484

Image encryption has proven a successful method to communicate the confidential information. Some of the images may or may not be confidential. So there is a need to secure the confidential images. Initially, symmetric encryption is used for security purpose. But it has the problem that if the key is revealed the interceptors can immediately decode it. To make the key transformation more secure, asymmetric encryption is introduced. In this two different keys are used for encoding and decoding. So even the interceptors hacked the key it cannot be possible to decode. In this project Elliptic Curve Cryptography (ECC) is utilized for generating the keys and the cross chaotic map used for generating the chaotic sequence. These chaotic sequences are utilized to encode the image for secure communication.


PLoS ONE ◽  
2020 ◽  
Vol 15 (11) ◽  
pp. e0242110
Author(s):  
Dejian Fang ◽  
Shuliang Sun

Image encryption is an effective method for protecting private images during communication. In this paper, a novel image encryption method is proposed based on a 5D hyperchaotic system. Since a 5D hyperchaotic system can generate more complex dynamic behavior than a low-dimensional system, it is used in this paper to generate pseudorandom number sequences. The generated sequences are processed to obtain new sequences. The randomness of the new sequences is improved by recombination and rearrangement. The experimental results and theoretical analysis show that the method possesses a large key space and can resist differential attacks, statistical analysis, entropy analysis, clipping attacks and noise attacks. Therefore, it is very secure and can be used for secure communication.


Sign in / Sign up

Export Citation Format

Share Document