PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Development and implementation of hash function for generating hashed message

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Steganography is a method of sending confidential information in a way that the existence of the channel in this communication remains secret. A collaborative approach between steganography and digital signature provides a high secure hidden data. Unfortunately, there are wide varieties of attacks that affect the quality of image steganography. Two issues that required to be addressed are large size of the ciphered data in digital signature and high bandwidth. The aim of the research is to propose a new method for producing a dynamic hashed message algorithm in digital signature and then embedded into image for enhancing robustness of image steganography with reduced bandwidth. A digital signature with smaller hash size than other hash algorithms was developed for authentication purposes. A hash function is used in the digital signature generation. The encoder function encoded the hashed message to generate the digital signature and then embedded into an image as a stego-image. In enhancing the robustness of the digital signature, we compressed or encoded it or performed both operations before embedding the data into the image. This encryption algorithm is also computationally efficient whereby for messages with the sizes less than 1600 bytes, the hashed file reduced the original file up to 8.51%.
Twórcy
autor
  • Young Researchers and Elite Club, Dariun Barnch, Islamic Azad University, Dariun, Iran
autor
  • Islamic Azad University of Dariun Branch, Dariun, Iran.
Bibliografia
  • 1) Shin, J., & Ruland, C. (2013, October). A survey of image hashing technique for data authentication in WMSNs. In Wireless and Mobile Computing, Networking and Communications (WiMob), 2013 IEEE 9th International Conference on(pp. 253-258). IEEE.
  • 2) Saadi, K. A., Bouridane, A., & Guessoum, A. (2009). Combined Fragile Watermark and Digital Signature for H. 264/AVC Video Authentication. In EUSIPCO (Vol. 9, pp. 1-4).
  • 3) Thomas, P., & Singh, A. K. (2013). A Novel Steganographic Approach for Enhancing the Security of Images.
  • 4) Makbol, N. M., & Khoo, B. E. (2013). Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU-International Journal of Electronics and Communications, 67(2), 102-112.
  • 5) Islam, R., Naji, A. W., Zaidan, A. A., & Zaidan, B. B. (2010). New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques. arXiv preprint arXiv:1002.2416.
  • 6) Wang, Q., Wang, C., Li, J., Ren, K., & Lou, W. (2009). Enabling public verifiability and data dynamics for storage security in cloud computing. Computer Security–ESORICS 2009, 355-370.
  • 7) Chen, T., Wang, J., & Zhou, Y. (2001). Combined digital signature and digital watermark scheme for image authentication. In Info-tech and Info-net, 2001. Proceedings. ICII 2001-Beijing. 2001 International Conferences on (Vol. 5, pp. 78-82). IEEE.
  • 8) Jansirani, A., Rajesh, R., Balasubramanian, R., & Eswaran, P. (2011). Hi-tech authentication for palette images using digital signature and data hiding. The International Arab Journal of Information Technology, 8(2), 117-123.
  • 9) Filler, T., Ker, A. D., & Fridrich, J. (2009, February). The square root law of steganographic capacity for Markov covers. In IS&T/SPIE Electronic Imaging (pp. 725408-725408). International Society for Optics and Photonics.
  • 10) Mazumder, J. A., & Hemachandran, K. (2012). Review Of Different Techniques Used In Recent Steganography Researches. International Journal of Engineering, 1(8).
  • 11) Lee, J. W., Kim, S. L., Kim, C. H., Koch, R. H., Lee, C. U., Kim, H. I., & Park, J. H. (2009). The sdB+ M eclipsing system HW Virginis and its circumbinary planets. The Astronomical Journal, 137(2), 3181.
  • 12) Goyal, H., & Chutani, S. (2012). LSB Embedding in Spatial Domain-A Review of Improved Techniques. International Journal of Computers & Technology, 3(1), 153-157.
  • 13) Aarumugam, G., & Rajan, B. (2011). Independent Domain of Symmetric Encryption using Least SignificantBit: Computer Vision, Steganography and Cryptography Techniques (Doctoral dissertation, Dalarna University).
  • 14) Fridrich, J., Kodovsky, J., Holub, V., & Goljan, M. (2011). Steganalysis of content-adaptive steganography in spatial domain. In Information Hiding (pp. 102-117). Springer Berlin/Heidelberg.
  • 15) Fridrich, J., Goljan, M., & Hogea, D. (2003). Steganalysis of JPEG images: Breaking the F5 algorithm. In Information Hiding (pp. 310-323). Springer Berlin/Heidelberg.
  • 16) Westfeld, A. (2009). Fast Determination of Sensitivity in the Presence of Countermeasures in BOWS-2. In Information Hiding (pp. 89-101). Springer Berlin/Heidelberg.
  • 17) El-Ghoneimy, M. M. (2008). Comparison between two Watermarking Algorithms Using DCT Coefficient and LSB Replacement. Journal of Theoretical and Applied Information Technology, 4(2), 132-139.
  • 18) Westfeld, P., Maas, H. G., Pust, O., Kitzhofer, J., & Brücker, C. (2010, July). 3-D least squares matching for volumetric velocimetry data processing. In Proceedings of the 15th International Symposium on Appliocationsof Laser Techniques to Fluid Mechnaics (pp. 5-8).
  • 19) Filler, T., Judas, J., & Fridrich, J. (2010). Minimizing embedding impact in steganography using trellis-coded quantization. Proceedings of Media Forensics and Security III, SPIE, 7451, 715405-1.
  • 20) Andrew, J. P. (2009). European Patent No. EP 0971544. Munich, Germany: European Patent Office.
  • 21) Goljan, M., Fridrich, J., & Filler, T. (2009). Large scale test of sensor fingerprint camera identification. Proc. SPIE, Electronic Imaging, Security and Forensics of Multimedia Contents XI, San Jose, CA.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-dae426e5-db08-44df-8671-bc71fc985f97
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.