2022
DOI: 10.3390/s22062281
|View full text |Cite
|
Sign up to set email alerts
|

A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices

Abstract: Steganography is a vital security approach that hides any secret content within ordinary data, such as multimedia. This hiding aims to achieve the confidentiality of the IoT secret data; whether it is benign or malicious (e.g., ransomware) and for defensive or offensive purposes. This paper introduces a hybrid crypto-steganography approach for ransomware hiding within high-resolution video frames. This proposed approach is based on hybridizing an AES (advanced encryption standard) algorithm and LSB (least sign… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 53 publications
0
8
0
Order By: Relevance
“…With this method, sensitive data is shielded from intrusive users or outsiders. An algorithm was developed by [4] study to protect data from unauthorised users. As an alternative to the previously used least signi cant bit (LSB) strategy, they presented a system.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…With this method, sensitive data is shielded from intrusive users or outsiders. An algorithm was developed by [4] study to protect data from unauthorised users. As an alternative to the previously used least signi cant bit (LSB) strategy, they presented a system.…”
Section: Literature Reviewmentioning
confidence: 99%
“…3 The key round encryption technique, which is implemented in Python yields the expected proposed algorithm for KREA shown in detail in Figs. 4 The key round encryption technique, which is implemented in Python yields the expected proposed Algorithm User interface shown in detail in Figs. 5.…”
Section: Key Round Encryption Algorithm (Krea)mentioning
confidence: 99%
“…Studies in the realm of ransomware detection have extensively concentrated on pinpointing specific attack patterns and atypical behaviors within file systems [11], [21], [22]. A prominent strategy in this field has been the deployment of machine learning algorithms, which scrutinize file access patterns to pinpoint irregular encryption activities that are typically indicative of ransomware infiltration [5], [23], [8]. These algorithms are trained on vast datasets to accurately distinguish between normal operations and potential ransomware threats [17], [24], [25].…”
Section: A Ransomware Detectionmentioning
confidence: 99%
“…However, recent developments have seen ransomware adopting more sophisticated encryption techniques, making it increasingly challenging to recover the affected data without yielding to the ransom demands [5], [6]. This alarming trend underscores a shift in the mode of operation of ransomware attacks, evolving from mere nuisances to significant threats capable of crippling entire organizational operations [7], [8]. The impact of these attacks has been profound, with businesses and institutions facing not just financial losses due to the ransom payments but also significant operational disruptions and potential breaches of sensitive data [9], [1].…”
Section: Introductionmentioning
confidence: 99%
“…The rapid development of IoT applications makes communication and transmission security issues more attractive. Therefore, it is necessary to implement effective security and confidentiality technology to transmit IoT [2]. Such security can be provided using security features such as information security techniques (steganography and encryption) with IoT systems [3].…”
Section: Introductionmentioning
confidence: 99%