Novel concept of data security using sliding image and image digest

被引:0
|
作者
Singhal, Neha [1 ]
Pathak, Vibhakar [1 ]
机构
[1] Arya Coll Engn & IT, Dept Comp Sci & Engn, Jaipur, Rajasthan, India
来源
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY | 2022年 / 25卷 / 04期
关键词
Data security; Image authentication; Image digest;
D O I
10.1080/09720529.2022.2091021
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
We are living in the tech world and information or data centers are growing day by day. Even the government departments are coming with the online portals and more rapid computerization, which enables them to get the data as well as to send the important data and report, online from anywhere in the world. With the ease, also comes some security issues, like how to keep the data protected from unauthorized access. For this purpose, we have proposed the security model in which we have enhanced the security in two phases, one is the authentication phase where the slider-based image partition concept is used and second phase is the message sharing module in which authentication key is used, which is generated using the Image and Message MD5 is also very strong. The SHA-512 hash of the image will be stored in the database which will act as IMAGE DIGEST for the verification purpose at the receiver end. When the receiver receives the image, the SHA-512 function will again operate over the received image, if both the image matches with HASH which is generated at the user end image HASH stored in database, then the image is considered valid at receiver end. Similarly, the message digest for the message can also be generated as stored in the database for the verification purpose. The generated authentication keys are tested with the previous approach using the various online and offline tools and results are better that the previous.
引用
收藏
页码:975 / 985
页数:11
相关论文
共 50 条
  • [21] Enhanced Model for Medical Image Data Security Using Machine Learning
    S. Karthiyayini
    Jeniffer John Simon Christopher
    I. Sheik Arafat
    Faizal Mukthar Hussain Syed Moomin
    SN Computer Science, 5 (8)
  • [22] Image Encryption Technique Using Improved A5/1 Cipher on Image Bitplanes for Wireless Data Security
    Naveen, Ch.
    Satpute, Vishal R.
    2016 INTERNATIONAL CONFERENCE ON MICROELECTRONICS, COMPUTING AND COMMUNICATIONS (MICROCOM), 2016,
  • [23] DIGITAL IMAGE SECURITY USING MOSAICS
    Gaikwad, Nishigandha V.
    Metkar, Shilpa P.
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1074 - 1079
  • [24] Concealing data in a digital image with multilayer security
    Balkrishan, Jindal
    Singh, Amar Partap
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (12) : 7045 - 7063
  • [25] A data security method for image transmission in telemammography
    Zhou, X
    Huang, HK
    Lou, SA
    RADIOLOGY, 1999, 213P : 105 - 105
  • [26] Concealing data in a digital image with multilayer security
    Jindal Balkrishan
    Amar Partap Singh
    Multimedia Tools and Applications, 2016, 75 : 7045 - 7063
  • [27] Security and robustness enhancement for image data hiding
    Liu, Ning
    Amin, Palak
    Subbalakshmi, K. P.
    IEEE TRANSACTIONS ON MULTIMEDIA, 2007, 9 (03) : 466 - 474
  • [28] IMAGE DATA PREPARATION FOR INTELLIGENT SECURITY SYSTEMS
    Sheraizin, S.
    Itzikowitz, S.
    2008 IEEE 25TH CONVENTION OF ELECTRICAL AND ELECTRONICS ENGINEERS IN ISRAEL, VOLS 1 AND 2, 2008, : 198 - 202
  • [29] Efficient method for security image data compression
    Pata, P
    Klima, M
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 456 - 458
  • [30] Data security rise of image transmission systems
    Suslonov, S.A.
    Ivanov, S.V.
    Borshchakov, I.A.
    Radiotekhnika, 2002, (10): : 20 - 23