A steganographic algorithm linked to magic squares (Original)

Authors

  • Alicia María Centurión Fajardo Universidad de Granma
  • Anier Soria Lorente Universidad de Granma
  • Eduardo Moreno Roque Universidad de Granma

Keywords:

steganography; magic squares; asymmetric algorithm

Abstract

The present work corresponds to the introduction of a new algorithm in the preparation of the students of the master's degree, Applied Mathematics of the University of Havana, corresponding to the Postgraduate course, "Steganography and Applications", in addition to the MININT members of In the province of Guantanamo, a novel steganographic algorithm linked to the spatial domain is presented, which uses a 128-bit private key together with the magic squares, with the purpose of hiding highly classified information, so that the resulting image after the insertion is not noticeable to any electronic monitoring system. The proposed algorithm improves in the level of imperceptibility analyzed through the PSNR values; In addition, it provides a quasi-perfect and safe system-stego system reflected in the values ​​achieved for relative entropy (Er). Put the summary in English

References

A. Soria Lorente. ”Implicaciones Sociales de la Criptografía y la Esteganografía “, 2017.
A. Soria Lorente, E.R Moreno Roque y A.M. Centurión Fajardo. “Algoritmo esteganográfico pseudo-asimétrico con claves de 128 bits”. XI Taller metodológico Patriótico Militar, 2015.
A. Soria Lorente, R. Mecías Hechavarría, A.A. Pérez Espinosa D. Rodríguez Díaz “Algoritmo esteganográfico pseudo-asimétrico (Pseudo-asymmetric steganography algorithm)”. Lecturas Matemáticas, vol. 35 (2) pp. 183–196, 2014.
1. D. Biswasa, S. Biswasb, A. Majumdera, D. Sarkara, D. Sinhaa, A. Chowdhurya, S. K. Dasa, “Digital Image Steganography using Dithering Technique”, Procedia Technology, Vol. 4, pp. 251–255, 2012.
2. Mercè Comes y Rosa Comes. “Los cuadrados mágicos matemáticos en andalus. el tratado de Azarquiel”. Universidad de Barcelona, 2004.
3. Cabrera, José. Navigators and castaways in cyberspace: psychosocial experience and cultural practices in school children’s appropriation of the Internet”. En: m. bonilla; g. cliché (eds.). Internet and Society in Latin America and the Caribbean, pp. 21-86. [Versión electrónica]. Ontario: Southbound / IDRC Books. Fecha de consulta: 30/03/07, 2004.
4. Biswajita Datta, Upasana Mukherjee, Samir Kumar Bandyopadhyay.” LSB Layer Independent Robust Steganography using Binary Addition” Procedia Computer Science 85, pp. 425 – 432, 2016.
5. Dunbar B. Steganographic techniques and their use in an Open-Systems environment. SANS Institute; January 2002.
6. Artz D. Digital Steganography: Hiding Data within Data. IEEE Internet Computing Journal; June 2001
7. X. Liao, Q. Wena& J. Zhang, A steganographic method for digital images with fourpixel differencing and modified LSB substitution, J. Vis. Commun. Image R., Vol. 22 , pp. 1–8, 2011.
B. E. Carvajal-Gámez, M. Acevedo & J. L. López-Bonilla, Técnica Esteganográfica para ocultar un video dentro de otro utilizando la Transformada Wavelet Discreta, JVR, Vol. 4, No. 2, pp. 54–61, 2009.
8. O. Cetin and A. T. Ozcerit, A new steganography algorithm based on color histograms for data embedding into raw video streams, Computers & Security, Vol. 28, pp. 670 – 682, 2009.
9. Sena Reddy, M.I,. Siva Kumar, A.P, “Secured Data Transmission Using Wavelet Based Steganography and Cryptography by Using AES Algorithm”, Procedia Computer Science 85, pp. 62 – 69, 2016

Published

2019-11-26

How to Cite

A steganographic algorithm linked to magic squares (Original). (2019). REDEL. Revista Granmense De Desarrollo Local, 3(4), 225-238. https://revistas.udg.co.cu/index.php/redel/article/view/1139