Int J Performability Eng ›› 2024, Vol. 20 ›› Issue (10): 591-601.doi: 10.23940/ijpe.24.10.p1.591601

• Original article •     Next Articles

A Novel Citadel Security Framework for Cyber Data using CryptSteg Techniques

Kukreja Bhawnaa*(), Kumar Malik Sanjaya, and Sharma Ajayb   

  1. a Department of Computer Science and Engineering, SRM University, Haryana, India
    b Computer Science and Engineering, SGT University, Haryana, India
  • Submitted on ; Revised on ; Accepted on
  • Contact: Kukreja Bhawna E-mail:75515210004@stu.srmuniversity.ac.in
  • About author:

    E-mail address: 75515210004@stu.srmuniversity.ac.in

Abstract:

The global growth of the e-commerce industry has heightened concerns among consumers, businesses, , and financial institutions regarding fraud while using credit and debit cards and safeguarding personal information. It is necessary to secure information disseminated over insecure channels to prevent unauthorized access. Cryptography and steganography are widely used for this purpose. However, completely relying on the combined usage of both may not be enough in today’s world, resulting in weak security. By combining visual cryptography, more levels of security can be added, thus boosting the security of secret information. This study suggests a data security framework that employs multiple levels of security for information. At the first level of security, cryptography is used to encrypt the secret information, and at the second level of security steganography is used to conceal the encrypted text. After that, visual cryptography is applied, which generates the shares of the image obtained. Finally, image steganography is used to hide the generated shares in different color images. When used together, these data security methods greatly improve the secrecy, trustworthiness, and effectiveness of secret messages. The precision of text is determined through Mean Square Analysis (MSE) and correlation coefficient, which involves a comparison of sent and received text. MATLAB environment is used for the implementation.

Key words: encryption, decryption, cryptography, steganography, visual cryptography, security, cyber data