An algorithm for steganographic embedding of encrypted files in raster images
DOI:
https://doi.org/10.33919/YTelecomm.22.9.3Keywords:
Vigenere cipher, affine transformations, Bezier curves, vector and raster steganographyAbstract
The aim of this paper is proposing a method for the application of algorithms for hiding an encrypted file inside of a digital image for cybersecurity purposes. The originality of the method is expressed in the possibility of studying the mathematical algorithms for creating computer graphics. The development of a comprehensive algorithm should contribute to the practical realization of the method proposed. It emphasizes on built-in algorithms in software systems for creating computer graphics and the advantages of steganographic embedding by opensource products that hides any archive file in a digital image. Its application contribution is supported by practical examples of software hiding and archiving an encrypted file in a graphic image.
References
DANIEL, Brett. What Is AES Encryption? [The Definitive Q&A Guide]. Trenton Systems [online]. 31 March 2021 [viewed 20 February 2022]. Available from: https://www.trentonsystems.com/blog/aes-encryption-your-faqs-answered
JASSIM, Nassif K. Hybrid cryptography and steganography method to embed encrypted text message within image. Journal of Physics: Conference Series [online]. 2019, vol. 1339, № 012061 [viewed 20 January 2023]. eISSN 1742-6596. Available from: https://doi.org/10.1088/1742-6596/1339/1/012061
THAYANANTHAN, Vijey. Combining RSA and Vigenère Cipher algorithm to Encrypt and Decrypt Data, CS741 - Applied Cryptography. Studocu [online]. Technical University of Mombasa, 2019 [viewed 20 January 2023]. Available from: https://www.studocu.com/row/document/technicaluniversity-of-mombasa/bachelor-of-science-mathematics-and-computer-science/rsavigenerecombining-rsa-and-vigenere-cryptographic-algorithms-to-encrypt-and-decrypt-data/7758083
SARKAR, Subhasish. How much do you know about the Vigenère cipher? IBM Z Security [online]. 2020 [viewed 20 January 2023]. Available from: https://community.ibm.com/community/user/ibmzand-linuxone/blogs/subhasish-sarkar1/2020/07/17/how-much-do-you-know-about-the-vigenerecipher
NERI, Daniel, Ariel M. SISON, and Ruji P. MEDINA. Performance Analysis of the Modified Vigenere Algorithm to Secure Data. In: Proceedings of the 9th International Workshop on Computer Science and Engineering (WCSE 2019 SUMMER). Hong Kong, 2019, pp. 789-794. ISBN 978-981-14-1684-2.
SUBANDI, Amin et al. Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification. Advances in Science, Technology and Engineering Systems Journal [online]. 2017, vol. 5(2), pp. 1-5 [viewed 20 January 2023]. ISSN 2415-6698. Available from: DOI:10.25046/aj020501
ASCII Conversion Chart. Technical Resources [online]. [viewed 20 January 2023]. Available from: https://web.alfredstate.edu/faculty/weimandn/miscellaneous/ascii/ascii_index.html
XOR Gate & XNOR Gates: Truth Table, Symbol & Boolean Expression. Electrical 4U [online]. 11 October 2020 [viewed 20 January 2023]. Available from: https://www.electrical4u.com/exclusive-orgate/
What is the difference between Encryption and Compression? What order should they be done in? Encryption Consulting [online]. [viewed 20 January 2023]. Available from: https://www.encryptionconsulting.com/education-center/encryption-and-compression/
ZELENSKI, Julie, Keith SCHWARZ, and Marty STEPP. Huffman Encoding and Data Compression [online]. [viewed 20 January 2023]. Stanford University and Marty Stepp, licensed under Creative Commons Attribution 2.5 License. Available from: https://web.stanford.edu/class/archive/cs/cs106x/cs106x.1192/resources/minibrowser2/huffmanencoding-supplement.pdf
CONRAD, Eric, Seth MISENAR and Joshua FELDMAN. Domain 5: Cryptography. In: CISSP Study Guide [online]. Second Edition. Amsterdam [u.a.]: Elsevier Inc, 2012, pp. 169-211 [viewed 20 January 2023]. ISBN 978-1-59749-961-3. Available from: https://doi.org/10.1016/B978-1-59749-961-3.00005-4.
SHENE, C. K. Introduction to Computing with Geometry Notes [online]. Michigan Technology University, 2014 [viewed 20 January 2023]. Available from: https://pages.mtu.edu/~shene/COURSES/cs3621/NOTES
SALOMON, David. Curves and Surfaces for Computer Graphics [online]. New York: Springer, 2005 [viewed 20 January 2023]. ISBN 978-0-387-24196-8. SpringerLink. Available from: https://doi.org/10.1007/0-387-28452-4_3
ANDERSON, Scott D. Affine Transformations Computer Graphics. Wellesley College [online]. [viewed 20 January 2023]. Available from: https://cs.wellesley.edu/~cs307/readings-s21/math/04-affine-math.pdf
КЪДРЕВ, Васил и Росен ПАСАРЕЛСКИ. Приложение на подходи на изкуствен интелект и машинно обучение в киберсигурността. Годишник Телекомуникации 2021 [онлайн]. София: НБУ, 2021, (8), с. 53-64 [прегледан 20 Януари 2023]. eISSN 2534-854X. Достъпен на: https://telecommunications.nbu.bg/bg/godishnik-telekomunikacii-broeve/godishnik-telekomunikacii-2021-g-tom-8 [KADREV, Vasil i Rosen PASARELSKI. Prilozhenie na podhodi na izkustven intelekt i mashinno obuchenie v kibersigurnostta. Godishnik Telekomunikatsii 2021 [onlayn]. Sofia: NBU, 2021, (8), s. 53-64 [pregledan 20 Yanuari 2023]. eISSN 2534-854X. Dostapen na: https://telecommunications.nbu.bg/bg/godishnik-telekomunikacii-broeve/godishnik-telekomunikacii-2021-g-tom-8]
СИМЕОНОВА, Цветелина и Васил КЪДРЕВ. Развитие на изкуствения интелект и неговото приложение в телекомуникационните мрежи и услуги. Сборник доклади от Научна конференция с международно участие на НВУ „В. Левски”, В. Търново, 27-28.05.2021. Велико Търново: ИК на НВУ „Васил Левски, 2021, с. 2376-2386. ISSN 2367-7481. [SIMEONOVA, Tsvetelina i Vasil KADREV. Razvitie na izkustvenia intelekt i negovoto prilozhenie v telekomunikatsionnite mrezhi i uslugi. Sbornik dokladi ot Nauchna konferentsia s mezhdunarodno uchastie na NVU „V. Levski”, V. Tarnovo, 27-28.05.2021. Veliko Tarnovo: IK na NVU „Vasil Levski, 2021, s. 2376- 2386. ISSN 2367-7481.]