2,184 Hits in 3.7 sec

A literature Review of Cryptography on RC4 Stream Cipher and Hash-LSB Steganography

2020 International journal for research in engineering application & management  
In this paper, we review numerous research papers on different techniques of encryption and steganography.  ...  Therefore several techniques have been developed to transfer data securely and steganography is one of them.  ...  RC4 Simple and robust Encryption and decryption time is based on the key length and data size Image data requires large time as compared to text or sound data. IV.  ... 
doi:10.35291/2454-9150.2020.0308 fatcat:4nobg2y2sfcrfduvb7qw7oisoy

Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination

Muneera Alotaibi, Daniah Al-hendi, Budoor Alroithy, Manal AlGhamdi, Adnan Gutub
2019 Journal of Information Security and Cybercrimes Research  
Our enhancement is designed to secure information transformation over the internet by combining hash, cryptography and steganography mechanisms.  ...  The proposed work will use hash function to store the secret password to provide increased security.  ...  [15] proposed a steganography scheme based on a hash function coupled with AES encryption. They presented a combination of two techniques, steganography and cryptography.  ... 
doi:10.26735/16587790.2019.001 fatcat:6y2asttqsvb2jg3cxercin4kwu

Coverless Image Steganography: A Survey

Jiaohua Qin, Yuanjing Luo, Xuyu Xiang, Yun Tan, Huajun Huang
2019 IEEE Access  
, feature extraction, generation of hash sequence and mapping relationships.  ...  Image steganography, aiming at using cover images to convey secret information has become one of the most challenge and important subjects in the field of information security recently.  ...  At the same time, Zheng et al. proposed a new coverless steganography method based on robust image hashing with higher capacity, robustness, and security than the method proposed in [33] , which is also  ... 
doi:10.1109/access.2019.2955452 fatcat:uu7wjgrolndlvp2he2rpescyfq

Confidentiality of Data using Hash Function

K. Ramprakaash, S. Ramkumar, R. K. Santhosh, P. Shanmuga Priya
2021 International Journal of Scientific Research in Science and Technology  
In the proposed method, the online transactions are done virtually using hash function. Encryption of data is done by using the cryptographic hash function algorithm.  ...  Steganography and Cryptography are two major fields which is widely used for data security. With the help of these technologies, data security is provided in banking system.  ...  and Universal One-way hash functions.  ... 
doi:10.32628/ijsrst218486 fatcat:6wvwe2aiqfehdn7pyqcm6jbktu

Coverless Video Steganography Based on Frame Sequence Perceptual Distance Mapping

Runze Li, Jiaohua Qin, Yun Tan, Neal N. Xiong
2022 Computers Materials & Continua  
We propose a coverless video steganography method based on frame sequence perceptual distance mapping.  ...  Then we establish the relationship map between features and the hash sequence for information hiding.  ...  This is the first time that the coverless steganography solution has been applied to video carriers, bringing new ideas to the field of coverless steganography. Zou et al.  ... 
doi:10.32604/cmc.2022.029378 fatcat:ifdxolcpunc7nd2feihi2urpqu

An Innovative Approach for Video Steganography

Koumal Kaushik, Suman
2015 International Journal of Computer Network and Information Security  
In this paper a video steganography method is proposed using hash based round Least Significant Bit technique.  ...  Video steganography is a more secure than any other steganography technique in hiding information because of its complex structure it disables the intruder to attack.  ...  and authenticity, digital signatures, pseudo number generation, digital steganography, digital time stamping [16] .  ... 
doi:10.5815/ijcnis.2015.11.08 fatcat:kzv6htdpknb75ohufct5rvsmxq

A Novel Hash Based Least Significant Bit (2-3-3) Image Steganography In Spatial Domain

Manjula G.R, Ajit Danti
2015 International Journal of Security Privacy and Trust Management  
The image steganography takes the advantage of human eye limitation.  ...  A 2-3-3 LSB insertion method has been used for image steganography.  ...  Steganography means, cover writing it's origin is old and backs to Golden age of Greece when people at that time had different practices to hide writing for e.g. writing on a wooden tablet and then covering  ... 
doi:10.5121/ijsptm.2015.4102 fatcat:w2tneddpgrayrm5jp7s3ja7zmu

The Authenticity of Image using Hash MD5 and Steganography Least Significant Bit

Nurul Khairina, Muhammad Khoiruddin Harahap, Juanda Hakim Lubis
2018 IJISTECH (International Journal Of Information System & Technology)  
A hash function is one method used to test the authenticity of data, while steganography is one method used to maintain the security of confidential data from outside parties.  ...  Measurement of validity depends on whether there is a similarity between the value of the Hash that has been implanted and the value of the Hash obtained during the test.  ...  MD5 and LSB No Image File File Size (KB) Pixel Dimensi Width x Height Embedded Hash Code Status for Authenticity Testing Time Complexit y (s) Hash Code Obtained Before After Before After  ... 
doi:10.30645/ijistech.v2i1.13 fatcat:bau3b7guxzhbfaldovqaqy6ecm

A Novel Steganographic Scheme Based on Hash Function Coupled With AES Encryption

Rinu Tresa M J, Athira M Babu, Sobha T
2014 Advanced Computing An International Journal  
After encryption, the encrypted data is stored in the colour image by using a hash based algorithm.  ...  Image steganography becomes important in this manner. Steganography and cryptography are the two techniques that are often confused with each other.  ...  Image steganography becomes important in this manner. Least Significant Bit hiding is the one of the modern techniques for image steganography.  ... 
doi:10.5121/acij.2014.5103 fatcat:7wlgzox2gjflvitk2iovgvbiom


Deepak Kumar Sharma .
2014 International Journal of Research in Engineering and Technology  
A video steganography is an approach to hide the data inside the video.  ...  A double hash function technique is used to select the pixel from row and column.  ...  The values returned by a hash function are called hash values, hash codes, hash sums, checksums or simply hashes.  ... 
doi:10.15623/ijret.2014.0304030 fatcat:kf4zlhgb3vgp5lg3vm2c6lrr5u

Coverless VoIP Steganography Using Hash and Hash

S. Deepikaa, R. Saravanan
2020 Cybernetics and Information Technologies  
The hash array is attached with the VoIP samples, at the receiver side the hash table is separated, and the secret bits are extracted based on the hash array.  ...  AbstractPerforming secure and robust embedding and extracting in real time voice streams without deteriorating the voice quality is a great challenge.  ...  Introduction Hiding data into another file such as image, audio, video is the art of steganography. There are number of algorithms proposed and successfully implemented in real time.  ... 
doi:10.2478/cait-2020-0031 fatcat:wp6rqtdrcreuxkyelyy6bhgoly

Securing Data in Cloud Storage by using Steganography and Merkle Hash Tree Algorithm

K. Sasireka, P. Shanthi, A. Umamakeswari
2016 Indian Journal of Science and Technology  
Methods: Data proprietor encodes the record and conceal the data into a picture called steganography. Picture is split and is stored in cloud.  ...  One is steganography and another one is image splitting. The encrypted file is hidden into an image called steganography. Then that image is split into several parts and stored in cloud storage.  ...  In 11 , Barcode encoder is implemented based on steganography method by using thermal images.  ... 
doi:10.17485/ijst/2016/v9i48/107980 fatcat:hrtnrb42sfggnkwjrsstdbik2e

Blockchain of Signature Material Combining Cryptographic Hash Function and DNA Steganography [article]

Yixin Zhang
2019 arXiv   pre-print
Moreover, the time-stamped blockchain structure permits the incorporation of new cryptographic functions and DNA steganographies over time, thus can evolve over time without losing the continuous history  ...  Herein, the design of signature material combining cryptographic hash function and DNA steganography is proposed.  ...  While the block chain will grow over time, new hash function and DNA steganography will be incorporated to improve the security over time.  ... 
arXiv:1909.07914v1 fatcat:xmphg32u4fh5fgpfeh43jibnqy


Amir Ghaeedi, Erfaneh Noroozi
2016 Advances in Science and Technology Research Journal  
The aim of the research is to propose a new method for producing a dynamic hashed message algorithm in digital signature and then embedded into image for enhancing robustness of image steganography with  ...  A digital signature with smaller hash size than other hash algorithms was developed for authentication purposes. A hash function is used in the digital signature generation.  ...  JSteg algorithm The JSteg algorithm (Fridrich and Kodovsky, 2011) was one of the first JPEG steganography algorithms.  ... 
doi:10.12913/22998624/64016 fatcat:beugbciolnauboslqswhgzlit4

Applying Fuzzy Hashing to Steganography

Jeffery D. Dodson, Ambareen Siraj
2015 International Journal of Future Computer and Communication  
Index Terms-Context triggered piecewise hashing, fuzzy hashing, image analysis, image processing, Steganography.  ...  In this paper, we discuss the methods used in this study, the experimental results, followed by a discussion on future research.  ...  Fig. 7 combines the results of all experiments on one graph. Something to keep in mind that results could vary based on the Steganography program used.  ... 
doi:10.18178/ijfcc.2015.4.6.429 fatcat:xla2evevrbctfcgdditjbqi6gi
« Previous Showing results 1 — 15 out of 2,184 results