Open Access iconOpen Access

ARTICLE

crossmark

A Shuffling-Steganography Algorithm to Protect Data of Drone Applications

by Ahamad B. Alkodre1, Nour Mahmoud Bahbouh2, Sandra Sendra3, Adnan Ahmed Abi Sen4,*, Yazed Alsaawy1, Saad Said Alqahtany1, Abdallah Namoun1, Hani Almoamari1

1 Faculty of Computer and Information Systems, Islamic University, Al-Madinah, 42351, Saudi Arabia
2 Department of Information and Communication Sciences, Granada University, Granada, 18071, Spain
3 Instituto de Investigación para la Gestión Integrada de Zonas Costeras, Universitat Politècnica de València, Valencia, 46730, Spain
4 Department of Graduate Studies & Scientific Research, University of Prince Mugrin, Al-Madinah, 42351, Saudi Arabia

* Corresponding Author: Adnan Ahmed Abi Sen. Email: email

Computers, Materials & Continua 2024, 81(2), 2727-2751. https://doi.org/10.32604/cmc.2024.053706

Abstract

In Saudi Arabia, drones are increasingly used in different sensitive domains like military, health, and agriculture to name a few. Typically, drone cameras capture aerial images of objects and convert them into crucial data, alongside collecting data from distributed sensors supplemented by location data. The interception of the data sent from the drone to the station can lead to substantial threats. To address this issue, highly confidential protection methods must be employed. This paper introduces a novel steganography approach called the Shuffling Steganography Approach (SSA). SSA encompasses five fundamental stages and three proposed algorithms, designed to enhance security through strategic encryption and data hiding techniques. Notably, this method introduces advanced resistance to brute force attacks by employing predefined patterns across a wide array of images, complicating unauthorized access. The initial stage involves encryption, dividing, and disassembling the encrypted data. A small portion of the encrypted data is concealed within the text (Algorithm 1) in the third stage. Subsequently, the parts are merged and mixed (Algorithm 2), and finally, the composed text is hidden within an image (Algorithm 3). Through meticulous investigation and comparative analysis with existing methodologies, the proposed approach demonstrates superiority across various pertinent criteria, including robustness, secret message size capacity, resistance to multiple attacks, and multilingual support.

Keywords


Cite This Article

APA Style
Alkodre, A.B., Bahbouh, N.M., Sendra, S., Sen, A.A.A., Alsaawy, Y. et al. (2024). A shuffling-steganography algorithm to protect data of drone applications. Computers, Materials & Continua, 81(2), 2727-2751. https://doi.org/10.32604/cmc.2024.053706
Vancouver Style
Alkodre AB, Bahbouh NM, Sendra S, Sen AAA, Alsaawy Y, Alqahtany SS, et al. A shuffling-steganography algorithm to protect data of drone applications. Comput Mater Contin. 2024;81(2):2727-2751 https://doi.org/10.32604/cmc.2024.053706
IEEE Style
A. B. Alkodre et al., “A Shuffling-Steganography Algorithm to Protect Data of Drone Applications,” Comput. Mater. Contin., vol. 81, no. 2, pp. 2727-2751, 2024. https://doi.org/10.32604/cmc.2024.053706



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 335

    View

  • 178

    Download

  • 0

    Like

Share Link