Acta Scientific Computer Sciences

Review Article Volume 5 Issue 10

Enhancing Secure Communication: Implementation and Optimization of a Novel Algorithm for Steganography with Improved Security and Efficiency

Sudipta Dey1* and Tathagata Roy Chowdhury2

1Scholar, Masters of Business Administration, Swami Vivekananda University, India
2Assistant Professor, Department of Computer Science and Engineering, St Mary’s Technical Campus Kolkata, India

*Corresponding Author: Sudipta Dey, Scholar, Masters of Business Administration, Swami Vivekananda University, India.

Received: September 06, 2023; Published: September 30, 2023

Abstract

Steganography, the art of concealing confidential data within seemingly benign carrier data like images, audio, or text, presents an ongoing conundrum of simultaneously upholding security and efficiency. This paper introduces a novel algorithm designed to not only implement but also enhance the practice of steganography. The algorithm incorporates state-of-the-art encryption techniques and optimized data embedding strategies, aiming to elevate the concealment of sensitive information while minimizing any adverse effects on the integrity and perceptual quality of the carrier data. Furthermore, it pays heed to the ever-present security concerns, seeking to lower the risks of detection and unauthorized extraction of the concealed information. In a comprehensive analysis, we evaluate the algorithm's performance across a spectrum of carrier data types and diverse secret information payloads. The results reveal a significant leap in effectiveness compared to existing steganographic methodologies. The proposed algorithm excels in terms of bolstered security, reduced distortion to the carrier data, and an augmented capacity for information embedding. These findings resonate as a noteworthy contribution to the realm of steganography, offering a unique solution that adeptly balances the precarious scales of security and efficiency. Consequently, it emerges as a valuable instrument for secure communication and safeguarding sensitive data.
This research's implications extend beyond the immediate development of the proposed algorithm. It encourages the academic and professional community to delve deeper into the multifaceted world of steganography. As the digital era continually presents evolving security challenges, the pursuit of innovative steganographic techniques is vital. This paper serves as a catalyst for further exploration, stimulating the collective endeavor to adapt and refine steganography in response to contemporary security needs. In doing so, it reinforces the age-old adage that in the clandestine realm of information security, concealment and safeguarding are enduring priorities.

Keywords: Steganography; Security; Efficiency; Algorithm; Concealment; Encryption; Data embedding; Carrier Data; Secret Information; Detection Mitigation; Perceptual Quality; Distortion; Embedding Capacity; Secure Communication; Data Protectionr

References

  1. Johnson A., et al. “A Novel Encryption-Based Steganography Algorithm for Secure Communication”. International Journal of Information Security5 (2018): 587-605.
  2. Smith D and Brown E. “Efficient Data Embedding Techniques for Steganography”. IEEE Transactions on Information Forensics and Security 15 (2020): 1694-1706.
  3. Liu J., et al. “Deep Learning-Based Steganalysis: A Comprehensive Review”. IEEE Access 7 (2019): 168090-168115.
  4. Wang Q and Zhang X. “Steganalysis Based on Deep Learning: An Overview”. IEEE Access 9 (2021): 7850-7869.
  5. Chen R and Du M. “Enhancing the Security of Steganography Using Chaotic Maps”. Applied Soft Computing 62 (2017): 786-796.
  6. Li Y and Wang L. “Adaptive Steganography Based on Advanced Encryption Standard”. Journal of Visual Communication and Image Representation 62 (2019): 67-76.
  7. Shen C and Huang Y. “Efficient and Secure Steganography Using Huffman Encoding and Chaotic Maps”. Journal of Information Security and Applications 50 (2020): 102395.
  8. Hu J and Chen H. “A High-Capacity Steganographic Algorithm Based on Improved Wavelet Transform and RSA Cryptography”. Journal of Ambient Intelligence and Humanized Computing5 (2021): 6353-6364.
  9. Zhang Y., et al. “Improved Steganography Algorithm Based on Compressed Sensing”. Future Generation Computer Systems 79 (2018): 540-548.
  10. Yang Z and Cheng J. “A New Data Hiding Algorithm Based on Block Modulation in Steganography”. Journal of Systems Engineering and Electronics6 (2019): 1098-1106.
  11. Shao L and He D. “Hybrid Particle Swarm Optimization Algorithm for Steganography”. Journal of Computational Science 19 (2017): 169-177.
  12. Jiang W., et al. “A Secure and Efficient Steganographic Algorithm Based on Dynamic Structure”. Journal of Supercomputing10 (2020): 8279-8293.
  13. Wang J., et al. “A Novel Steganography Algorithm Based on Image Content Complexity”. Soft Computing10 (2021): 6829-6842.
  14. Zhao H and Sun X. “An Improved Steganography Algorithm Based on Genetic Algorithm and Discrete Wavelet Transform”. Security and Communication Networks (2018).
  15. Chen L and Zeng W. “An Efficient Adaptive Steganography Algorithm Based on Pixel Mapping”. Multimedia Tools and Applications1 (2020): 741-759.
  16. Zeng W and Zhang Y. “A New Steganography Algorithm Based on Dynamic Pixel Adjustment”. Multimedia Tools and Applications15 (2019): 21051-21065.
  17. Jiang Y and Wang F. “Steganography Algorithm Based on Multi-Objective Optimization”. Neural Computing and Applications 28.3 (2017): 483-493.
  18. Wu J and Tan X. “A Novel Steganography Algorithm Based on Improved Genetic Algorithm”. Journal of Ambient Intelligence and Humanized Computing3 (2018): 675-683.
  19. Li Q and Lu H. “A Secure and Efficient Steganography Algorithm Based on LSB Substitution and Pseudo Random Permutation”. Journal of Ambient Intelligence and Humanized Computing4 (2021): 5749-5760.
  20. Wu X., et al. “Enhanced Steganography Algorithm Based on Dynamic Huffman Encoding”. Multimedia Tools and Applications7 (2019): 8219-8235.

Citation

Citation: Sudipta Dey., et al. “Enhancing Secure Communication: Implementation and Optimization of a Novel Algorithm for Steganography with Improved Security and Efficiency".Acta Scientific Computer Sciences 5.10 (2023): 58-68.

Copyright

Copyright: © 2023 Sudipta Dey., et al This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.




Metrics

Acceptance rate35%
Acceptance to publication20-30 days

Indexed In




News and Events


  • Certification for Review
    Acta Scientific certifies the Editors/reviewers for their review done towards the assigned articles of the respective journals.
  • Submission Timeline for Upcoming Issue
    The last date for submission of articles for regular Issues is November 25, 2024.
  • Publication Certificate
    Authors will be issued a "Publication Certificate" as a mark of appreciation for publishing their work.
  • Best Article of the Issue
    The Editors will elect one Best Article after each issue release. The authors of this article will be provided with a certificate of "Best Article of the Issue"
  • Welcoming Article Submission
    Acta Scientific delightfully welcomes active researchers for submission of articles towards the upcoming issue of respective journals.

Contact US