An Integration of Keyless Encryption, Steganography, and Artificial Intelligence for the Secure Transmission of Stego Images

Author(s):  
Digvijay Pandey ◽  
Vinay Kumar Nassa ◽  
Ayushi Jhamb ◽  
Dashrath Mahto ◽  
Binay Kumar Pandey ◽  
...  

Protected stored data as well as transfer in this virtual environment have been a significant thing since this world wide web has been used for information exchange. The need for data security rises as the level of personal data exchanged on the web is becoming more susceptible. To protect information from malicious use as well as alteration, services like confidential information but also data integrity have been needed. So many traditional cryptographic methods have been proposed by numerous studies throughout recent times to maintain multimedia data communicated over public networks. The chapter proposes a novel keyless picture encryption algorithm focused on a chaotic map. Almost every picture element is encoded by shuffling pixel values, which would be measured by an adapted cat map. In this suggested technique, steganography is used to transfer keyless encrypted information using a cover picture with encrypted information inserted in picture, audio, and video files.

2015 ◽  
Vol 75 (1) ◽  
Author(s):  
Ali Abdulgader Mohamed ◽  
Mahamod Ismail ◽  
Nasharuddin Zainal

With rapid growth in communication techniques and multimedia application, security is becoming more important for multimedia data storage or transmission. Traditional encryption algorithm such as Advance Encryption Standard (AES) and Data Encryption Standard (DES) are not suitable for video data because it caused large computational overhead and reduce the MPEG compression efficiency. The encryption algorithm that has less computation overhead is needed. The proposed algorithm combines encryption process with MPEG video compression. Some modifications of the RC4 algorithm were proposed in this paper to enhance the performance of video encryption algorithm in terms of encryption time, compression ratio and to provide accepted level of the security. The modification of the RC4 algorithm depends on the maximum value of the plain text, chaotic map and circular shift operation. This modification will reduce the number of iteration in the Key scheduling Algorithm (KSA) and make the Pseudo Random Generator Algorithm (PRGA) depend on initial condition of chaotic maps to provide the strong shuffling inside the PRGA. The random rotation technique based on chaotic map is proposed to increase security of MPEG video. This technique depends on the value generated from chaotic map to rotate the Y blocks in I frame. The experimental results indicate that the proposed method provided better encryption times and provides sufficient level of the security. Thus the proposed method is suitable to protect the MPEG video with minimizing the overhead. 


2000 ◽  
Vol 6 (1_suppl) ◽  
pp. 110-112 ◽  
Author(s):  
Nancy A Brown

The Telemedicine Information Exchange (TIE) has provided comprehensive telemedicine information on the World Wide Web (Web) since early 1995. It received major funding from the National Library of Medicine in 1997. Among other things, the TIE contains six major databases: literature citations; active telemedicine programmes; a ‘what's new in telemedicine’ column; funding opportunities; forthcoming conferences; and a list of vendors of telemedicine equipment and services. Recent additions include a document delivery service, inaugurated in early 1999. More than 1000 other Web sites link to the TIE, and we have 5000 visitors per month from several countries. Given its relative longevity on the Web, TIE researchers have been in a unique position to observe trends in telemedicine.


2002 ◽  
Vol 1804 (1) ◽  
pp. 151-161
Author(s):  
Wu Sun ◽  
David Bernstein

The Internet and the World Wide Web are used for a wide variety of transportation applications. Most of these applications use static HTML documents. However, outside of transportation, considerably more attention is being given to dynamic content and XML. A way in which these technologies can be used to provide transit timetable information on the web is explored. Specifically, the transit timetable system, an online interactive transit timetable information exchange and administration system that uses Java server pages and the transit timetable markup language, is described.


Author(s):  
Jane Klobas

Tim Berners-Lee, the inventor of the World Wide Web, envisioned it as a place where “people can communicate … by sharing their knowledge in a pool … putting their ideas in, as well as taking them out” (Berners- Lee, 1999). For much of its first decade, the Web was, however, primarily a place where the majority of people took ideas out rather than putting them in. This has changed. Many “social software” services now exist on the Web to facilitate social interaction, collaboration and information exchange. This article introduces wikis, jointly edited Web sites and Intranet resources that are accessed through web browsers. After a brief overview of wiki history, we explain wiki technology and philosophy, provide an overview of how wikis are being used for collaboration, and consider some of the issues associated with management of wikis before considering the future of wikis.


2020 ◽  
Vol 38 (3B) ◽  
pp. 98-103
Author(s):  
Atyaf S. Hamad ◽  
Alaa K. Farhan

This research presents a method of image encryption that has been designed based on the algorithm of complete shuffling, transformation of substitution box, and predicated image crypto-system. This proposed algorithm presents extra confusion in the first phase because of including an S-box based on using substitution by AES algorithm in encryption and its inverse in Decryption. In the second phase, shifting and rotation were used based on secrete key in each channel depending on the result from the chaotic map, 2D logistic map and the output was processed and used for the encryption algorithm. It is known from earlier studies that simple encryption of images based on the scheme of shuffling is insecure in the face of chosen cipher text attacks. Later, an extended algorithm has been projected. This algorithm performs well against chosen cipher text attacks. In addition, the proposed approach was analyzed for NPCR, UACI (Unified Average Changing Intensity), and Entropy analysis for determining its strength.


Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 535
Author(s):  
Karim H. Moussa ◽  
Ahmed I. El Naggary ◽  
Heba G. Mohamed

Multimedia wireless communications have rapidly developed over the years. Accordingly, an increasing demand for more secured media transmission is required to protect multimedia contents. Image encryption schemes have been proposed over the years, but the most secure and reliable schemes are those based on chaotic maps, due to the intrinsic features in such kinds of multimedia contents regarding the pixels’ high correlation and data handling capabilities. The novel proposed encryption algorithm introduced in this article is based on a 3D hopping chaotic map instead of fixed chaotic logistic maps. The non-linearity behavior of the proposed algorithm, in terms of both position permutation and value transformation, results in a more secured encryption algorithm due to its non-convergence, non-periodicity, and sensitivity to the applied initial conditions. Several statistical and analytical tests such as entropy, correlation, key sensitivity, key space, peak signal-to-noise ratio, noise attacks, number of pixels changing rate (NPCR), unified average change intensity randomness (UACI), and others tests were applied to measure the strength of the proposed encryption scheme. The obtained results prove that the proposed scheme is very robust against different cryptography attacks compared to similar encryption schemes.


Sign in / Sign up

Export Citation Format

Share Document