In the domain of digital data exchange, ensuring information security is the supreme demand for data storage and transmission. Interlinking cryptographic techniques with steganographic principles can enhance data confidentiality. However, there have been no reports thus far to develop molecular platforms for hybrid crypto-steganography systems. Using our synthesized nanoclusters (BSA-Au/Ag NCs) through bovine serum albumin (BSA) as a versatile scaffold, we fabricated a molecular platform for concatenated logic circuits and molecular keypad lock. Then, we integrate terrestrial direction information transmission through molecular navigation, employing a double block cipher by combining stego key and shifting cipher key techniques to develop a hybrid crypto-steganography system, aimed at enhancing security paradigms. Furthermore, we prioritize information protection by developing an enhanced distress call protocol using a polyalphabetic cipher to activate covert communication capabilities, thereby safeguarding data against potential infiltrators.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1021/acsami.4c21488 | DOI Listing |
ACS Appl Mater Interfaces
March 2025
School of Chemical Science and Engineering, Department of Clinical Laboratory, Shanghai Tenth People's Hospital, Tongji University, 1239 Siping Rd, Shanghai, 200092, P. R. China.
In the domain of digital data exchange, ensuring information security is the supreme demand for data storage and transmission. Interlinking cryptographic techniques with steganographic principles can enhance data confidentiality. However, there have been no reports thus far to develop molecular platforms for hybrid crypto-steganography systems.
View Article and Find Full Text PDFSensors (Basel)
March 2022
Security Engineering Lab, Computer Science Department, Prince Sultan University, Riyadh 11586, Saudi Arabia.
Steganography is a vital security approach that hides any secret content within ordinary data, such as multimedia. This hiding aims to achieve the confidentiality of the IoT secret data; whether it is benign or malicious (e.g.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!