Enhancing Steganography with Blockchain: A Novel Approach for Secure Text Hiding in Encrypted Images
DOI:
https://doi.org/10.31449/inf.v48i21.6689Abstract
Steganography is a technique used to hide data within other data, emerging from the realization that information is valuable and must be concealed. By considering the potential of blockchain technology, which produces and stores data in an immutable chain, it is clear that steganography can be effectively applied alongside blockchain to hide information. This approach eliminates the need for traditional hiding methods. In this study, we aim to hide text messages within encrypted images using a new steganography-based blockchain, making them appear as ordinary encrypted images. The AES algorithm in CBC mode was used to encrypt both images and texts. Each image was split into 32-byte blocks, with a special block allocated for text, allowing for a text size of 32 characters. The robustness of the proposed technique against differential attacks was assessed using unified averaged changed intensity (UACI), number of pixels change rate (NPCR), entropy analysis, and correlation analysis. The outcomes show that the proposed encryption method generates random images and secure texts that are resistant of differential attacks as well as offer the high-level security.References
A. Sabir, H. A. Ali, and M. A. Aljabery, “ChatGPT Tweets Sentiment Analysis Using Machine Learning and Data Classification,” Inform., vol. 48, no. 7, pp. 103–112, 2024, doi: 10.31449/inf.v48i7.5535.
M. Takaoğlu, A. Özyavaş, N. Ajlouni, A. Alshahrani, and B. Alkasasbeh, “A novel and robust hybrid blockchain and steganography scheme,” Appl. Sci., vol. 11, no. 22, 2021, doi: 10.3390/app112210698.
A. Jan, S. A. Parah, M. Hussan, and B. A. Malik, “Double layer security using crypto-stego techniques: a comprehensive review,” Health Technol. (Berl)., vol. 12, no. 1, pp. 9–31, 2022, doi: 10.1007/s12553-021-00602-1.
A. H. Mohsin et al., “PSO–Blockchain-based image steganography: towards a new method to secure updating and sharing COVID-19 data in decentralised hospitals intelligence architecture,” Multimed. Tools Appl., vol. 80, no. 9, pp. 14137–14161, 2021, doi: 10.1007/s11042-020-10284-y.
P. W. Khan and Y. Byun, “A blockchain-based secure image encryption scheme for the industrial internet of things,” Entropy, vol. 22, no. 2, 2020, doi: 10.3390/e22020175.
A. K. Bermani, T. A. K. Murshedi, and Z. A. Abod, “A hybrid cryptography technique for data storage on cloud computing,” J. Discret. Math. Sci. Cryptogr., vol. 24, no. 6, pp. 1613–1624, 2021, doi: 10.1080/09720529.2020.1859799.
K. Koptyra and M. R. Ogiela, “Imagechain—application of blockchain technology for images,” Sensors (Switzerland), vol. 21, no. 1, pp. 1–12, 2021, doi: 10.3390/s21010082.
M. N. M. Bhutta et al., “A Survey on Blockchain Technology: Evolution, Architecture and Security,” IEEE Access, vol. 9, pp. 61048–61073, 2021, doi: 10.1109/ACCESS.2021.3072849.
M. Y. Jabarulla and H. N. Lee, “Blockchain-based distributed patient-centric image management system,” Appl. Sci., vol. 11, no. 1, pp. 1–20, 2021, doi: 10.3390/app11010196.
P. Ms.Jahanvi, Navtej, Medini H, Mamisha, “Blockchain Technology Based Image Steganography,” Int. J. Creat. Res. Thoughts, vol. 11, no. May, pp. 82–87, 2023.
D. Brabin, C. Ananth, and S. Bojjagani, “Blockchain based security framework for sharing digital images using reversible data hiding and encryption,” Multimed. Tools Appl., vol. 81, no. 17, pp.
–24738, 2022, doi: 10.1007/s11042-022-12617-5.
A. Roshanzamir, V. Weerakkody, N. Rana, M. Rahmati, and M. Shajari, “Blockchain and Image Processing to Reinforce Provenance in the Narrative of a Handwoven Carpet,” Int. J. Adv. Internet Technol., vol. 12, no. 3, pp. 61–75, 2019, [Online]. Available: http://www.iariajournals.org/internet_technology/
J. H. Horng, C. C. Chang, G. L. Li, W. K. Lee, and S. O. Hwang, “Blockchain-Based Reversible Data Hiding for Securing Medical Images,” J. Healthc. Eng., vol. 2021, 2021, doi: 10.1155/2021/9943402.
M. Acharya and R. S. Sharma, “A novel image encryption based on feedback carry shift register and blockchain for secure communication,” Int. J. Appl. Eng. Res., vol. 16, no. 6, pp. 466–477, 2021.
R. Bhaskaran, R. Karuppathal, M. Karthick, J. Vijayalakshmi, S. Kadry, and Y. Nam, “Blockchain Enabled Optimal Lightweight Cryptography Based Image Encryption Technique for IIoT,” Intell. Autom. Soft Comput., vol. 33, no. 3, pp. 1593–1606, 2022, doi: 10.32604/iasc.2022.024902.
S. Inam, S. Kanwal, R. Firdous, and F. Hajjej, “Blockchain based medical image encryption using Arnold’s cat map in a cloud environment,” Sci. Rep., vol. 14, no. 1, pp. 1–22, 2024, doi: 10.1038/s41598-024-56364-z.
“secrets — Generate secure random numbers for managing secrets.” https://docs.python.org/3/library/secrets.html (accessed Feb. 17, 2024).
S. Kurnaz and M. A. H. Aljabery, “Predict the type of hearing aid of audiology patients using data mining techniques,” ACM Int. Conf. Proceeding Ser., pp. 2–6, 2018, doi: 10.1145/3234698.3234755.
G. K. Shraida and H. A. Younis, “An Efficient Diffusion Approach for Chaos-Based Image Encryption and DNA Sequences,” Iraqi J. Electr. Electron. Eng., vol. 18, no. 2, pp. 69–74, 2022, doi: 10.37917/ijeee.18.2.9.
Z. Man, J. Li, X. Di, and O. Bai, “An Image Segmentation Encryption Algorithm Based on Hybrid Chaotic System,” IEEE Access, vol. 7, pp. 103047–103058, 2019, doi: 10.1109/ACCESS.2019.2931732.
Z. A. Abduljabbar et al., “Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Map,” IEEE Access, vol. 10, pp. 26257–26270, 2022, doi: 10.1109/ACCESS.2022.3151174.
O. S. Faragallah, H. S. El-sayed, A. Afifi, and W. El-Shafai, “Efficient and secure opto-cryptosystem for color images using 2D logistic-based fractional Fourier transform,” Opt. Lasers Eng., vol. 137, no. May 2020, 2021, doi: 10.1016/j.optlaseng.2020.106333.
G. K. Shraida, H. A. Younis, T. A. Al-Amiedy, M. Anbar, H. A. Younis, and I. H. Hasbullah, “An Efficient Color-Image Encryption Method Using DNA Sequence and Chaos Cipher,” Comput. Mater. Contin., vol. 75, no. 2, pp. 2641–2654, 2023, doi: 10.32604/cmc.2023.035793.
Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika