Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 236))

  • 1162 Accesses

Abstract

Security and scalability are important issues for secure group communication in a grid environment. Secure communication involves confidentiality and authenticity of the user and the message between group members. To transmit data in a secure way, a secure and authenticated key transfer protocol should be applied. Key transfer protocol needs an entity responsible for user authentication and secures session keys. Recently, many researchers have proposed secure group communication methods based upon various cryptographic techniques. In this paper, we propose a secure key transfer protocol that uses the concepts of soft dipole representation of the image and steganography to establish secure communication between group of authenticated users. Steganography hides the existence of group keys in images. This protocol is more secure as compare to previously proposed encryption based group communication protocols. This protocol uses a centralized entity key management center (KMC). KMC generates the group key using soft dipoles of the images of the group members and broadcast it securely to all the communicating group members.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aparna, R., Amberker, B.B.: Dynamic authenticated secure group communication. World Acad. Sci. Eng. Technol. 34 (2007)

    Google Scholar 

  2. Bhatia, M., Mutto, S.K., Bhatia, M.P.S.: Secure group communication protocol. Int. J. Adv. Eng. Sci. Technol. (2011)

    Google Scholar 

  3. Burmester, M., Desmedt, Y.G.: A secure and efficient conference key distribution system. In: Proceedings of Eurocrypt ’94 Workshop Advances in Cryptology, pp. 275–286 (1994)

    Google Scholar 

  4. Chadramouli, R., Memon, N.: Analysis of LSB based image steganography techniques. IEEE (2001)

    Google Scholar 

  5. Chubb, C., Yellott, J.I.: Dipole statistics of discrete finite images: two visually motivated representation theorems. J. Opt. Soc. Am. A (2002)

    Google Scholar 

  6. Cody, E., Sharman, R., Rao, R.H., Upadhyaya, S., et al.: Security in grid computing: a review and synthesis. Decis. Supp. Syst. 44(4), 749–764 (2008)

    Google Scholar 

  7. Foster, I., et al.: Grid services for distributed systems integration. IEEE Comput. Soc. 35(6), 37–46 (2002)

    Google Scholar 

  8. Foster, I., et al.: In the Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann, San Francisco (1999)

    Google Scholar 

  9. Foster, I., et al.: The anatomy of the grid: enabling scalable virtual organizations. Int. J. High Perform. Comput. Appl. ACM Digital Library, pp. 200–222 (2001)

    Google Scholar 

  10. Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: Proceedings of ACM Conference on Computers and Security (1998)

    Google Scholar 

  11. Harney, H., Muckenhirn, C., Rivers, T.: Group Key Management Protocol (GKMP), Architecture RFC2094 (1997)

    Google Scholar 

  12. Ingle, R., Sivakumar, G.: EGSI: TGKA based security architecture for group communication in grid. In: Proceedings of the 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, May 17–20, IEEE Computer Society, Australia, pp. 34–42 (2010). doi:10.1109/CCGRID.2010.28

  13. Johnson, N. F., Katzenbeisser Stefan, C.: A Survey of Steganographic Techniques. Artech House Books, London (2000)

    Google Scholar 

  14. Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganogarphy and Digital Watermarking. Artech House, London (2000)

    Google Scholar 

  15. Li, Y., Jin, H., Zou, D., Liu, S., Han, Z.: A scalable service scheme for secure group communication in grid. In: 31st Annual International Computer Software and Applications Conference (COMPSAC 2007), pp. 31–38 (2007)

    Google Scholar 

  16. Li, Y., Xu, X., Wan, J., Jin, H., Han, Z.: An authenticated encryption mechanism for secure group communication in grid. In: Proceedings of the International Conference on Internet Computing in Science and Engineering, Jan. 28–29, USA, pp. 298–305 (2008). doi:10.1109/ICICSE.2008.80

  17. Li, Y., Jin, H., Han, Z., Liu, S., et al.: A secure mechanism of group communication for pervasive grid. Int. J. Ad Hoc Ubiquitous Comput. 4, 344–353 (2009). doi:10.1504/IJAHUC.2009.028662

    Article  Google Scholar 

  18. Park, H., Yi, W.S., Lee, G.: Simple ID-based key distribution scheme. In: Fifth International Conference on Internet and Web Applications and Services 2010, 369–373 (2010)

    Google Scholar 

  19. Steganographic techniques, a brief survey. Department of computer science, Wellesley College

    Google Scholar 

  20. Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman key distribution extended to group communication. In: Proceedings of Third ACM Conference on Computer and Communication Security (CCS ’96), pp. 31–37 (1996)

    Google Scholar 

  21. Sudha, S., Samsudin, A., Alia, M.A.: Group rekeying protocol based on modular polynomial arithmetic over Galois field GF (2n). Am. J. Appl. Sci. 6, 1714–1717 (2009). doi:10.3844/ajassp.2009.1714.1717

    Article  Google Scholar 

  22. Valli, V., Kumari, D., NagaRaju, V., Soumy, K., Raju, K.V.S.V.N.: Secure group key distribution using hybrid cryptosystem. In: Proceedings of the 2nd International Conference on Machine Learning and Computing, IEEE Computer Society, Washington, pp. 188–192 (2010). doi:10.1109/ICMLC.2010.4110

  23. Wikipedia, Digital Image processing, available at: http://en.wikipedia.org/wiki/Digital_image_processing, accessed on March 2012

  24. Xu, S.: On the Security of Group Communication Schemes

    Google Scholar 

  25. Zhenga, Y., Wanga, H.Y., Wang, R., et al.: Grid authentication from identity-based cryptography without random oracles. J. China Univ. Posts Telecommun., Elsevier 15(4), 55–59 (2008)

    Article  Google Scholar 

  26. Zoua X., Dai Y.S., Rana X.: Dual-level key management for secure grid communication in dynamic and hierarchical groups. Future Gen. Comput. Syst., Science Direct, 23(6), 776–78 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manjot Bhatia .

Editor information

Editors and Affiliations

Appendix 1

Appendix 1

Screen shots of simulation [28].

figure aa

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Bhatia, M., Muttoo, S.K., Bhatia, M.P.S. (2014). Steganography-Based Secure Communication. In: Babu, B., et al. Proceedings of the Second International Conference on Soft Computing for Problem Solving (SocProS 2012), December 28-30, 2012. Advances in Intelligent Systems and Computing, vol 236. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1602-5_83

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1602-5_83

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1601-8

  • Online ISBN: 978-81-322-1602-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics