Title of article :
Using steganography techniques for implicit authentication to enhance sensitive data hiding
Author/Authors :
Najeh Kadhum, Rafal Department of Computer Science - College of Science - University of Baghdad, Baghdad, Iraq , Hussein M. Ali, Nada Department of Computer Science - College of Science - University of Baghdad, Baghdad, Iraq
Pages :
11
From page :
3973
To page :
3983
Abstract :
Smartphones recently become indispensable to users due to the services provided, like Internet access and important applications (e.g., financial and health applications). which contain personal and confidential information about the user. Consequently, this information is vulnerable to hackers and data privacy violations. This article describes the effective safeguard of sensitive data from different attacks. It's the second level of protection after using implicit authentication. If implicit authentication allows an unauthorized user to access sensitive data, we encrypt it using AES-GCM and hide it under a cover image with LSB Steganography. We noticed that recommended solution is highly effective at data protection while consuming less Memory and being relatively fast. To evaluate the system's efficacy, Peak Signal-to-Noise Ratio(PSNR), Means Square Error(MSE), and Pearson Coefficient Correlation (PCC)are employed as evaluation metrics. Best results are found in sunset image 27KB, with values of MSE (0.005245) and PSNR (70.9547). The (PCC) values are always zero, indicating that there is no relationship between the original text and the encrypted text, implying that the AES-GCM encryption is effective.
Keywords :
Encryption , Steganography , information security , data protection , AES , GCM , LSB , sensitive data , features , Android Studio , AES-GCM , Mobile Computing , hiding , Implicit Authentication
Journal title :
International Journal of Nonlinear Analysis and Applications
Serial Year :
2022
Record number :
2714485
Link To Document :
بازگشت