Enhanced Security Through Integrated Morse Code Encryption and LSB Steganography in Digital Communications


Creative Commons License

Olewi H. I., Msallam M. M., Salim S. K., Al-Behadili H. A. H.

TRAITEMENT DU SIGNAL, sa.1, ss.519-524, 2024 (SCI-Expanded) identifier

  • Yayın Türü: Makale / Tam Makale
  • Basım Tarihi: 2024
  • Doi Numarası: 10.18280/ts.410147
  • Dergi Adı: TRAITEMENT DU SIGNAL
  • Derginin Tarandığı İndeksler: Science Citation Index Expanded (SCI-EXPANDED), Scopus, PASCAL, Business Source Elite, Business Source Premier, Compendex, zbMATH
  • Sayfa Sayıları: ss.519-524
  • Ankara Üniversitesi Adresli: Evet

Özet

In the digital era, the protection of sensitive data transmitted over the Internet, such as credit card information, is paramount. This study introduces an innovative system that enhances data security during internet transmission by synergizing steganography and cryptography. The proposed method employs a two -stage process: encryption followed by concealment. Initially, secret text data is encrypted using an evolved form of Morse code, converting it into ciphertext. Subsequently, this ciphertext is discreetly embedded within a cover image utilizing the least significant bit (LSB) technique, a method renowned for its subtlety and efficiency in data hiding. The effectiveness of this novel system was evaluated by comparing its performance with existing benchmarks. The chosen test case involved embedding encrypted data within a Baboon image. The results demonstrated a notable improvement of 2.596% over the baseline, affirming the system's efficacy. A critical aspect of this approach is the high quality of the resultant stego image. This quality is instrumental in ensuring the covert nature of the embedded data, thereby significantly reducing the likelihood of detection during internet transmission. Key elements of this study include the development of a more sophisticated Morse code encryption algorithm and the optimization of the LSB steganography technique. These advancements contribute to the system's robustness, rendering the encrypted and hidden data virtually undetectable and inaccessible to unauthorized entities. The integration of these two techniques represents a significant stride in the realm of digital data security, offering a dual -layered defense mechanism against potential cyber threats.