Abstract

One of the most important issue in this domain is the security concern of the transfer data. The online transfer data may access illegally through attack the communication gate between the servers and the users. The main aim of this study is to enhance the security level of the online data transfer using two integrated methods; images steganography to hide the transfer data in image media, and chaotic map to remap the original format of the transfer data. The integration between these two methods is effective to secure the data in several format such as text, audio, and images. The proposed algorithm is the prototyped using JAVA programming, 20 images and text messages of usable sizes (plain data) were tested on the dataset using the developed programming. The simulation using local server is accomplished to analyze the security performance based on two factors; the plain data size and the data transfer distance. Many attacking attempts are performed on the simulation test using known attacking techniques such as observe the stego images quality. The experiment results show that about 85% of the attacking attempts fail to catch the stego images. 95% of the attacks fail in remap meaningful parts of the chaotic data. The results indicate the very good level of the propose security methods to secure the online transfer data. The contribution of this study is the effective integration between the steganography and chaotic map approaches to assure high security level of online data transfer.

Highlights

  • The era of the globalization increase the importance of online data/information transfer as one of the most important success keys of the businesses competitive advantages [1]

  • The selection of applicable security methods would be decided based on many factors that related to online data transfer

  • The security of the online transfer data is very important to assure the safety of businesses data

Read more

Summary

Introduction

The era of the globalization increase the importance of online data/information transfer as one of the most important success keys of the businesses competitive advantages [1]. The security of online data transfer is not simple due to many factors like the volume of the transfer data, the format of the transfer data, and the transfer distance [5]. These factors effect on the selection of the security methods that could be applied to secure the online transfer data. The selection of applicable security methods would be decided based on many factors that related to online data transfer

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call