Enhancement of the Security of Data by Associating Obfuscation Technique Along with Steganography

Authors

  • Varya Aggarwal Student, Class 12th, Doon Global School, Dehradun, Uttrakhand

DOI:

https://doi.org/10.29070/zyhf6r09

Keywords:

Data Security, Data storage, Steganography, Cloud service provider, Least significant bit

Abstract

The safety of stored data in the cloud is of the utmost significance. There is a lot of room for user data in cloud storage. This technology has proven to be a groundbreaking effort because of its ability to offer cheap, extensive computational storage that users may access from anywhere at any time. By entrusting their data to the cloud, users may take advantage of services that are flexible, efficient, and run smoothly. Once data has been transferred to the cloud, the onus for its administration shifts entirely to the CSP. Data stored in the cloud raises a number of security problems, in addition to the benefits. Data in transit and data at rest are both susceptible to assaults when users move their data to the cloud. Data protection and building confidence in cloud services are now top priorities. Data should be kept in an encrypted or masked format to prevent unauthorised access. One major problem with cloud computing is the lack of assurance around data protection. By integrating obfuscation with steganography, this study reveals a novel and advanced method to strengthen data security. To guarantee confidentiality, the proposed method incorporates obfuscation and steganography techniques. In contrast to steganography, whose main goal is to mask the existence of information, obfuscation primarily seeks to transform data into a different form while simultaneously concealing the original data. Using the Least Significant Bit (LSB) replacement technique, the hidden text may be hidden inside a picture. The results of the experiments show that the proposed method may successfully integrate large amounts of data and generate high-quality stego images.

References

Ahmad, M., & Aziz, M. (2020). A novel data security model integrating obfuscation and steganography. Journal of Information Security and Applications, 54, 102531.

Al-Husainy, M., & Al-Husainy, A. (2018). Combining obfuscation and steganography for secure data communication. Journal of Computer Science, 14(7), 913-923.

Bhargava, B., & Singhal, S. (2019). Enhancing data security using hybrid obfuscation and steganography techniques. International Journal of Computer Applications, 182(44), 25-32.

Biswas, S., & Deb, K. (2021). An improved method for secure data transmission using obfuscation and image steganography. International Journal of Information Security, 20(3), 473-488.

Chen, X., & Zhang, L. (2020). Secure data transmission using obfuscation and audio steganography. Multimedia Tools and Applications, 79(41), 31439-31455.

Das, R., & Roy, S. (2017). A comprehensive review on data security using obfuscation and steganography techniques. Journal of Theoretical and Applied Information Technology, 95(14), 3487-3497.

Debnath, D., & Mukherjee, R. (2021). A hybrid approach to data security using obfuscation and video steganography. Security and Privacy, 4(6), e146.

Gupta, R., & Sharma, M. (2022). Data security enhancement using obfuscation and steganography in cloud computing. Journal of Cloud Computing: Advances, Systems and Applications, 11(1), 19.

Jain, A., & Mishra, A. (2019). Data security using a combined approach of obfuscation and steganography. Procedia Computer Science, 167, 2371-2378.

Kaur, G., & Kaur, P. (2021). Securing medical data using obfuscation and steganography. IEEE Access, 9, 159823-159837.

Kumar, A., & Singh, P. (2023). Enhancing IoT data security using hybrid obfuscation and steganography techniques. Journal of Network and Computer Applications, 207, 103450.

Li, X., & Zhang, Y. (2018). An integrated approach to secure data using obfuscation and steganography. Computers & Security, 74, 40-54.

Mandal, S., & Mandal, A. (2020). A review on advanced data security techniques using obfuscation and steganography. Cybersecurity, 3(1), 19.

Mehta, P., & Patel, S. (2021). Secure data sharing using obfuscation and steganography in wireless networks. Wireless Personal Communications, 119(2), 1091-1105.

Mukherjee, P., & Roy, D. (2017). Data protection using obfuscation and steganography: A comparative study. International Journal of Network Security & Its Applications, 9(6), 41-55.

Nair, V., & Thomas, T. (2022). Enhancing cybersecurity using obfuscation and steganography in blockchain technology. Future Generation Computer Systems, 134, 24-36.

Pandey, S., & Verma, V. (2020). A hybrid security model using obfuscation and image steganography. Advances in Intelligent Systems and Computing, 1102, 97-109.

Patil, R., & Kumar, S. (2023). An integrated approach to data security using obfuscation and steganography in financial systems. Journal of Financial Crime, 30(1), 85-100.

Reddy, G., & Rao, K. (2019). Improving data security in social networks using obfuscation and steganography. Journal of Information Security and Privacy, 5(2), 45-61.

Sarma, H., & Pathak, P. (2018). Secure data storage using obfuscation and steganography in cloud environments. Journal of Cloud Computing, 7(1), 12.

Singh, A., & Kaur, A. (2022). A hybrid technique for data security using obfuscation and steganography. Journal of Information Security Research, 13(3), 123-137.

Tiwari, R., & Kumar, A. (2021). Enhancing database security using obfuscation and steganography techniques. Information Systems Security, 30(2), 192-206.

Wang, Y., & Chen, J. (2020). Data security in distributed systems using obfuscation and steganography. Journal of Distributed Computing and Networking, 23(4), 521-533.

Zhang, H., & Liu, X. (2017). Enhancing data security in mobile networks using obfuscation and steganography. Mobile Networks and Applications, 22(4), 761-773.

Zhou, Q., & Li, K. (2019). A hybrid data security model combining obfuscation and steganography. Journal of Internet Technology, 20(3), 815-828.

Downloads

Published

2024-07-01

How to Cite

[1]
“Enhancement of the Security of Data by Associating Obfuscation Technique Along with Steganography”, JASRAE, vol. 21, no. 5, pp. 18–24, Jul. 2024, doi: 10.29070/zyhf6r09.

How to Cite

[1]
“Enhancement of the Security of Data by Associating Obfuscation Technique Along with Steganography”, JASRAE, vol. 21, no. 5, pp. 18–24, Jul. 2024, doi: 10.29070/zyhf6r09.