Enhancing data security using Laplacian of Gaussian and Chacha20 encryption algorithm

被引:0
|
作者
Fadhil, Fadhil Abbas [1 ]
Alhilo, Farah Tawfiq Abdul Hussien [1 ]
Abdulhadi, Mohammed T. [1 ]
机构
[1] Univ Technol Baghdad, Dept Comp Sci, Baghdad 10066, Iraq
关键词
LoG; Chacha20; Gaussian blur; edge detection; text encryption; DEEP;
D O I
10.1515/jisys-2024-0191
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Concealing sensitive information inside multimedia is very interesting in secure communication due to its wide application. This study discusses the different difficulties involved in embedding the ciphertext inside video frame without affecting the imperceptibility and the strength resistance against different cyberattacks. The main goal of this study is to suggest a novel technique to conceal encrypted data inside video frames securely. This is done by combining the Laplacian of Gaussian (LoG) edge detection algorithm and Chacha20 encryption algorithm. LoG facilitates to detect the suitable location inside video frame for concealing data. While ChaCha20 is used to encrypt data before embedding them inside these locations, which augmenting data security. The proposed method involves sequence of steps involving detecting edges inside video frames, determining the suitable edges for concealing data, encrypting data by XORing it with the encryption key which is generated using ChaCha20 algorithm, embedding the encrypted data inside the determined edges, and then reconstruct the video frame to rebuild the video that involves the concealed encrypted data and keeping the lowest level of visual distortion. The experimental results showed that combining these two approaches provide fast, robust, and secure method, which can be seen by evaluating the system using mean square error, peak signal-to-noise ratio, correlation, number of pixels change rate, unified average changing intensity, and entropy, these evaluation metrics provide excellent results. This study suggests a strong and novel method to embed the encrypted data inside video frames which can be employed in secure communication, copyright protection, and data authentication. Merging LoG and ChaCha20 algorithms produce perfect results in both security and visual perception quality, that provides a means for farther achievement in secure data embedding techniques.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Data Security in Recommendation System Using Homomorphic Encryption
    Soni, Kajol
    Panchal, Gaurang
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS (ICTIS 2017) - VOL 1, 2018, 83 : 308 - 313
  • [42] Biometric data security using joint encryption and watermarking
    Mehta, Garima
    Dutta, Malay Kishore
    Kim, Pyung Soo
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2019, 11 (04) : 379 - 394
  • [43] Paralleled Laplacian of Gaussian (LoG) Edge Detection Algorithm by Using GPU
    Wu, Weibin
    EIGHTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2016), 2016, 10033
  • [44] Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption
    Mohammed, Mohanad A.
    Wahab, Hala B. Abdul
    CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2024, 138 (02): : 1731 - 1748
  • [45] Enhancing Security and Confidentiality on Mobile Devices by Location-based Data Encryption
    Karimi, Rohollah
    Kalantari, Mohammad
    2011 17TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS (ICON), 2011, : 241 - 245
  • [46] Enhancing Security of Logic Encryption Using Embedded Key Generation Unit
    Karmakar, Rajit
    Chattopadhyay, Santanu
    Kapur, Rohit
    2017 INTERNATIONAL TEST CONFERENCE IN ASIA (ITC-ASIA), 2017, : 131 - 136
  • [47] Enhancing Distributed Data Storage Security for Cloud Computing Using TPA and AES algorithm
    Shimbre, Nivedita
    Deshpande, Priya
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 35 - 39
  • [48] DATA ENCRYPTION AND DECRYPTION USING ANZL ALGORITHM
    Luma, Artan
    Zeqiri, Nderim
    ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL ISAS-1: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, VOL 1, 2008, : 220 - 223
  • [49] Improving security of parallel algorithm using key encryption technique
    Sujitha, G.
    Varadharajan, M.
    Vignesh Rao, Y.
    Sridev, R.
    Sarvesh Gauthaum, M.K.
    Narayanan, Sowmy
    Swarna Raja, R.
    Mercy Shalinie, S.
    Information Technology Journal, 2013, 12 (12) : 2398 - 2404
  • [50] Efficient Joint Encryption and Data Hiding Algorithm for Medical Images Security
    Abdel-Nabi, Hiba
    Al-Haj, Ali
    2017 8TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS), 2017, : 147 - 152