COMBINING STEGANOGRAPHY WITH DATA OBFUSCATION: A STUDY ON ADVANCED SECURITY MEASURES FOR CONFIDENTIAL DATA TRANSMISSION

Authors

  • Manu Dev Chhiller Department of Computer Science Engineering, SRM Institute of Science and Technology, Ramapuram, Chennai, Tamil Nadu, India.
  • Vatsalya Pandey Department of Computer Science Engineering, SRM Institute of Science and Technology, Ramapuram, Chennai, Tamil Nadu, India.
  • Jaydeep Patel Department of Computer Science Engineering, SRM Institute of Science and Technology, Ramapuram, Chennai, Tamil Nadu, India.
  • R. Regin Assistant Professor, Department of Computer Science and Engineering, SRM Institute of Science and Technology, Ramapuram, India.
  • S. Suman Rajest Professor, Dhaanish Ahmed College of Engineering, Chennai, Tamil Nadu, India.

Keywords:

Steganography; Health Transmission, Least Significant Bit; Images, Audio, Video; Python; FPGAs and GPUs ;Pillow; Stegano; Opencv

Abstract

Steganography, derived from the Greek term meaning "covered writing," is the art and science of concealing hidden messages within seemingly innocuous communications, ensuring that only the sender and the intended recipient are aware of the message's existence. This method provides security through obscurity, differentiating itself from other data-hiding techniques by embedding a secret message within an existing channel of communication. Unlike covert channel techniques that establish a new connection between previously unconnected entities, steganography aims to conceal messages within "harmless" communications, making it undetectable to any potential eavesdroppers or adversaries. The crux of steganography lies in the secret key—a short, easily exchangeable random number sequence. Without this key, an adversary would not even suspect the presence of hidden communication within the observed channel. This technique is particularly relevant in scenarios where encrypted communication is not permitted, such as in certain corporate environments or under specific government regulations.  Steganography also intersects with the issue of "hidden channels" in secure operating system design, which involves communication paths that are difficult for access control mechanisms to restrict. In these contexts, steganography provides a viable alternative, allowing covert communication without raising suspicion or violating policies against encrypted messages.

Downloads

Published

2024-07-29

How to Cite

Manu Dev Chhiller, Vatsalya Pandey, Jaydeep Patel, R. Regin, & S. Suman Rajest. (2024). COMBINING STEGANOGRAPHY WITH DATA OBFUSCATION: A STUDY ON ADVANCED SECURITY MEASURES FOR CONFIDENTIAL DATA TRANSMISSION. American Journal of Pediatric Medicine and Health Sciences (2993-2149), 2(7), 101–122. Retrieved from https://grnjournal.us/index.php/AJPMHS/article/view/5589