Future of Information and Communication Conference (FICC) 2025
28-29 April 2025
Publication Links
IJACSA
Special Issues
Future of Information and Communication Conference (FICC)
Computing Conference
Intelligent Systems Conference (IntelliSys)
Future Technologies Conference (FTC)
International Journal of Advanced Computer Science and Applications(IJACSA), Volume 10 Issue 4, 2019.
Abstract: One of the most important issue in this domain is the security concern of the transfer data. The online transfer data may access illegally through attack the communication gate between the servers and the users. The main aim of this study is to enhance the security level of the online data transfer using two integrated methods; images steganography to hide the transfer data in image media, and chaotic map to remap the original format of the transfer data. The integration between these two methods is effective to secure the data in several format such as text, audio, and images. The proposed algorithm is the prototyped using JAVA programming, 20 images and text messages of usable sizes (plain data) were tested on the dataset using the developed programming. The simulation using local server is accomplished to analyze the security performance based on two factors; the plain data size and the data transfer distance. Many attacking attempts are performed on the simulation test using known attacking techniques such as observe the stego images quality. The experiment results show that about 85% of the attacking attempts fail to catch the stego images. 95% of the attacks fail in remap meaningful parts of the chaotic data. The results indicate the very good level of the propose security methods to secure the online transfer data. The contribution of this study is the effective integration between the steganography and chaotic map approaches to assure high security level of online data transfer.
Yasser Mohammad Al-Sharo, “Images Steganography Approach Supporting Chaotic Map Technique for the Security of Online Transfer” International Journal of Advanced Computer Science and Applications(IJACSA), 10(4), 2019. http://dx.doi.org/10.14569/IJACSA.2019.0100430
@article{Al-Sharo2019,
title = {Images Steganography Approach Supporting Chaotic Map Technique for the Security of Online Transfer},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2019.0100430},
url = {http://dx.doi.org/10.14569/IJACSA.2019.0100430},
year = {2019},
publisher = {The Science and Information Organization},
volume = {10},
number = {4},
author = {Yasser Mohammad Al-Sharo}
}
Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.