RSA Over-Encryption Employing RGB Channels through a Steganography Variant

Ismael Martínez, Walter Fuertes, Melany Palacios, David Escudero, Tatiana Noboa

Abstract


This study aims to provide a solution for RSA over-encryption based on steganography variant to hide sensitive information that requires security. The current study describes a software program's implementation phases that allow technicians to re-encrypt a message, first encoded using RSA cryptosystems as an extra security layer. Subsequently, this text was converted into an array of bytes stored in Red, Green, and Blue (RGB) layers of one or more generated images, which will finally be sent to the receiver. The programming recursion technique was used to determine the number of images that need to be sent and the bytes corresponding to each of them. These images were created, reorganized, and encrypted according to pre-defined rules. The security of the proposed method relies heavily on the probability theory. Each of the possible patterns that can store data is equally likely to be chosen by an attacker. The program also uses as a conceptual base the Least Significant Bit Substitution (LSB) technique, with the difference that it directly stores bytes for the RGB values of the generated image(s). Our results indicate that the re-encryption is independent of a carrier image. The number of different ways to organize the pixels and the generated images suggests an acceptable security level. Moreover, it requires a not negligible computational power to decipher the pixels' original order and the channels containing relevant information.

Keywords


RSA; RGB; over-encryption; steganography; decryption.

Full Text:

PDF

References


R. Rivest, A. Shamir and L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, 1977.

Y. Liu and J. Zhang, Large-Capacity LSB information hiding scheme based on two-dimensional code, 7th IEEE International Conference on Electronics Information and Emergency Communication, 2017.

S. Mukherjee, S. Sinha, S. Chakrabarti and T. Mukhopadhyay, A meticulous implementation of RSA Algorithm, 1st International Conference on Electronics, Materials Engineering and Nano-Technology (IEMENTech), Kolkata, 2017.

J. Nath, and A. Nath. Advanced Steganography Algorithm using encrypted secret message. International Journal of advanced computer science and applications, 2.3, 2011.

K. Muhammad, et al. Secure image steganography using cryptography and image transposition. ArXiv preprint ArXiv: 1510.04413, 2015.

S. Almuhammadi, and A. Ahmed. A survey on recent approaches combining cryptography and steganography. Computer Science Information Technology, 2017.

S. Abu, and S. Hammoudeh, and A. Hammoudeh. AES Inspired Hex Symbols Steganography for Anti-Forensic Artifacts on Android Devices. Vol 7, 319-327, 2016.

S. Mare, M. Vladutiu, and L. Prodan, High capacity steganographic algorithm based on payload adaptation and optimization. In 2012 7th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI) (pp. 87-92). 2012.

D. Socek, H. Kalva, S. S. Magliveras, O. Marques, D. Culibrk, and B. Furht,” New approaches to encryption and steganography for digital videos,” Multimedia Systems, vol. 13, no. 3, pp. 191-204, 2007.

J. K. Saini and H. K. Verma,” A hybrid approach for image security by combining encryption and steganography,” in 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013). IEEE, 2013, pp.607-611.

P. Yadav, N. Mishra, and S. Sharma,” A secure video steganography with encryption based on LSB technique,” in 2013 IEEE International Conference on Computational Intelligence and Computing Research. IEEE, 2013, pp. 1-5.

A.A.AL-Shaaby and T. AlKharobi,” Cryptography and steganography: New approach,” Transactions on Networks and Communications, vol. 5, no. 6, p. 25, Dec. 2017 [Online]. Avail- able:http://116.203.177.230/index.php/TNC/article/view/3914

B. Karthikeyan, A. Deepak, K. Subalakshmi, A. R. MM, and V. Vaithiyanathan, ”A combined approach of steganography with LSB encoding technique and des algorithm,” in 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB). IEEE, 2017, pp.85-88.

A. Pandey and H. Agarwal,” Analysis on comparison of cryptography and steganography over an open channel”.

S. J. Indrabi, N. Saini, and M. Mohan, ”Secure data transmission based on combined effect of cryptography and steganography using visible light spectrum,” Inter- national Journal of Pure and Applied Mathematics, vol. 118, no. 20, pp. 2851-2860, 2018.

S. Gupta, A. Goyal, and B. Bhushan,” Information hiding using least significant bit steganography and cryptography,” International Journal of Modern Education and Computer Science, vol. 4, no. 6, p. 27, 2012.

N. A Al-Junaid, A. A Gutub, E. A Khan et al.,” Enhancing pc data security via combining RSA cryptography and video-based steganography,”2018.

X. Zhou, W. Gong, W. Fu, and L. Jin,” An improved method for LSB based color image steganography combined with cryptography,” in 2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS). IEEE, 2016, pp. 1-4.

E. J. Kusuma, C. A. Sari, E. H. Rachmawanto et al., ”A combination of inverted LSB, RSA, and Arnold transformation to get secure and imperceptible image steganography,” Journal of ICT Research and Applications, vol. 12, no. 2, pp. 103-122, 2018.

IEEE Recommended Practice for Software Requirements Specifications, in IEEE Std. 830-1998, vol., no., pp.1-40, Oct. 20 1998, doi: 10.1109/IEEESTD.1998.88286.

S. Wandzura, F. Gyure, and B. Lim Fong. Scalable quantum computer.” U.S. Patent No. 7,875,876. 25 Jan. 2011.

R. Patidar, R. Bhartiya, Modified RSA cryptosystem based on offline storage and prime number, Computational Intelligence and Computing Research (ICCIC), 2013 IEEE International Conference on, vol., no., pp.1,6, 26-28 Dec. 2013.

E.Salguero-Dorokhin, W. Fuertes, and E. Lascano, On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key, Security and Communication Networks, vol. 2019, Article ID 8214681, 10 pages, 2019. https://doi.org/10.1155/2019/8214681. 2019.

G. Singh, A study of encryption algorithms (RSA, DES, 3DES and AES) for information security, International Journal of Computer Applications, vol. 67, no. 19, pp. 33–38, 2013.

Q. Liu, Y. Li, T. Li, and L. Hao, The research of the batch RSA decryption performance, Journal of Comp. Information Systems, vol. 7, no. 3, pp.948–955, 2011.

Y. Prasant, P. Sharma, and K. Yadav. Implementation of RSA algorithm using Elliptic curve algorithm for security and performance enhancement, International Journal of Scientific and Technology Research 1.4, 102-105, 2012.

G. Francia, T. Gomez, Steganography obliterator: an attack on the least significant bits. In Proceedings of the 3rd annual conference on Information security curriculum development. ACM, pp. 85-91. 2006.

A. Jalal. Text in Image Steganography Using LSD Method. Doctoral Thesis. Middle East University, 2014.

F. Meneses, W. Fuertes, J. Sancho, S. Salvador, D. Flores, H. Aules and D. Nuela. ”RSA Encryption Algorithm Optimization to Improve Performance and Security Level of Network Messages, International Journal of Computer Science and Network Security (IJCSNS), 16(8), 55-62. 2016.

W. Fuertes, F. Meneses, L. Hidalgo, and J. Torres, RSA over-encryption implementation for networking. A proof of concept using mobile devices, Revista Investigacion Operacional, Vol. 41, 5, 2020, p. 586-598. ISSN 0257-4306.

E. Molina,” The Theory of Probability and Some Applications to Engineering Problems, Journal of the A.I.E.E., vol. 44, nº 2, pp. 122-127, 1925.

M. Dagadita, E. Slusanschi and R. Dobre, Data Hiding Using Steganography, Parallel and Distributed Computing (ISPDC), 2013 IEEE 12th International Symposium on, Bucharest, Romania, 2013.

W. Fuertes, J. E. Lopez de Vergara, F. Meneses and F. Galán,”A generic model for the management of virtual network environments,” 2010 IEEE Network Operations and Management Symposium - NOMS 2010, Osaka, 2010, pp. 813-816, doi: 10.1109/NOMS.2010.5488367.




DOI: http://dx.doi.org/10.18517/ijaseit.11.4.13728

Refbacks

  • There are currently no refbacks.



Published by INSIGHT - Indonesian Society for Knowledge and Human Development