95
Views
1
CrossRef citations to date
0
Altmetric
Communications

A Novel Scrambled Data Hiding Approach Towards Securing Sensitive Data

ORCID Icon &
Pages 5847-5856 | Published online: 25 Oct 2021
 

Abstract

Our world is making its way toward complete digitization, with more and more data going to the Internet. Thus, the security of the data has become one of our utmost responsibilities. Strong and secure cryptography and steganography techniques have become the need of the hour to defend against modern adversaries. In this article, a novel scrambled data hiding approach is proposed to secure the sensitive information used in communications. The lacuna in the existing data hiding approaches is the loss of originality in the sensitive data to be attached, leading to poor information quality. This issue is addressed in the proposed approach by encrypting the data using the triple data encryption standard (DES) algorithm. The scrambled data are hidden in the audio file using the least significant bit (LSB) embedding. Experiments were conducted, and the proposed approach secured the sensitive information significantly without the loss of information quality. Furthermore, the secured information is retrieved by only the authenticated users with high quality.

ACKNOWLEDGEMENT

The authors thank the Indian Institute of Information Technology Una for providing the resources to do this work.

Additional information

Notes on contributors

Bhuvaneswari Amma N.G.

Bhuvaneswari Amma N G received the PhD Degree from the National Institute of Technology, Tiruchirappalli, Tamil Nadu, India in 2020. Currently, she is a guest faculty in the School of Computing, Indian Institute of Information Technology, Una, Himachal Pradesh, India. Her areas of interest include network security, IoT security, machine learning, data analytics, and statistical methods.

Jitaksh Kapoor

Jitaksh Kapoor is currently pursuing his BTech in information technology from Indian Institute of Information Technology, Una, Himachal Pradesh, India. His primary areas of research include cryptographic algorithms and hacking techniques. E-mail: [email protected]

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 61.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 100.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.