Cite Article

RSA Over-Encryption Employing RGB Channels through a Steganography Variant

Choose citation format

BibTeX

@article{IJASEIT13728,
   author = {Ismael Martínez and Walter Fuertes and Melany Palacios and David Escudero and Tatiana Noboa},
   title = {RSA Over-Encryption Employing RGB Channels through a Steganography Variant},
   journal = {International Journal on Advanced Science, Engineering and Information Technology},
   volume = {11},
   number = {4},
   year = {2021},
   pages = {1432--1439},
   keywords = {RSA; RGB; over-encryption; steganography; decryption.},
   abstract = {This study aims to provide a solution for RSA over-encryption based on steganography variant to hide sensitive information that requires security. The current study describes a software program's implementation phases that allow technicians to re-encrypt a message, first encoded using RSA cryptosystems as an extra security layer. Subsequently, this text was converted into an array of bytes stored in Red, Green, and Blue (RGB) layers of one or more generated images, which will finally be sent to the receiver. The programming recursion technique was used to determine the number of images that need to be sent and the bytes corresponding to each of them. These images were created, reorganized, and encrypted according to pre-defined rules. The security of the proposed method relies heavily on the probability theory. Each of the possible patterns that can store data is equally likely to be chosen by an attacker. The program also uses as a conceptual base the Least Significant Bit Substitution (LSB) technique, with the difference that it directly stores bytes for the RGB values of the generated image(s). Our results indicate that the re-encryption is independent of a carrier image. The number of different ways to organize the pixels and the generated images suggests an acceptable security level. Moreover, it requires a not negligible computational power to decipher the pixels' original order and the channels containing relevant information.},
   issn = {2088-5334},
   publisher = {INSIGHT - Indonesian Society for Knowledge and Human Development},
   url = {http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=13728},
   doi = {10.18517/ijaseit.11.4.13728}
}

EndNote

%A Martínez, Ismael
%A Fuertes, Walter
%A Palacios, Melany
%A Escudero, David
%A Noboa, Tatiana
%D 2021
%T RSA Over-Encryption Employing RGB Channels through a Steganography Variant
%B 2021
%9 RSA; RGB; over-encryption; steganography; decryption.
%! RSA Over-Encryption Employing RGB Channels through a Steganography Variant
%K RSA; RGB; over-encryption; steganography; decryption.
%X This study aims to provide a solution for RSA over-encryption based on steganography variant to hide sensitive information that requires security. The current study describes a software program's implementation phases that allow technicians to re-encrypt a message, first encoded using RSA cryptosystems as an extra security layer. Subsequently, this text was converted into an array of bytes stored in Red, Green, and Blue (RGB) layers of one or more generated images, which will finally be sent to the receiver. The programming recursion technique was used to determine the number of images that need to be sent and the bytes corresponding to each of them. These images were created, reorganized, and encrypted according to pre-defined rules. The security of the proposed method relies heavily on the probability theory. Each of the possible patterns that can store data is equally likely to be chosen by an attacker. The program also uses as a conceptual base the Least Significant Bit Substitution (LSB) technique, with the difference that it directly stores bytes for the RGB values of the generated image(s). Our results indicate that the re-encryption is independent of a carrier image. The number of different ways to organize the pixels and the generated images suggests an acceptable security level. Moreover, it requires a not negligible computational power to decipher the pixels' original order and the channels containing relevant information.
%U http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=13728
%R doi:10.18517/ijaseit.11.4.13728
%J International Journal on Advanced Science, Engineering and Information Technology
%V 11
%N 4
%@ 2088-5334

IEEE

Ismael Martínez,Walter Fuertes,Melany Palacios,David Escudero and Tatiana Noboa,"RSA Over-Encryption Employing RGB Channels through a Steganography Variant," International Journal on Advanced Science, Engineering and Information Technology, vol. 11, no. 4, pp. 1432-1439, 2021. [Online]. Available: http://dx.doi.org/10.18517/ijaseit.11.4.13728.

RefMan/ProCite (RIS)

TY  - JOUR
AU  - Martínez, Ismael
AU  - Fuertes, Walter
AU  - Palacios, Melany
AU  - Escudero, David
AU  - Noboa, Tatiana
PY  - 2021
TI  - RSA Over-Encryption Employing RGB Channels through a Steganography Variant
JF  - International Journal on Advanced Science, Engineering and Information Technology; Vol. 11 (2021) No. 4
Y2  - 2021
SP  - 1432
EP  - 1439
SN  - 2088-5334
PB  - INSIGHT - Indonesian Society for Knowledge and Human Development
KW  - RSA; RGB; over-encryption; steganography; decryption.
N2  - This study aims to provide a solution for RSA over-encryption based on steganography variant to hide sensitive information that requires security. The current study describes a software program's implementation phases that allow technicians to re-encrypt a message, first encoded using RSA cryptosystems as an extra security layer. Subsequently, this text was converted into an array of bytes stored in Red, Green, and Blue (RGB) layers of one or more generated images, which will finally be sent to the receiver. The programming recursion technique was used to determine the number of images that need to be sent and the bytes corresponding to each of them. These images were created, reorganized, and encrypted according to pre-defined rules. The security of the proposed method relies heavily on the probability theory. Each of the possible patterns that can store data is equally likely to be chosen by an attacker. The program also uses as a conceptual base the Least Significant Bit Substitution (LSB) technique, with the difference that it directly stores bytes for the RGB values of the generated image(s). Our results indicate that the re-encryption is independent of a carrier image. The number of different ways to organize the pixels and the generated images suggests an acceptable security level. Moreover, it requires a not negligible computational power to decipher the pixels' original order and the channels containing relevant information.
UR  - http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=13728
DO  - 10.18517/ijaseit.11.4.13728

RefWorks

RT Journal Article
ID 13728
A1 Martínez, Ismael
A1 Fuertes, Walter
A1 Palacios, Melany
A1 Escudero, David
A1 Noboa, Tatiana
T1 RSA Over-Encryption Employing RGB Channels through a Steganography Variant
JF International Journal on Advanced Science, Engineering and Information Technology
VO 11
IS 4
YR 2021
SP 1432
OP 1439
SN 2088-5334
PB INSIGHT - Indonesian Society for Knowledge and Human Development
K1 RSA; RGB; over-encryption; steganography; decryption.
AB This study aims to provide a solution for RSA over-encryption based on steganography variant to hide sensitive information that requires security. The current study describes a software program's implementation phases that allow technicians to re-encrypt a message, first encoded using RSA cryptosystems as an extra security layer. Subsequently, this text was converted into an array of bytes stored in Red, Green, and Blue (RGB) layers of one or more generated images, which will finally be sent to the receiver. The programming recursion technique was used to determine the number of images that need to be sent and the bytes corresponding to each of them. These images were created, reorganized, and encrypted according to pre-defined rules. The security of the proposed method relies heavily on the probability theory. Each of the possible patterns that can store data is equally likely to be chosen by an attacker. The program also uses as a conceptual base the Least Significant Bit Substitution (LSB) technique, with the difference that it directly stores bytes for the RGB values of the generated image(s). Our results indicate that the re-encryption is independent of a carrier image. The number of different ways to organize the pixels and the generated images suggests an acceptable security level. Moreover, it requires a not negligible computational power to decipher the pixels' original order and the channels containing relevant information.
LK http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=13728
DO  - 10.18517/ijaseit.11.4.13728