Please use this identifier to cite or link to this item:
https://www.um.edu.mt/library/oar/handle/123456789/107624
Title: | An efficient sound and data steganography based secure authentication system |
Authors: | Datta, Debajit Garg, Lalit Srinivasan, Kathiravan Inoue, Atsushi Reddy, G. Thippa Reddy, M. Praveen Kumar Ramesh, K. Nasser, Nidal |
Keywords: | Data encryption (Computer science) Image steganography – Data processing Sound -- Data processing Cyberterrorism -- Prevention Computer networks -- Security measures |
Issue Date: | 2021 |
Publisher: | Tech Science Press |
Citation: | Datta, D., Garg, L., Srinivasan, K., Inoue, A., Reddy, G. T., Reddy, M. P. K.,...Nasser, N. (2021). An efficient sound and data steganography based secure authentication system. Computers, Materials & Continua, 67, 723-751. |
Abstract: | The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented cyber-attacks. Further, the pin-based security system is an inadequate mechanism for handling such a scenario. The reason is that hackers use multiple strategies for evading security systems and thereby gaining access to private data. This research proposes to deploy diverse approaches for authenticating and securing a connection amongst two devices/gadgets via sound, thereby disregarding the pins’ manual verification. Further, the results demonstrate that the proposed approaches outperform conventional pin-based authentication orQR authentication approaches. Firstly, a random signal is encrypted, and then it is transformed into a wave file, after which it gets transmitted in a short burst via the device’s speakers. Subsequently, the other device/gadget captures these audio bursts through its microphone and decrypts the audio signal for getting the essential data for pairing. Besides, this model requires two devices/gadgets with speakers and a microphone, and no extra hardware such as a camera, for reading the QR code is required. The first module is tested with real-time data and generates high scores for the widely accepted accuracy metrics, including precision, Recall, F1 score, entropy, and mutual information (MI). Additionally, this work also proposes a module helps in a secured transmission of sensitive data by encrypting it over images and other files. This steganographic module includes two-stage encryption with two different encryption algorithms to transmit data by embedding inside a file. Several encryption algorithms and their combinations are taken for this system to compare the resultant file size. Both these systems engender high accuracies and provide secure connectivity, leading to a sustainable communication ecosystem. |
URI: | https://www.um.edu.mt/library/oar/handle/123456789/107624 |
Appears in Collections: | Scholarly Works - FacICTCIS |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
An efficient sound and data steganography based secure authentication system 2021.pdf | 4.86 MB | Adobe PDF | View/Open |
Items in OAR@UM are protected by copyright, with all rights reserved, unless otherwise indicated.