New Design of Encryption with Covertext and Reordering
DOI:
https://doi.org/10.24246/ijiteb.522023.01-05Keywords:
Data Hiding, Information Hiding, Permutation Table, Random, Random KeyAbstract
Documents for some entities are confidential and important, so security is required. Encryption with Covertext and Reordering (ECR) is a text-based document security model. ECR uses a random key to generate the ciphertext. The ECR’s random key is selected using the human-generated method. This research aims to increase the level of document security based on the ECR mechanism. This paper proposes a new method by using a random key in a permutated table. The random key is generated automatically by a function. The entropy is used as a measurement of the security level of the encrypted documents. The experimental shows that the permutated table inside the ECR provides better entropy values. It implies a better security level. The use of permutated tables also makes it easier to use ECR to secure documents.
Downloads
References
A. Majumder, S. Changder, and N. C. Debnath, “A new text steganography method based on Sudoku puzzle generation,” in Int. Conf. Emerg. Trends Inf. Technol. (ICETIT 2019), New Delhi, 2020.
E. Ardhianto, A. Trisetyarso, W. Suparta, B. S. Abbas, and C. H. Kang, “Design securing online payment transactions using Stegblock through network layers,” in INCITEST 2020, Bandung, 2020.
E. Ardhianto, H. L. H. S. Warnars, B. Soewito, F. L. Gaol, and E. Abdurachman, “Improvement of steganography technique: A survey,” in 1st Int. Multidiscip. Conf. Educ. Technol. Eng. (IMCETE 2019), Serang, 2020.
M. Buckland, “What is a ‘digital document’?” Doc. Numér., vol. 2, no. 2, pp. 221–230, 1998.
M. Elveny, R. Syah, I. Jaya, and I. Affandi, “Implementation of linear congruential generator (LCG) algorithm, most significant bit (MSB) and Fibonacci code in compression and security messages using images,” in 4th Int. Conf. Comput. Appl. Inform. (ICCAI 2019), Medan, 2020.
M. K. Buckland, “What is a ‘document’?” J. Am. Soc. Inf. Sci., vol. 48, no. 9, pp. 804–809, 1997.
M. Khairullah, “A novel steganography method using transliteration of Bengali text,” J. King Saud Univ. – Comput. Inf. Sci., vol. 31, no. 3, pp. 348–366, 2019.
M. Y. Elmahi and T. M. Wahbi, “Multi-level steganography aided with compression,” in 2019 Int. Conf. Comput. Control, Electr., Electron. Eng. (ICCCEEE), Khartoum, 2019.
M. Y. Elmahi, T. M. Wahbi, and M. H. Sayed, “Text steganography using compression and random number generators,” Int. J. Comput. Appl. Technol. Res., vol. 6, no. 6, pp. 259–263, 2017.
P. Patil, P. Narayankar, G. N. D., and M. M. S., “A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish,” in Int. Conf. Inf. Secur. Privacy (ICISP 2015), Nagpur, 2016.
S. Kataria, K. Singh, T. Kumar, and M. S. Nehra, “ECR (encryption with cover text and reordering) based text steganography,” in IEEE 2nd Int. Conf. Image Inf. Process., Waknaghat, 2013.
S. Rajesh, V. Paul, V. G. Menon, and M. R. Khosravi, “A secure and efficient lightweight symmetric encryption scheme for transfer of text files between embedded IoT devices,” Symmetry, vol. 11, no. 2, pp. 1–21, 2019.
V. S. Babu and H. K. J, “A study on combined cryptography and steganography,” Int. J. Res. Stud. Comput. Sci. Eng., vol. 2, no. 5, pp. 45–49, 2015.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 International Journal of Information Technology and Business

This work is licensed under a Creative Commons Attribution 4.0 International License.