Enhancing data security using Laplacian of Gaussian and Chacha20 encryption algorithm

被引:0
|
作者
Fadhil, Fadhil Abbas [1 ]
Alhilo, Farah Tawfiq Abdul Hussien [1 ]
Abdulhadi, Mohammed T. [1 ]
机构
[1] Univ Technol Baghdad, Dept Comp Sci, Baghdad 10066, Iraq
关键词
LoG; Chacha20; Gaussian blur; edge detection; text encryption; DEEP;
D O I
10.1515/jisys-2024-0191
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Concealing sensitive information inside multimedia is very interesting in secure communication due to its wide application. This study discusses the different difficulties involved in embedding the ciphertext inside video frame without affecting the imperceptibility and the strength resistance against different cyberattacks. The main goal of this study is to suggest a novel technique to conceal encrypted data inside video frames securely. This is done by combining the Laplacian of Gaussian (LoG) edge detection algorithm and Chacha20 encryption algorithm. LoG facilitates to detect the suitable location inside video frame for concealing data. While ChaCha20 is used to encrypt data before embedding them inside these locations, which augmenting data security. The proposed method involves sequence of steps involving detecting edges inside video frames, determining the suitable edges for concealing data, encrypting data by XORing it with the encryption key which is generated using ChaCha20 algorithm, embedding the encrypted data inside the determined edges, and then reconstruct the video frame to rebuild the video that involves the concealed encrypted data and keeping the lowest level of visual distortion. The experimental results showed that combining these two approaches provide fast, robust, and secure method, which can be seen by evaluating the system using mean square error, peak signal-to-noise ratio, correlation, number of pixels change rate, unified average changing intensity, and entropy, these evaluation metrics provide excellent results. This study suggests a strong and novel method to embed the encrypted data inside video frames which can be employed in secure communication, copyright protection, and data authentication. Merging LoG and ChaCha20 algorithms produce perfect results in both security and visual perception quality, that provides a means for farther achievement in secure data embedding techniques.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Enhancing Data Security in Fitness Tracker Using HAN Algorithm
    Sudhakaran, Pradeep
    Preetha, M.
    Sindhu, V
    JOURNAL OF PHARMACEUTICAL NEGATIVE RESULTS, 2022, 13 : 460 - 464
  • [22] Research on the Security Protection of Network Communication Data Using DES Encryption Algorithm
    Wang, Tao
    Wang, Jia
    International Journal of Network Security, 2022, 24 (04) : 741 - 746
  • [23] Data Security On RFID Information Using Word Auto Key Encryption Algorithm
    Rahim, Robbi
    Lubis, Syamsuddin
    Nurmalini, N.
    Dafitri, Haida
    1ST INTERNATIONAL CONFERENCE ON ENGINEERING AND APPLIED SCIENCE, 2019, 1381
  • [24] A Hybrid Model Encryption for Enhancing Data Security in Cloud Computing
    Zibouh, Ouadia
    Dalli, Anouar
    Drissi, Hilal
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT THROUGH VISION 2020, 2019, : 3840 - 3849
  • [25] Applying Encryption Algorithm for Data Security in Cloud Storage
    Kartit, Zaid
    Azougaghe, Ali
    Kamal Idrissi, H.
    El Marraki, M.
    Hedabou, M.
    Belkasmi, M.
    Kartit, A.
    ADVANCES IN UBIQUITOUS NETWORKING, 2016, 366 : 141 - 154
  • [26] A Novel Data Encryption Algorithm To Ensure Database Security
    Ibrahim, Sivan
    Zengin, Ahmet
    Hizal, Selman
    Akhter, A. F. M. Suaib
    Altunkaya, Cevat
    ACTA INFOLOGICA, 2023, 7 (01): : 1 - 16
  • [27] Improve Data Security in Cloud Environment by using LDAP and Two Way Encryption Algorithm
    Raipurkar, Kunal V.
    Deorankar, Anil V.
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [28] RETRACTED ARTICLE: Enhancing the security of cloud data using hybrid encryption algorithmEnhancing the security of cloud data using hybrid encryption algorithmK. R. Sajay et al.
    K. R. Sajay
    Suvanam Sasidhar Babu
    Yellepeddi Vijayalakshmi
    Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (Suppl 1) : 51 - 51
  • [29] Enhancing the transmission security of biometric images using chaotic encryption
    Gaurav Bhatnagar
    Q. M. Jonathan Wu
    Multimedia Systems, 2014, 20 : 203 - 214
  • [30] Enhancing security for document exchange using authentication and GAN encryption
    Radhi, Arkan M.
    Hamdani, Tarek M.
    Chabchoub, Habib
    Alimi, Adel M.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (28) : 71203 - 71233