Please use this identifier to cite or link to this item: https://www.um.edu.mt/library/oar/handle/123456789/107624
Title: An efficient sound and data steganography based secure authentication system
Authors: Datta, Debajit
Garg, Lalit
Srinivasan, Kathiravan
Inoue, Atsushi
Reddy, G. Thippa
Reddy, M. Praveen Kumar
Ramesh, K.
Nasser, Nidal
Keywords: Data encryption (Computer science)
Image steganography – Data processing
Sound -- Data processing
Cyberterrorism -- Prevention
Computer networks -- Security measures
Issue Date: 2021
Publisher: Tech Science Press
Citation: Datta, D., Garg, L., Srinivasan, K., Inoue, A., Reddy, G. T., Reddy, M. P. K.,...Nasser, N. (2021). An efficient sound and data steganography based secure authentication system. Computers, Materials & Continua, 67, 723-751.
Abstract: The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks. Further, the pin-based security system is an inadequate mechanism for handling such a scenario. The reason is that hackers use multiple strategies for evading security systems and thereby gaining access to private data. This research proposes to deploy diverse approaches for authenticating and securing a connection amongst two devices/gadgets via sound, thereby disregarding the pins’ manual verification. Further, the results demonstrate that the proposed approaches outperform conventional pin-based authentication orQR authentication approaches. Firstly, a random signal is encrypted, and then it is transformed into a wave file, after which it gets transmitted in a short burst via the device’s speakers. Subsequently, the other device/gadget captures these audio bursts through its microphone and decrypts the audio signal for getting the essential data for pairing. Besides, this model requires two devices/gadgets with speakers and a microphone, and no extra hardware such as a camera, for reading the QR code is required. The first module is tested with real-time data and generates high scores for the widely accepted accuracy metrics, including precision, Recall, F1 score, entropy, and mutual information (MI). Additionally, this work also proposes a module helps in a secured transmission of sensitive data by encrypting it over images and other files. This steganographic module includes two-stage encryption with two different encryption algorithms to transmit data by embedding inside a file. Several encryption algorithms and their combinations are taken for this system to compare the resultant file size. Both these systems engender high accuracies and provide secure connectivity, leading to a sustainable communication ecosystem.
URI: https://www.um.edu.mt/library/oar/handle/123456789/107624
Appears in Collections:Scholarly Works - FacICTCIS

Files in This Item:
File Description SizeFormat 
An efficient sound and data steganography based secure authentication system 2021.pdf4.86 MBAdobe PDFView/Open


Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.