Podrobná bibliografie
| Název: |
Enhancing cloud security using coverless text steganography. |
| Autoři: |
Indu, Pabak1 (AUTHOR) pabakindu@yahoo.co.in, Jash, Rajdeep2 (AUTHOR) rajdeepjash2070@gmail.com, Singh, Satyam Kumar2 (AUTHOR) cse.20201010@gmail.com, Raut, Luna2 (AUTHOR) lunaraut6@gmail.com, Singh, Gaurav Kumar2 (AUTHOR) golugauravkumar7@gmail.com, Bhattacharyya, Souvik2 (AUTHOR) souvik.bha@gmail.com, Bhattacharyya, Shinjini3 (AUTHOR) shinjinibha@gmail.com |
| Zdroj: |
AIP Conference Proceedings. 2025, Vol. 3394 Issue 1, p1-11. 11p. |
| Témata: |
*CLOUD computing security measures, *DATA protection, *DIGITAL communications, *CRYPTOGRAPHY, *DATA encryption |
| Abstrakt: |
The use of covert text steganography to send sensitive data across a covert communication channel significantly enhances cloud security. While traditional cloud security methods primarily focus on encryption to protect data, our innovative technique diverges by integrating advanced steganography with a novel approach. In contrast to conventional coverless text steganography methods, our technique introduces a robust mechanism for embedding confidential data within generated cover text. Our method leverages a pretrained text generation model to produce the cover text, ensuring it appears natural and contextually appropriate. The secret information is then embedded into this cover text through a series of operations, including XOR operations, unique character insertion, and sophisticated mapping techniques. These processes ensure that the embedded cover text retains its readability and plausibility, making it indistinguishable from regular text. Stego text effectively conceals the existence of the secret message, thereby enhancing security. Stego keys are crucial for mapping the unique characters into the stego text during the secret message extraction process, ensuring that only authorized users with the correct keys can retrieve the hidden information. This innovative approach not only bolsters the security of data transmission in cloud environments but also ensures that the covert communication channel remains undetectable. [ABSTRACT FROM AUTHOR] |
| Databáze: |
Academic Search Index |