Digital-Signature Oriented Steganography Approach against Man-in-the-Middle Attack

Authors

  • Gwamaka Henry Mwakajwanga Tanzania Communications Regulatory Authority https://orcid.org/0009-0004-2855-6446
  • Othmar Mwambe Dares Salaam Institute of Technology, Dar es salaam, Tanzania

DOI:

https://doi.org/10.3991/ijim.v18i16.48709

Keywords:

Digital signature, Steganography, Cryptography, LSB, EdDSA, AES, Man-in-the-middle Attack

Abstract


Nowadays, man-in-the-middle (MITM) attacks have become a large problem due to the advancement of computational power and interactive mobile technologies. Message security is a crucial concern that ought to be managed in order to help protect vital data from unauthorized people, such as MITM. Steganography is the technique of hiding secret data within an ordinary, non-secret file or message in order to avoid detection when communicating through an unsecured network. Steganography applications play a vital role in various fields that involve classified data transfer, such as healthcare, multimedia, and the military. Hence, the application of steganography in those fields attracts MITM attacks. Thus, in an attempt to address the challenge. This study proposes a hybrid approach that integrates an image steganography technique, the Advanced Encryption Standard (AES) for message encryption, and EdDSA (Edward-Curve Digital Signature Algorithm) for signature verification to enhance steganography against MITM attacks. The proposed hybrid approach was tested and measured using image metrics (MSE, PSNR, and SSIM) and histogram visualization and verified through experimentation. The results have proven that the proposed hybrid approach is an enhanced security approach with low execution time, more payload size for hiding messages, and a high invisibility embedded message to MITM compared with other existing approaches. This study has potential limitations. It does not explore tamper resistance or algorithm robustness, and it was not tested on a public image dataset.

Author Biographies

Gwamaka Henry Mwakajwanga, Tanzania Communications Regulatory Authority

Gwamaka Henry Mwakajwanga is serving as a Software Developer in Department of ICT at Tanzania Communications Regulatory Authority (TCRA). He studied BSc. Computer Science in Software Engineering, specialized in Software development and Cyber security at the Ruaha Catholic University (RUCU), Tanzania and he is currently pursuing Master in Computation science and engineering at Dar es salaam Institute of Technology (DIT). His current research interests include Cyber Security, Software Development, mobile computing and Mobile Computing.

Othmar Mwambe, Dares Salaam Institute of Technology, Dar es salaam, Tanzania

Dr. Othmar Othmar Mwambe is serving as an Institute Consultancy Bureau Coordinator at Dar es Salaam Institute of Technology (DIT), he is also working as a lecturer in the department of Computer Studies (DIT). He studied BSc. Computer Engineering, specialized in Computer Systems and Networks at the Kharkiv National University of Radio-electronics (KNURE), Ukraine, and Functional Control Systems (PhD) at Shibaura Institute of Technology (SIT), Japan. Before joining DIT, he worked for the National Institute of Informatics (NII), Japan, as a researcher and he also worked for Tokyo 2020 Olympics (Tokyo, Japan) as Venue Technical Operations Supervisor (VTO). He is MONBUKAGAKUSHO (MEXT) scholar and he has been awarded Shiro Arimoto Memorial Award by Shibaura Institute of Technology (2019) and Excellent Presentation Award by 5th International Conference on Teaching and Education Sciences (ictes, 2018). He has published several peer reviewed international journals and ever served as editorial board member for several international journals including Indonesian Journal of Electrical Engineering and Computer Science, International Journal of Information and Education Technology (IJIET), International Educational Research (IER), Journal of Computer and Communications (JCC) and Asian Journal of Contemporary Education(AESS). His current research interests include intelligent information systems, information security, and functional control systems, cognitive computing, brain computer interfaces (BCI), context awareness and educational technology (e-Learning).

Downloads

Published

2024-08-27

How to Cite

Mwakajwanga, G. H., & Mwambe, O. (2024). Digital-Signature Oriented Steganography Approach against Man-in-the-Middle Attack. International Journal of Interactive Mobile Technologies (iJIM), 18(16), pp. 158–173. https://doi.org/10.3991/ijim.v18i16.48709

Issue

Section

Papers