A Secure Fusion: Elliptic Curve Encryption Integrated with LSB Steganography for Hidden Communication
DOI:
https://doi.org/10.22399/ijcesen.382Keywords:
Elliptic Curve Cryptography, LSB Steganography, Secure Communication, Hidden Communication, Image SteganographyAbstract
In today's digital age, ensuring secure communication is essential. This article presents a novel approach for hidden communication by integrating Elliptic Curve Encryption (ECE) with Least Significant Bit (LSB) Steganography.
Our proposed fusion offers a robust solution, Stegno Curve for concealing sensitive information within innocuous cover media while encrypting it using elliptic curve cryptography. By leveraging the strengths of both techniques, we achieve enhanced security and confidentiality in data transmission.
Through a comprehensive literature review, methodology explanation, security analysis, and implementation details, we demonstrate the feasibility and effectiveness of the Stegno Curve Method. The findings of this study not only contribute to advancing the field of secure communication but also open avenues for practical applications in various domains, such as secure cloud transitions, smart home technologies, and data encryption.
References
Jan, A., Parah, S.A., Hussan, M. et al. (2022). Double layer security using crypto-stego techniques: a comprehensive review. Health Technol. 12; 9–31. https://doi.org/10.1007/s12553-021-00602-1
Evaluating the Merits and Constraints of Cryptography-Steganography Fusion: A Systematic Analysis [Internet]. www.researchsquare.com. 2023 [cited 2024 Feb 11]. Available from: https://www.researchsquare.com/article/rs-3167378/v1
Menezes, A.J., Vanstone, S.A. (1993). Elliptic curve cryptosystems and their implementation. J. Cryptology 6; 209–224. https://doi.org/10.1007/BF00203817
Kakunuri Sandya and Subhadra Kompella, (2022). A Combined Approach of Steganography and Cryptography with Generative Adversarial Networks: Survey. Lecture notes in networks and systems, pp. 187–196, doi: https://doi.org/10.1007/978-981-19-4863-3_18.
Alanzy M, Alomrani R, Alqarni B, Almutairi S. (2023). Image Steganography Using LSB and Hybrid Encryption Algorithms. Applied Sciences [Internet]. 1;13(21):11771. Available from: https://www.mdpi.com/2076-3417/13/21/11771
McAteer I, Ibrahim A, Zheng G, Yang W, Valli C. (2019). Integration of Biometrics and Steganography: A Comprehensive Review. Technologies [Internet]. 8;7(2):34. Available from: https://www.mdpi.com/2227-7080/7/2/34
G. G, C. Ashwin, B. V. P, A. A and A. Hiremath, (2021). Enhanced Data Encryption in IOT using ECC Cryptography and LSB Steganography. International Conference on Design Innovations for 3Cs Compute Communicate Control (ICDI3C), Bangalore, India, pp. 173-177, doi: 10.1109/ICDI3C53598.2021.00043.
Budianto, Christofer & Wicaksana, Arya & Hansun, Seng, (2020). Elliptic Curve Cryptography and LSB Steganography for Securing Identity Data. Available: https://www.researchgate.net/publication/335329077_Elliptic_Curve_Cryptography_and_LSB_Steganography_for_Securing_Identity_Data
Varghese, Fredy and P. Sasikala. (2023). Secure Data Transmission Using Optimized Cryptography and Steganography Using Syndrome-Trellis Coding. Wireless Personal Communications 130;551-578.
G. Shilpa, Mohan CM, Chaurasia N. (2023). Image steganography using LSB embedding and edge adaptive approach. AIP Conference Proceedings
R. Bansal and N. Badal, (2022). A novel approach for dual layer security of message using Steganography and Cryptography. Multimedia Tools and Applications, 81(15);20669–20684, doi: https://doi.org/10.1007/s11042-022-12084-y.
Zachariah, Babangida & Yabuwat, Patience & Bernard, Ephraim, (2016). Application of Steganography and Cryptography for Secured Data Communication – A Review,” International Journal of Engineering Research & Technology (IJERT), doi: https://www.researchgate.net/publication/306254107_Application_of_Steganography_and_Cryptography_for_Secured_Data_Communication_-_A_Review
Dhivya C, Sharmila G, Keerthanadevi S, Gangalakshmi S. Steganography (2018). A Technique to Hide the Information using LSB Algorithm [Internet]. SSRG International Journal of Ceramic Technology (SSRG-IJCT) -Special Issue. 2018 [cited 2024 Feb 10]. Available from: https://www.internationaljournalssrg.org/uploads/specialissuepdf/ICRMIT/2018/CSE/IJCSE-ICRMIT-P103.pdf
Ahmed DEM, Khalifa OO. (2014). Robust and Secure Image Steganography Based on Elliptic Curve Cryptography [Internet]. IEEE Xplore. 288–91. https://ieeexplore.ieee.org/document/7031659
Kheddar H, Hemis M, Himeur Y, Megías D, Amira A. (2023). Deep Learning for Diverse Data Types Steganalysis: A Review arXiv.org. https://arxiv.org/abs/2308.04522
Dhivya C, Sharmila G, Keerthanadevi S, Gangalakshmi S. Steganography (2024). A Technique to Hide the Information using LSB Algorithm. SSRG International Journal of Ceramic Technology (SSRG-IJCT) -Special Issue. htps://www.internationaljournalssrg.org/uploads/specialissuepdf/ICRMIT/2018/CSE/IJCSE-ICRMIT-P103.pdf
J. Bhadra, M. K. Banga and M. V. Murthy, (2017). Securing data using elliptic curve cryptography and least significant bit steganography. International Conference On Smart Technologies For Smart Nation (SmartTechCon), Bengaluru, India, pp. 1460-1466, doi: 10.1109/SmartTechCon.2017.8358607.
Kaur, Ravneet & Singh, Tanupreet, “Hiding Data in video Sequences using LSB with Elliptic Curve Cryptography,” International Journal of Computer Applications. 117;36-40. 10.5120/20658-3296.
Christofer Derian Budianto, Arya Wicaksana, and Seng Hansun, “Elliptic Curve Cryptography and LSB Steganography for Securing Identity Data (2019). Studies in computational intelligence, pp. 111–127, doi: https://doi.org/10.1007/978-3-030-25217-5_9.
Nandan P, Raghav M, 2, Amit K, Chaturvedi, Scholar P. (2023) Issue 7 Journal of Emerging Technologies and Innovative Research 10. https://www.jetir.org/papers/JETIR2307591.pdf
Y.-K. Lee, G. Bell, S.-Y. Huang, R.-Z. Wang, and S.-J. Shyu, (2009). An Advanced Least-Significant-Bit Embedding Scheme for Steganographic Encoding. Lecture Notes in Computer Science, pp. 349–360, doi: https://doi.org/10.1007/978-3-540-92957-4_31.
Aslam, Muhammad & Rashid, Muhammad & Azam, Farooque & Abbas, Muhammad & Rasheed, Yawar & Alotaibi, Saud & Anwar, Muhammad, (2022). Image Steganography using Least Significant Bit (LSB) - A Systematic Literature 2-38,
S. Roy and Md. M. Islam, (2022). A Hybrid Secured Approach Combining LSB Steganography and AES Using Mosaic Images for Ensuring Data Security. SN Computer Science, 3(2), doi: https://doi.org/10.1007/s42979-022-01046-8.
[1]S. Wendzel et al., (2021). A Revised Taxonomy of Steganography Embedding Patterns. doi: https://doi.org/10.1145/3465481.3470069.
A Robust Security Scheme Based on Novel Encoding with LSB Steganography | IEEE Conference Publication | IEEE Xplore ieeexplore.ieee.org. https://ieeexplore.ieee.org/document/9513904
Improving Security with Efficient Key Management in Public Cloud using Hybrid AES, ECC, and LSB Steganography comparing with Novel hybrid Cube Base Obfuscation | IEEE Conference Publication | IEEE Xplore [Internet]. ieeexplore.ieee.org. [cited 2024 Feb 10]. Available at: https://ieeexplore.ieee.org/document/9780661
E. Bin Hureib, P. Adnan, and A. Gutub, (2020). Enhancing Medical Data Security via Combining Elliptic Curve Cryptography and Image Steganography. IJCSNS International Journal of Computer Science and Network Security, 20(8): http://paper.ijcsns.org/07_book/202008/20200801.pdf
Chandrasekaran, Vanmathi & Sevugan, Prabu, (2016). Steganography: A comparative study, analysis of key issues and current trends. 8;4696-4715, https://www.researchgate.net/publication/309670700_Steganography_A_comparative_studyanalysis_of_key_issues_and_current_trends
Al-Shaaby, Ahmed & Al-Kharobi, Talal, (2017). Cryptography and Steganography: New Approach. Transactions on Networks and Communications. 5. 10.14738/tnc.56.3914,
D. Nashat and L. Mamdouh, (2019). An efficient steganographic technique for hiding data. Journal of the Egyptian Mathematical Society, 27(1), doi: https://doi.org/10.1186/s42787-019-0061-6.
Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography | IEEE Journals & Magazine | IEEE Xplore [Internet]. ieeexplore.ieee.org. [cited 2024 Feb 10]. https://ieeexplore.ieee.org/abstract/document/10418202
R. Denis and P. Madhubala, (2020). Evolutionary Computing Assisted Visually- Imperceptible Hybrid Cryptography and Steganography Model for Secure Data Communication over Cloud Environment. International Journal of Computer Networks and Applications, 7(6);208, doi: https://doi.org/10.22247/ijcna/2020/205321.
Siddharth, D., & Saini, D. K. J. (2022). IoT Based Lightweight Cryptographic Schemes in Smart Healthcare. In Advancing Computational Intelligence Techniques for Security Systems Design (pp. 169-178). CRC Press.
Ahmed, A. A., Malebary, S. J., Ali, W., & Alzahrani, A. A. (2023). A provable secure cybersecurity mechanism based on combination of lightweight cryptography and authentication for internet of things. Mathematics, 11(1);220. https://doi.org/10.3390/math11010220
Salih, K. O. M., Rashid, T. A., Radovanovic, D., & Bacanin, N. (2022). A comprehensive survey on the Internet of Things with the industrial marketplace. Sensors, 22(3), 730. https://doi.org/10.3390/s22030730
Harn, L., & Lin, C. (2014). Efficient group Diffie–Hellman key agreement protocols. Computers & Electrical Engineering, 40(6), 1972-1980. https://doi.org/10.1016/j.compeleceng.2013.12.018
Rahmani, A.M., Bayramov, S. & Kiani Kalejahi, B. (2022). Internet of Things Applications: Opportunities and Threats. Wireless Pers Commun 122, 451–476. https://doi.org/10.1007/s11277-021-08907-0
Nyangaresi, V. O. (2022). Lightweight anonymous authentication protocol for resource-constrained smart home devices based on elliptic curve cryptography. Journal of Systems Architecture, 133, 102763. https://doi.org/10.1016/j.sysarc.2022.102763
Das, S., & Namasudra, S. (2022). A novel hybrid encryption method to secure healthcare data in IoT-enabled healthcare infrastructure. Computers and Electrical Engineering, 101, 107991. https://doi.org/10.1016/j.compeleceng.2022.107991
Xavier, A. P., & Kesavan, R. (2023). Hybrid Elliptic Curve Cryptographic Approach for Data Privacy and Authentication in Secured Map Reduce Layer (SMR) for Optimized CPU Utilization. IETE Journal of Research, 69(2), 670-683. https://doi.org/10.1080/03772063.2022.2027285
Qazi, R., Qureshi, K. N., Bashir, F., Islam, N. U., Iqbal, S., & Arshad, A. (2021). Security protocol using elliptic curve cryptography algorithm for wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing, 12, 547-566. https://doi.org/10.1007/s12652-020-02020-z
A. Abdaoui, A. Erbad, A. K. Al-Ali, A. Mohamed and M. Guizani, (2022). Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things. IEEE Internet of Things Journal, 9(12); 9987-9998, doi: 10.1109/JIOT.2021.3121350
Mousavi, S. K., Ghaffari, A., Besharat, S., & Afshari, H. (2021). Security of internet of things based on cryptographic algorithms: a survey. Wireless Networks, 27(2), 1515-1555. https://doi.org/10.1007/s11276-020-02535-5
Pawar, R., & Kalbande, D. R. (2020). Elliptical curve cryptography based access control solution for IoT based WSN. Innovative Data Communication Technologies and Application: ICIDCA 2019 (pp. 742-749). https://doi.org/10.1007/978-3-030-38040-3_85
Agrawal, L., & Tiwari, N. (2020). A review on IoT security architecture: attacks, protocols, trust management issues, and elliptic curve cryptography. Social Networking and Computational Intelligence: Proceedings of SCI-2018, 457-465. https://doi.org/10.1007/978-981-15-2071-6_36
Khan, M. A., Quasim, M. T., Alghamdi, N. S., & Khan, M. Y. (2020). A secure framework for authentication and encryption using improved ECC for IoT-based medical sensor data. IEEE Access, 8, 52018-52027. https://doi.org/10.1109/ACCESS.2020.2980739
Kavitha, S., Alphonse, P. J. A., & Reddy, Y. V. (2019). An improved authentication and security on efficient generalized group key agreement using hyper elliptic curve based public key cryptography for IoT health care system. Journal of medical systems, 43(8), 260. https://doi.org/10.1007/s10916-019-1378-2
Mehmood, M. S., Shahid, M. R., Jamil, A., Ashraf, R., Mahmood, T., & Mehmood, A. (2019, November). A comprehensive literature review of data encryption techniques in cloud computing and IoT environment. 2019 8th International Conference on Information and Communication Technologies (ICICT) (pp. 54-59). IEEE. https://doi.org/10.1109/ICICT47744.2019.9001945
Vahdati, Z., Yasin, S., Ghasempour, A., & Salehi, M. (2019). Comparison of ECC and RSA algorithms in IoT devices. Journal of Theoretical and Applied Information Technology, 97(16), 4293.
Kumari, S., Karuppiah, M., Das, A. K., Li, X., Wu, F., & Kumar, N. (2018). A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. The Journal of Supercomputing, 74(12);6428-6453. https://doi.org/10.1007/s11227-017-2048-0
Lara-Nino, C. A., Diaz-Perez, A., & Morales-Sandoval, M. (2018). Elliptic curve lightweight cryptography: A survey. IEEE Access, 6, 72514-72550. https://doi.org/10.1109/ACCESS.2018.2881444
Odat, A. M., & Otair, M. A. (2016). Image steganography using modified least significant bit. Indian Journal of Science and Technology. https://ischolar.sscldl.in/index.php/indjst/article/view/125794
Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M. (2012). Image steganography techniques: an overview. International Journal of Computer Science and Security (IJCSS), 6(3);168-187.
Akhtar, N., Johri, P., & Khan, S. (2013). Enhancing the security and quality of LSB based image steganography. 5th International Conference and Computational Intelligence and Communication Networks (pp. 385-390). IEEE. https://doi.org/10.1109/CICN.2013.85
Muhammad, K., Ahmad, J., Farman, H., & Zubair, M. (2015). A novel image steganographic approach for hiding text in color images using HSI color model. arXiv preprint arXiv:1503.00388. https://doi.org/10.48550/arXiv.1503.00388
Wang, S., Sang, J., Song, X., Niu, X. (2015). Least significant qubit (LSQb) information hiding algorithm for quantum image. Measurement 73;352-359. https://doi.org/10.1016/j.measurement.2015.05.038
Al-Shatnawi, A. M., & AlFawwaz, B. M. (2013). An integrated image steganography system with improved image quality. Applied Mathematical Sciences, 7(71), 3545-3553.
Liu, Q., Sung, A. H., Ribeiro, B., Wei, M., Chen, Z., & Xu, J. (2008). Image complexity and feature mining for steganalysis of least significant bit matching steganography. Information Sciences, 178(1), 21-36. https://doi.org/10.1016/j.ins.2007.08.007
Xu, W. L., Chang, C. C., Chen, T. S., & Wang, L. M. (2016). An improved least-significant-bit substitution method using the modulo three strategy. Displays, 42, 36-42. https://doi.org/10.1016/j.displa.2016.03.002
Mao, Q. (2014). A fast algorithm for matrix embedding steganography. Digital Signal Processing, 25; 248-254. https://doi.org/10.1016/j.dsp.2013.11.001
Nagaraj, V., Vijayalakshmi, V., & Zayaraz, G. (2013). Color image steganography based on pixel value modification method using modulus function. IERI Procedia, 4; 17-24. https://doi.org/10.1016/j.ieri.2013.11.004
Biswas, D., Biswas, S., Majumder, A., Sarkar, D., Sinha, D., Chowdhury, A., & Das, S. K. (2012). Digital image steganography using dithering technique. Procedia Technology, 4; 251-255. https://doi.org/10.1016/j.protcy.2012.05.038
Karim, S. M., Rahman, M. S., & Hossain, M. I. (2011). A new approach for LSB based image steganography using secret key. 14th international conference on computer and information technology (ICCIT 2011) (pp. 286-291). IEEE. https://doi.org/10.1109/ICCITechn.2011.6164800
Tahir, A., & Amit, D. (2015). A novel approach of LSB based steganography using parity checker. International Journal of Advanced Research in Computer Science and Software Engineering, 5(1).
Rawat, D., & Bhandari, V. (2013). A steganography technique for hiding an image in an image using LSB method for 24 bit color image. International Journal of Computer Applications, 64(20); 15–19. https://doi.org/10.5120/10749-5625
ElSayed, A., Elleithy, A., Thunga, P., & Wu, Z. (2015). Highly secure image steganography algorithm using curvelet transform and DCT encryption. Long Island Systems, Applications and Technology. https://doi.org/10.1109/lisat.2015.7160204
Senthooran, V., & Ranathunga, L. (2014). DCT coefficient dependent quantization table modification steganographic algorithm. First International Conference on Networks & Soft Computing (ICNSC2014). https://doi.org/10.1109/cnsc.2014.6906644
Gaba, J., & Kumar, M. (2013). Implementation of steganography using CES technique. IEEE Second International Conference on Image Information Processing (ICIIP-2013), Shimla, India (pp. 395-399). https://doi.org/10.1109/iciip.2013.6707622
Nofriansyah, D., Defit, S., Nurcahyo, G. W., Ganefri, G., Ridwan, R., Ahmar, A. S., & Rahim, R. (2018). A new image encryption technique combining Hill cipher method, Morse code and least significant bit algorithm. Journal of Physics: Conference Series, 954, 012003. https://doi.org/10.1088/1742-6596/954/1/012003
Sridevi, D. R., Paruchuri, V. L., & Rao, K. S. S. S. (2013). Image steganography combined with cryptography. international journal of computers & technology, 9(1); 976–984. https://doi.org/10.24297/ijct.v9i1.4160
Shoup, V. (2009). A computational introduction to number theory and algebra. Cambridge University Press.
Kak, A. (2015). Lecture notes on computer and network security. Purdue University. Available: https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture8.pdf
Stallings, W. (2011). Operating systems: internals and design principles. Prentice Hall Press. Available: https://dl.acm.org/doi/abs/10.5555/2012029
Abd Aziz, A. Z., Mohd Sultan, M. F., & Mohamad Zulkufli, N. L. (2024). Image Steganography: Comparative Analysis of their Techniques, Complexity and Enhancements. International Journal on Perceptive and Cognitive Computing, 10(1); 59–70. https://doi.org/10.31436/ijpcc.v10i1.449
Ji, H., Xie, L., Wang, C., Yin, Y., & Lu, S. (2015). CrowdSensing: A crowd-sourcing based indoor navigation using RFID-based delay tolerant network. Journal of Network and Computer Applications, 52, 79-89. https://doi.org/10.1016/j.jnca.2015.02.010
Rahman, M. S., Hossain, M. S., Rahat, E. H., Dipta, D. R., Faruque, H. M. R., & Fattah, F. K. (2019). Efficient hardware implementation of 256-bit ECC processor over prime field. International conference on electrical, computer and communication engineering (ECCE) (pp. 1-6). IEEE. https://doi.org/10.1109/ECACE.2019.8679184
Mahto, D., & Yadav, D. K. (2017). RSA and ECC: a comparative analysis. International Journal of Applied Engineering Research, 12(19); 9053-9061. https://blkcipher.pl/assets/pdfs/ijaerv12n19_140.pdf
Maimuţ, D., & Matei, A. C. (2022). Speeding-Up Elliptic Curve Cryptography Algorithms. Mathematics, 10(19); 3676. https://doi.org/10.3390/math10193676
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal of Computational and Experimental Science and Engineering
This work is licensed under a Creative Commons Attribution 4.0 International License.