Full Paper View Go Back
Securing the H.323 Protocol: A Steganographic and Hybrid Encryption Approach
Most. Mazriha Akter Mohua1
Section:Research Paper, Product Type: Journal-Paper
Vol.12 ,
Issue.6 , pp.26-35, Dec-2024
Online published on Dec 31, 2024
Copyright © Most. Mazriha Akter Mohua . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Most. Mazriha Akter Mohua, “Securing the H.323 Protocol: A Steganographic and Hybrid Encryption Approach,” International Journal of Scientific Research in Computer Science and Engineering, Vol.12, Issue.6, pp.26-35, 2024.
MLA Style Citation: Most. Mazriha Akter Mohua "Securing the H.323 Protocol: A Steganographic and Hybrid Encryption Approach." International Journal of Scientific Research in Computer Science and Engineering 12.6 (2024): 26-35.
APA Style Citation: Most. Mazriha Akter Mohua, (2024). Securing the H.323 Protocol: A Steganographic and Hybrid Encryption Approach. International Journal of Scientific Research in Computer Science and Engineering, 12(6), 26-35.
BibTex Style Citation:
@article{Mohua_2024,
author = {Most. Mazriha Akter Mohua},
title = {Securing the H.323 Protocol: A Steganographic and Hybrid Encryption Approach},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {12 2024},
volume = {12},
Issue = {6},
month = {12},
year = {2024},
issn = {2347-2693},
pages = {26-35},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=3718},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=3718
TI - Securing the H.323 Protocol: A Steganographic and Hybrid Encryption Approach
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Most. Mazriha Akter Mohua
PY - 2024
DA - 2024/12/31
PB - IJCSE, Indore, INDIA
SP - 26-35
IS - 6
VL - 12
SN - 2347-2693
ER -
Abstract :
An empirical investigation has established a novel approach for secure data transfer via the H.323 protocol by combining hybrid cryptography and real-time steganography. It has been found that the H.323 protocol vulnerabilities, such as vulnerability in NAT implementation in CISCO IOS, NAT slipstreaming, out-of-bounds memory write flaw, etc., allow attackers to send malformed H.323 traffic to execute a Denial of Service (DoS) or buffer overflow attack. This compromises security by causing resource exhaustion, session table consumption, and more. The proposed framework utilizes a hybrid cryptography algorithm that combines multi-layer symmetric encryption with the asymmetric Rivest-Shamir-Adleman (RSA) algorithm, and a steganography technique that embeds the encrypted data in the 3rd LSBs of the pixels of a real-time video stream. This allows for multilevel security for data transmitted via H.323. This study also outlines a mechanism for categorizing transmitted data into Unicode and Non-Unicode using machine learning algorithms to ensure data integrity. However, the study’s scope is limited to excluding alternative data transmission methods or protocols. A more comprehensive examination could provide a better understanding of how the proposed approach adapts to diverse data formats. Comprehensive experimental evaluations demonstrate that the hybrid algorithm optimizes both speed and memory usage compared with previous approaches. The proposed algorithm maintains the quality of the video stream. A low-latency connection and fast extraction with minimal distortion of the signal were feasible with increased Internet speed. By utilizing the machine learning model for error detection and increasing efficiency, the study achieves an accuracy of 99.21%. This research introduces a new framework to enhance privacy, circumvent attackers, increase payload capacity, and improve operating efficiency while reducing computing overhead. This makes it a practical solution for securely transferring data using the H.323 protocol.
Key-Words / Index Term :
Steganography, H.323 Protocol, Multi-Layer Encryption, Hybrid Cryptography, Real-time Steganography, RSA, LSB, Video Stream
References :
[1] H. Antonio, P. Prasad, and A. Alsadoon, “Implementation of cryptography in steganography for enhanced security,” Multimedia Tools and Applications, Vol.78, Issue.23, pp.32721–32734, 2019.
[2] W. A. Awadh, A. S. Alasady, and A. K. Hamoud, “Hybrid information security system via combination of compression, cryptography, and image steganography,” International Journal of Electrical and Computer Engineering, Vol.12, Issue.6, pp.6574–6584, 2022.
[3] M. B. Jibi, G. Neethu, and J. P. Anju, “Cyber Attacks And Its Different Types,” International Research Journal of Engineering and Technology (IRJET), Vol.6, Issue.3, pp.4849–4952, 2019.
[4] A. Mallik, A. Ahsan, M. M. Z. Shahadat, and J. C. Tsou, “Understanding Man-in-the-middle-attack through Survey of Literature,” Indonesian Journal of Computing, Engineering, and Design, Vol.1, Issue.1, pp.44–56, 2019.
[5] S. Saraireh, “A secure data communication system using cryptography and steganography,” International Journal of Computer Networks & Communications (IJCNC) Vol.5, 2013.
[6] D. Seth, L. Ramanathan, and A. Pandey, “Security enhancement: combining cryptography and steganography,” International Journal of Computer Applications, Vol.9, Issue.11, pp.3–6, 2010.
[7] P. Bedi and A. Dua, “Network steganography using the overflow field of timestamp option in an ipv4 packet,” Procedia Computer Science, Vol.171, pp.1810–1818, 2020.
[8] R. R. Gautam and R. K. Khare, “Real time image security for mobile communication using image steganography,” International Journal of Engineering Research & Technology, Vol.1, Issue.8, pp.1–5, 2012.
[9] P. Roy and A. Nath, “New steganography approach using encrypted secret message inside audio and video media,” International Journal of Advance Research in Computer Science and Management Studies, Vol.2, Issue.12, 2014.
[10] W. A. Awadh, A. S. Hashim, and A. K. Hamoud, “Efficiently secure data communications based on cbc-rc6 and the overflow field of timestamp option in an ipv4 packet,” Informatica, Vol.46, Issue.6, 2022.
[11] A. J. Ghazali, “Improved performance of secured voip via enhanced blowfish encryption algorithm,” Ph.D. dissertation, The University of Liverpool, United Kingdom, 2019.
[12] K. N. Jassim, A. K. Nsaif, A. K. Nseaf, B. Priambodo, E. Naf’an, M. Masril, I. Handriani, Z. P. Putra et al., “Hybrid cryptography and steganography method to embed encrypted text message within image,” In 2019 Journal of Physics: Conference Series, IOP Publishing, Vol.1339, Issue.1, p.012061, 2019.
[13] A. AL-OTHMANI, “Prototype development of voip steganography,” Universiti Teknologi Malaysia, 2009.
[14] N. A. Al-Juaid, A. A. Gutub, and E. A. Khan, “Enhancing pc data security via combining rsa cryptography and video based steganography,” Journal of Information Security and Cybercrimes Research, Vol.1, Issue.1, pp.5–13, 2018.
[15] M. Nadeem, A. Arshad, S. Riaz, S. Wajiha Zahra, S. S Band, and A. Mosavi, “Two layer symmetric cryptography algorithm for protecting data from attacks,” 2023.
[16] M. Afroj, “Study on cryptography, steganography and combination of both for data security,” INTERNATIONAL JOURNAL OF RESEARCH AND INNOVATION IN APPLIED SCIENCE (IJRIAS), Vol.8, Issue.6, pp.6–14, 2023.
[17] S. CHOUDHARY and S. HUSAIN, “Analysis of cryptography encryption for network security and image steganography technique,” Algorithms, Vol.7, Issue.10, 2023.
[18] J. Vivek and B. Gadgay, “Video steganography using chaos encryption algorithm with high efficiency video coding for data hiding.” International Journal of Intelligent Engineering & Systems, Vol.14, Issue.5, 2021.
[19] J. K. P. Alegro, E. R. Arboleda, M. R. Perena, and R. M. Dellosa, “Hybrid schnorr, rsa, and aes cryptosystem,” Int. J. Sci. Technol. Res, Vol.8, Issue.10, pp.1777–1781, 2019.
[20] S. K. BJ, A. Nair, and R. R. VK, “Hybridization of rsa and aes algorithms for authentication and confidentiality of medical images,” In 2017 international conference on communication and signaprocessing ng(ICCSP), IEEE, pp.1057–1060, 2017.
[21] M. T. Kyaw, “Comparison of VOIP signaling protocol H. 323 Vs SIP,” Proceedings of World Academy of Science, Engineering and Technology, Vol.38, pp.1271-1276, 2009.
[22] H. Al-Dmour and A. Al-Ani, “A steganography embedding method based on edge identification and xor coding,” Expert systems with Applications, Vol.46, pp.293–306, 2016.
[23] M. S. Al-Rahal, A. Abi Sen, and A. A. Basuhil, “High level security based steganoraphy in image and audio files,” Journal of Theoretical & Applied Information Technology, Vol.87, Issue.1, 2016.
[24] H. R. Kanan and B. Nazeri, “A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm,” Expert systems with applications, Vol.41, Issue.14, pp.6123–6130, 2014.
[25] K. Muhammad, M. Sajjad, I. Mehmood, S. Rho, and S. W. Baik, “A novel magic lsb substitution method (m-lsb-sm) using multi-level encryption and achromatic component of an image,” Multimedia Tools and Applications, Vol.75, pp.14867–14893, 2016.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.