Abstract
Security and scalability are important issues for secure group communication in a grid environment. Secure communication involves confidentiality and authenticity of the user and the message between group members. To transmit data in a secure way, a secure and authenticated key transfer protocol should be applied. Key transfer protocol needs an entity responsible for user authentication and secures session keys. Recently, many researchers have proposed secure group communication methods based upon various cryptographic techniques. In this paper, we propose a secure key transfer protocol that uses the concepts of soft dipole representation of the image and steganography to establish secure communication between group of authenticated users. Steganography hides the existence of group keys in images. This protocol is more secure as compare to previously proposed encryption based group communication protocols. This protocol uses a centralized entity key management center (KMC). KMC generates the group key using soft dipoles of the images of the group members and broadcast it securely to all the communicating group members.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Aparna, R., Amberker, B.B.: Dynamic authenticated secure group communication. World Acad. Sci. Eng. Technol. 34 (2007)
Bhatia, M., Mutto, S.K., Bhatia, M.P.S.: Secure group communication protocol. Int. J. Adv. Eng. Sci. Technol. (2011)
Burmester, M., Desmedt, Y.G.: A secure and efficient conference key distribution system. In: Proceedings of Eurocrypt ’94 Workshop Advances in Cryptology, pp. 275–286 (1994)
Chadramouli, R., Memon, N.: Analysis of LSB based image steganography techniques. IEEE (2001)
Chubb, C., Yellott, J.I.: Dipole statistics of discrete finite images: two visually motivated representation theorems. J. Opt. Soc. Am. A (2002)
Cody, E., Sharman, R., Rao, R.H., Upadhyaya, S., et al.: Security in grid computing: a review and synthesis. Decis. Supp. Syst. 44(4), 749–764 (2008)
Foster, I., et al.: Grid services for distributed systems integration. IEEE Comput. Soc. 35(6), 37–46 (2002)
Foster, I., et al.: In the Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann, San Francisco (1999)
Foster, I., et al.: The anatomy of the grid: enabling scalable virtual organizations. Int. J. High Perform. Comput. Appl. ACM Digital Library, pp. 200–222 (2001)
Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A security architecture for computational grids. In: Proceedings of ACM Conference on Computers and Security (1998)
Harney, H., Muckenhirn, C., Rivers, T.: Group Key Management Protocol (GKMP), Architecture RFC2094 (1997)
Ingle, R., Sivakumar, G.: EGSI: TGKA based security architecture for group communication in grid. In: Proceedings of the 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, May 17–20, IEEE Computer Society, Australia, pp. 34–42 (2010). doi:10.1109/CCGRID.2010.28
Johnson, N. F., Katzenbeisser Stefan, C.: A Survey of Steganographic Techniques. Artech House Books, London (2000)
Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganogarphy and Digital Watermarking. Artech House, London (2000)
Li, Y., Jin, H., Zou, D., Liu, S., Han, Z.: A scalable service scheme for secure group communication in grid. In: 31st Annual International Computer Software and Applications Conference (COMPSAC 2007), pp. 31–38 (2007)
Li, Y., Xu, X., Wan, J., Jin, H., Han, Z.: An authenticated encryption mechanism for secure group communication in grid. In: Proceedings of the International Conference on Internet Computing in Science and Engineering, Jan. 28–29, USA, pp. 298–305 (2008). doi:10.1109/ICICSE.2008.80
Li, Y., Jin, H., Han, Z., Liu, S., et al.: A secure mechanism of group communication for pervasive grid. Int. J. Ad Hoc Ubiquitous Comput. 4, 344–353 (2009). doi:10.1504/IJAHUC.2009.028662
Park, H., Yi, W.S., Lee, G.: Simple ID-based key distribution scheme. In: Fifth International Conference on Internet and Web Applications and Services 2010, 369–373 (2010)
Steganographic techniques, a brief survey. Department of computer science, Wellesley College
Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman key distribution extended to group communication. In: Proceedings of Third ACM Conference on Computer and Communication Security (CCS ’96), pp. 31–37 (1996)
Sudha, S., Samsudin, A., Alia, M.A.: Group rekeying protocol based on modular polynomial arithmetic over Galois field GF (2n). Am. J. Appl. Sci. 6, 1714–1717 (2009). doi:10.3844/ajassp.2009.1714.1717
Valli, V., Kumari, D., NagaRaju, V., Soumy, K., Raju, K.V.S.V.N.: Secure group key distribution using hybrid cryptosystem. In: Proceedings of the 2nd International Conference on Machine Learning and Computing, IEEE Computer Society, Washington, pp. 188–192 (2010). doi:10.1109/ICMLC.2010.4110
Wikipedia, Digital Image processing, available at: http://en.wikipedia.org/wiki/Digital_image_processing, accessed on March 2012
Xu, S.: On the Security of Group Communication Schemes
Zhenga, Y., Wanga, H.Y., Wang, R., et al.: Grid authentication from identity-based cryptography without random oracles. J. China Univ. Posts Telecommun., Elsevier 15(4), 55–59 (2008)
Zoua X., Dai Y.S., Rana X.: Dual-level key management for secure grid communication in dynamic and hierarchical groups. Future Gen. Comput. Syst., Science Direct, 23(6), 776–78 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendix 1
Appendix 1
Screen shots of simulation [28].

Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Bhatia, M., Muttoo, S.K., Bhatia, M.P.S. (2014). Steganography-Based Secure Communication. In: Babu, B., et al. Proceedings of the Second International Conference on Soft Computing for Problem Solving (SocProS 2012), December 28-30, 2012. Advances in Intelligent Systems and Computing, vol 236. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1602-5_83
Download citation
DOI: https://doi.org/10.1007/978-81-322-1602-5_83
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1601-8
Online ISBN: 978-81-322-1602-5
eBook Packages: EngineeringEngineering (R0)