Enhancing Data Hiding Methods for Improved Cyber Security Through Histogram Shifting Direction Optimization

Alek Nur Fatman, Tohari Ahmad*, Ntivuguruzwa Jean De La Croix, Md Sagar Hossen

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

10 Citations (Scopus)

Abstract

Advancements in information and communication technology have facilitated diverse operational environments, spanning across financial to military sectors. However, these advancements carry an escalation in cybersecurity threats, potentially compromising user privacy and security. Among the various mechanisms introduced to mitigate these threats, data hiding methods stand out. These methods embed covert data within cover data, such as audio and video files, thereby providing an additional layer of security. In this study, we develop upon the existing data hiding techniques, enhancing their capacity to conceal varied sizes of covert data. Our proposed method leverages both right and bottom context pixels for a more nuanced data hiding approach. The effectiveness of this scheme is evaluated by quantifying the quality of the stego data, represented by the Peak Signal to Noise Ratio (PSNR) value. Our initial findings indicate that our method yields superior stego data quality, suggesting its potential to accommodate a larger volume of covert data while preserving the similarity between the cover and stego files. This study thus contributes to more robust and efficient data hiding techniques, bolstering cybersecurity measures in the face of increasing digital threats.

Original languageEnglish
Pages (from-to)1508-1514
Number of pages7
JournalMathematical Modelling of Engineering Problems
Volume10
Issue number5
DOIs
Publication statusPublished - Oct 2023

Keywords

  • Peak Signal to Noise Ratio (PSNR)
  • cyber security
  • data hiding
  • histogram shifting
  • information security
  • network infrastructure
  • steganography

Fingerprint

Dive into the research topics of 'Enhancing Data Hiding Methods for Improved Cyber Security Through Histogram Shifting Direction Optimization'. Together they form a unique fingerprint.

Cite this