A Secure Fusion: Elliptic Curve Encryption Integrated with LSB Steganography for Hidden Communication

Authors

  • Homam El-Taj Dar Al-Hekma University

DOI:

https://doi.org/10.22399/ijcesen.382

Keywords:

Elliptic Curve Cryptography, LSB Steganography, Secure Communication, Hidden Communication, Image Steganography

Abstract

In today's digital age, ensuring secure communication is essential. This article presents a novel approach for hidden communication by integrating Elliptic Curve Encryption (ECE) with Least Significant Bit (LSB) Steganography.

Our proposed fusion offers a robust solution, Stegno Curve for concealing sensitive information within innocuous cover media while encrypting it using elliptic curve cryptography. By leveraging the strengths of both techniques, we achieve enhanced security and confidentiality in data transmission.

Through a comprehensive literature review, methodology explanation, security analysis, and implementation details, we demonstrate the feasibility and effectiveness of the Stegno Curve Method. The findings of this study not only contribute to advancing the field of secure communication but also open avenues for practical applications in various domains, such as secure cloud transitions, smart home technologies, and data encryption.    

References

Jan, A., Parah, S.A., Hussan, M. et al. (2022). Double layer security using crypto-stego techniques: a comprehensive review. Health Technol. 12; 9–31. https://doi.org/10.1007/s12553-021-00602-1

Evaluating the Merits and Constraints of Cryptography-Steganography Fusion: A Systematic Analysis [Internet]. www.researchsquare.com. 2023 [cited 2024 Feb 11]. Available from: https://www.researchsquare.com/article/rs-3167378/v1

Menezes, A.J., Vanstone, S.A. (1993). Elliptic curve cryptosystems and their implementation. J. Cryptology 6; 209–224. https://doi.org/10.1007/BF00203817

Kakunuri Sandya and Subhadra Kompella, (2022). A Combined Approach of Steganography and Cryptography with Generative Adversarial Networks: Survey. Lecture notes in networks and systems, pp. 187–196, doi: https://doi.org/10.1007/978-981-19-4863-3_18.

Alanzy M, Alomrani R, Alqarni B, Almutairi S. (2023). Image Steganography Using LSB and Hybrid Encryption Algorithms. Applied Sciences [Internet]. 1;13(21):11771. Available from: https://www.mdpi.com/2076-3417/13/21/11771

McAteer I, Ibrahim A, Zheng G, Yang W, Valli C. (2019). Integration of Biometrics and Steganography: A Comprehensive Review. Technologies [Internet]. 8;7(2):34. Available from: https://www.mdpi.com/2227-7080/7/2/34

G. G, C. Ashwin, B. V. P, A. A and A. Hiremath, (2021). Enhanced Data Encryption in IOT using ECC Cryptography and LSB Steganography. International Conference on Design Innovations for 3Cs Compute Communicate Control (ICDI3C), Bangalore, India, pp. 173-177, doi: 10.1109/ICDI3C53598.2021.00043.

Budianto, Christofer & Wicaksana, Arya & Hansun, Seng, (2020). Elliptic Curve Cryptography and LSB Steganography for Securing Identity Data. Available: https://www.researchgate.net/publication/335329077_Elliptic_Curve_Cryptography_and_LSB_Steganography_for_Securing_Identity_Data

Varghese, Fredy and P. Sasikala. (2023). Secure Data Transmission Using Optimized Cryptography and Steganography Using Syndrome-Trellis Coding. Wireless Personal Communications 130;551-578.

G. Shilpa, Mohan CM, Chaurasia N. (2023). Image steganography using LSB embedding and edge adaptive approach. AIP Conference Proceedings

R. Bansal and N. Badal, (2022). A novel approach for dual layer security of message using Steganography and Cryptography. Multimedia Tools and Applications, 81(15);20669–20684, doi: https://doi.org/10.1007/s11042-022-12084-y.

Zachariah, Babangida & Yabuwat, Patience & Bernard, Ephraim, (2016). Application of Steganography and Cryptography for Secured Data Communication – A Review,” International Journal of Engineering Research & Technology (IJERT), doi: https://www.researchgate.net/publication/306254107_Application_of_Steganography_and_Cryptography_for_Secured_Data_Communication_-_A_Review

Dhivya C, Sharmila G, Keerthanadevi S, Gangalakshmi S. Steganography (2018). A Technique to Hide the Information using LSB Algorithm [Internet]. SSRG International Journal of Ceramic Technology (SSRG-IJCT) -Special Issue. 2018 [cited 2024 Feb 10]. Available from: https://www.internationaljournalssrg.org/uploads/specialissuepdf/ICRMIT/2018/CSE/IJCSE-ICRMIT-P103.pdf

Ahmed DEM, Khalifa OO. (2014). Robust and Secure Image Steganography Based on Elliptic Curve Cryptography [Internet]. IEEE Xplore. 288–91. https://ieeexplore.ieee.org/document/7031659

Kheddar H, Hemis M, Himeur Y, Megías D, Amira A. (2023). Deep Learning for Diverse Data Types Steganalysis: A Review arXiv.org. https://arxiv.org/abs/2308.04522

Dhivya C, Sharmila G, Keerthanadevi S, Gangalakshmi S. Steganography (2024). A Technique to Hide the Information using LSB Algorithm. SSRG International Journal of Ceramic Technology (SSRG-IJCT) -Special Issue. htps://www.internationaljournalssrg.org/uploads/specialissuepdf/ICRMIT/2018/CSE/IJCSE-ICRMIT-P103.pdf

J. Bhadra, M. K. Banga and M. V. Murthy, (2017). Securing data using elliptic curve cryptography and least significant bit steganography. International Conference On Smart Technologies For Smart Nation (SmartTechCon), Bengaluru, India, pp. 1460-1466, doi: 10.1109/SmartTechCon.2017.8358607.

Kaur, Ravneet & Singh, Tanupreet, “Hiding Data in video Sequences using LSB with Elliptic Curve Cryptography,” International Journal of Computer Applications. 117;36-40. 10.5120/20658-3296.

Christofer Derian Budianto, Arya Wicaksana, and Seng Hansun, “Elliptic Curve Cryptography and LSB Steganography for Securing Identity Data (2019). Studies in computational intelligence, pp. 111–127, doi: https://doi.org/10.1007/978-3-030-25217-5_9.

Nandan P, Raghav M, 2, Amit K, Chaturvedi, Scholar P. (2023) Issue 7 Journal of Emerging Technologies and Innovative Research 10. https://www.jetir.org/papers/JETIR2307591.pdf

Y.-K. Lee, G. Bell, S.-Y. Huang, R.-Z. Wang, and S.-J. Shyu, (2009). An Advanced Least-Significant-Bit Embedding Scheme for Steganographic Encoding. Lecture Notes in Computer Science, pp. 349–360, doi: https://doi.org/10.1007/978-3-540-92957-4_31.

Aslam, Muhammad & Rashid, Muhammad & Azam, Farooque & Abbas, Muhammad & Rasheed, Yawar & Alotaibi, Saud & Anwar, Muhammad, (2022). Image Steganography using Least Significant Bit (LSB) - A Systematic Literature 2-38,

S. Roy and Md. M. Islam, (2022). A Hybrid Secured Approach Combining LSB Steganography and AES Using Mosaic Images for Ensuring Data Security. SN Computer Science, 3(2), doi: https://doi.org/10.1007/s42979-022-01046-8.

[1]S. Wendzel et al., (2021). A Revised Taxonomy of Steganography Embedding Patterns. doi: https://doi.org/10.1145/3465481.3470069.

A Robust Security Scheme Based on Novel Encoding with LSB Steganography | IEEE Conference Publication | IEEE Xplore ieeexplore.ieee.org. https://ieeexplore.ieee.org/document/9513904

Improving Security with Efficient Key Management in Public Cloud using Hybrid AES, ECC, and LSB Steganography comparing with Novel hybrid Cube Base Obfuscation | IEEE Conference Publication | IEEE Xplore [Internet]. ieeexplore.ieee.org. [cited 2024 Feb 10]. Available at: https://ieeexplore.ieee.org/document/9780661

E. Bin Hureib, P. Adnan, and A. Gutub, (2020). Enhancing Medical Data Security via Combining Elliptic Curve Cryptography and Image Steganography. IJCSNS International Journal of Computer Science and Network Security, 20(8): http://paper.ijcsns.org/07_book/202008/20200801.pdf

Chandrasekaran, Vanmathi & Sevugan, Prabu, (2016). Steganography: A comparative study, analysis of key issues and current trends. 8;4696-4715, https://www.researchgate.net/publication/309670700_Steganography_A_comparative_studyanalysis_of_key_issues_and_current_trends

Al-Shaaby, Ahmed & Al-Kharobi, Talal, (2017). Cryptography and Steganography: New Approach. Transactions on Networks and Communications. 5. 10.14738/tnc.56.3914,

D. Nashat and L. Mamdouh, (2019). An efficient steganographic technique for hiding data. Journal of the Egyptian Mathematical Society, 27(1), doi: https://doi.org/10.1186/s42787-019-0061-6.

Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography | IEEE Journals & Magazine | IEEE Xplore [Internet]. ieeexplore.ieee.org. [cited 2024 Feb 10]. https://ieeexplore.ieee.org/abstract/document/10418202

R. Denis and P. Madhubala, (2020). Evolutionary Computing Assisted Visually- Imperceptible Hybrid Cryptography and Steganography Model for Secure Data Communication over Cloud Environment. International Journal of Computer Networks and Applications, 7(6);208, doi: https://doi.org/10.22247/ijcna/2020/205321.

Siddharth, D., & Saini, D. K. J. (2022). IoT Based Lightweight Cryptographic Schemes in Smart Healthcare. In Advancing Computational Intelligence Techniques for Security Systems Design (pp. 169-178). CRC Press.

Ahmed, A. A., Malebary, S. J., Ali, W., & Alzahrani, A. A. (2023). A provable secure cybersecurity mechanism based on combination of lightweight cryptography and authentication for internet of things. Mathematics, 11(1);220. https://doi.org/10.3390/math11010220

Salih, K. O. M., Rashid, T. A., Radovanovic, D., & Bacanin, N. (2022). A comprehensive survey on the Internet of Things with the industrial marketplace. Sensors, 22(3), 730. https://doi.org/10.3390/s22030730

Harn, L., & Lin, C. (2014). Efficient group Diffie–Hellman key agreement protocols. Computers & Electrical Engineering, 40(6), 1972-1980. https://doi.org/10.1016/j.compeleceng.2013.12.018

Rahmani, A.M., Bayramov, S. & Kiani Kalejahi, B. (2022). Internet of Things Applications: Opportunities and Threats. Wireless Pers Commun 122, 451–476. https://doi.org/10.1007/s11277-021-08907-0

Nyangaresi, V. O. (2022). Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography. Journal of Systems Architecture, 133, 102763. https://doi.org/10.1016/j.sysarc.2022.102763

Das, S., & Namasudra, S. (2022). A novel hybrid encryption method to secure healthcare data in IoT-enabled healthcare infrastructure. Computers and Electrical Engineering, 101, 107991. https://doi.org/10.1016/j.compeleceng.2022.107991

Xavier, A. P., & Kesavan, R. (2023). Hybrid Elliptic Curve Cryptographic Approach for Data Privacy and Authentication in Secured Map Reduce Layer (SMR) for Optimized CPU Utilization. IETE Journal of Research, 69(2), 670-683. https://doi.org/10.1080/03772063.2022.2027285

Qazi, R., Qureshi, K. N., Bashir, F., Islam, N. U., Iqbal, S., & Arshad, A. (2021). Security protocol using elliptic curve cryptography algorithm for wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 12, 547-566. https://doi.org/10.1007/s12652-020-02020-z

A. Abdaoui, A. Erbad, A. K. Al-Ali, A. Mohamed and M. Guizani, (2022). Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things. IEEE Internet of Things Journal, 9(12); 9987-9998, doi: 10.1109/JIOT.2021.3121350

Mousavi, S. K., Ghaffari, A., Besharat, S., & Afshari, H. (2021). Security of internet of things based on cryptographic algorithms: a survey. Wireless Networks, 27(2), 1515-1555. https://doi.org/10.1007/s11276-020-02535-5

Pawar, R., & Kalbande, D. R. (2020). Elliptical curve cryptography based access control solution for IoT based WSN. Innovative Data Communication Technologies and Application: ICIDCA 2019 (pp. 742-749). https://doi.org/10.1007/978-3-030-38040-3_85

Agrawal, L., & Tiwari, N. (2020). A review on IoT security architecture: attacks, protocols, trust management issues, and elliptic curve cryptography. Social Networking and Computational Intelligence: Proceedings of SCI-2018, 457-465. https://doi.org/10.1007/978-981-15-2071-6_36

Khan, M. A., Quasim, M. T., Alghamdi, N. S., & Khan, M. Y. (2020). A secure framework for authentication and encryption using improved ECC for IoT-based medical sensor data. IEEE Access, 8, 52018-52027. https://doi.org/10.1109/ACCESS.2020.2980739

Kavitha, S., Alphonse, P. J. A., & Reddy, Y. V. (2019). An improved authentication and security on efficient generalized group key agreement using hyper elliptic curve based public key cryptography for IoT health care system. Journal of medical systems, 43(8), 260. https://doi.org/10.1007/s10916-019-1378-2

Mehmood, M. S., Shahid, M. R., Jamil, A., Ashraf, R., Mahmood, T., & Mehmood, A. (2019, November). A comprehensive literature review of data encryption techniques in cloud computing and IoT environment. 2019 8th International Conference on Information and Communication Technologies (ICICT) (pp. 54-59). IEEE. https://doi.org/10.1109/ICICT47744.2019.9001945

Vahdati, Z., Yasin, S., Ghasempour, A., & Salehi, M. (2019). Comparison of ECC and RSA algorithms in IoT devices. Journal of Theoretical and Applied Information Technology, 97(16), 4293.

Kumari, S., Karuppiah, M., Das, A. K., Li, X., Wu, F., & Kumar, N. (2018). A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. The Journal of Supercomputing, 74(12);6428-6453. https://doi.org/10.1007/s11227-017-2048-0

Lara-Nino, C. A., Diaz-Perez, A., & Morales-Sandoval, M. (2018). Elliptic curve lightweight cryptography: A survey. IEEE Access, 6, 72514-72550. https://doi.org/10.1109/ACCESS.2018.2881444

Odat, A. M., & Otair, M. A. (2016). Image steganography using modified least significant bit. Indian Journal of Science and Technology. https://ischolar.sscldl.in/index.php/indjst/article/view/125794

Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012). Image steganography techniques: an overview. International Journal of Computer Science and Security (IJCSS), 6(3);168-187.

Akhtar, N., Johri, P., & Khan, S. (2013). Enhancing the security and quality of LSB based image steganography. 5th International Conference and Computational Intelligence and Communication Networks (pp. 385-390). IEEE. https://doi.org/10.1109/CICN.2013.85

Muhammad, K., Ahmad, J., Farman, H., & Zubair, M. (2015). A novel image steganographic approach for hiding text in color images using HSI color model. arXiv preprint arXiv:1503.00388. https://doi.org/10.48550/arXiv.1503.00388

Wang, S., Sang, J., Song, X., Niu, X. (2015). Least significant qubit (LSQb) information hiding algorithm for quantum image. Measurement 73;352-359. https://doi.org/10.1016/j.measurement.2015.05.038

Al-Shatnawi, A. M., & AlFawwaz, B. M. (2013). An integrated image steganography system with improved image quality. Applied Mathematical Sciences, 7(71), 3545-3553.

Liu, Q., Sung, A. H., Ribeiro, B., Wei, M., Chen, Z., & Xu, J. (2008). Image complexity and feature mining for steganalysis of least significant bit matching steganography. Information Sciences, 178(1), 21-36. https://doi.org/10.1016/j.ins.2007.08.007

Xu, W. L., Chang, C. C., Chen, T. S., & Wang, L. M. (2016). An improved least-significant-bit substitution method using the modulo three strategy. Displays, 42, 36-42. https://doi.org/10.1016/j.displa.2016.03.002

Mao, Q. (2014). A fast algorithm for matrix embedding steganography. Digital Signal Processing, 25; 248-254. https://doi.org/10.1016/j.dsp.2013.11.001

Nagaraj, V., Vijayalakshmi, V., & Zayaraz, G. (2013). Color image steganography based on pixel value modification method using modulus function. IERI Procedia, 4; 17-24. https://doi.org/10.1016/j.ieri.2013.11.004

Biswas, D., Biswas, S., Majumder, A., Sarkar, D., Sinha, D., Chowdhury, A., & Das, S. K. (2012). Digital image steganography using dithering technique. Procedia Technology, 4; 251-255. https://doi.org/10.1016/j.protcy.2012.05.038

Karim, S. M., Rahman, M. S., & Hossain, M. I. (2011). A new approach for LSB based image steganography using secret key. 14th international conference on computer and information technology (ICCIT 2011) (pp. 286-291). IEEE. https://doi.org/10.1109/ICCITechn.2011.6164800

Tahir, A., & Amit, D. (2015). A novel approach of LSB based steganography using parity checker. International Journal of Advanced Research in Computer Science and Software Engineering, 5(1).

Rawat, D., & Bhandari, V. (2013). A steganography technique for hiding an image in an image using LSB method for 24 bit color image. International Journal of Computer Applications, 64(20); 15–19. https://doi.org/10.5120/10749-5625

ElSayed, A., Elleithy, A., Thunga, P., & Wu, Z. (2015). Highly secure image steganography algorithm using curvelet transform and DCT encryption. Long Island Systems, Applications and Technology. https://doi.org/10.1109/lisat.2015.7160204

Senthooran, V., & Ranathunga, L. (2014). DCT coefficient dependent quantization table modification steganographic algorithm. First International Conference on Networks & Soft Computing (ICNSC2014). https://doi.org/10.1109/cnsc.2014.6906644

Gaba, J., & Kumar, M. (2013). Implementation of steganography using CES technique. IEEE Second International Conference on Image Information Processing (ICIIP-2013), Shimla, India (pp. 395-399). https://doi.org/10.1109/iciip.2013.6707622

Nofriansyah, D., Defit, S., Nurcahyo, G. W., Ganefri, G., Ridwan, R., Ahmar, A. S., & Rahim, R. (2018). A new image encryption technique combining Hill cipher method, Morse code and least significant bit algorithm. Journal of Physics: Conference Series, 954, 012003. https://doi.org/10.1088/1742-6596/954/1/012003

Sridevi, D. R., Paruchuri, V. L., & Rao, K. S. S. S. (2013). Image steganography combined with cryptography. international journal of computers & technology, 9(1); 976–984. https://doi.org/10.24297/ijct.v9i1.4160

Shoup, V. (2009). A computational introduction to number theory and algebra. Cambridge University Press.

Kak, A. (2015). Lecture notes on computer and network security. Purdue University. Available: https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture8.pdf

Stallings, W. (2011). Operating systems: internals and design principles. Prentice Hall Press. Available: https://dl.acm.org/doi/abs/10.5555/2012029

Abd Aziz, A. Z., Mohd Sultan, M. F., & Mohamad Zulkufli, N. L. (2024). Image Steganography: Comparative Analysis of their Techniques, Complexity and Enhancements. International Journal on Perceptive and Cognitive Computing, 10(1); 59–70. https://doi.org/10.31436/ijpcc.v10i1.449

Ji, H., Xie, L., Wang, C., Yin, Y., & Lu, S. (2015). CrowdSensing: A crowd-sourcing based indoor navigation using RFID-based delay tolerant network. Journal of Network and Computer Applications, 52, 79-89. https://doi.org/10.1016/j.jnca.2015.02.010

Rahman, M. S., Hossain, M. S., Rahat, E. H., Dipta, D. R., Faruque, H. M. R., & Fattah, F. K. (2019). Efficient hardware implementation of 256-bit ECC processor over prime field. International conference on electrical, computer and communication engineering (ECCE) (pp. 1-6). IEEE. https://doi.org/10.1109/ECACE.2019.8679184

Mahto, D., & Yadav, D. K. (2017). RSA and ECC: a comparative analysis. International Journal of Applied Engineering Research, 12(19); 9053-9061. https://blkcipher.pl/assets/pdfs/ijaerv12n19_140.pdf

Maimuţ, D., & Matei, A. C. (2022). Speeding-Up Elliptic Curve Cryptography Algorithms. Mathematics, 10(19); 3676. https://doi.org/10.3390/math10193676

Downloads

Published

2024-09-02

How to Cite

El-Taj, H. (2024). A Secure Fusion: Elliptic Curve Encryption Integrated with LSB Steganography for Hidden Communication. International Journal of Computational and Experimental Science and Engineering, 10(3). https://doi.org/10.22399/ijcesen.382

Issue

Section

Research Article