Novel concept of data security using sliding image and image digest

被引:0
|
作者
Singhal, Neha [1 ]
Pathak, Vibhakar [1 ]
机构
[1] Arya Coll Engn & IT, Dept Comp Sci & Engn, Jaipur, Rajasthan, India
来源
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY | 2022年 / 25卷 / 04期
关键词
Data security; Image authentication; Image digest;
D O I
10.1080/09720529.2022.2091021
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
We are living in the tech world and information or data centers are growing day by day. Even the government departments are coming with the online portals and more rapid computerization, which enables them to get the data as well as to send the important data and report, online from anywhere in the world. With the ease, also comes some security issues, like how to keep the data protected from unauthorized access. For this purpose, we have proposed the security model in which we have enhanced the security in two phases, one is the authentication phase where the slider-based image partition concept is used and second phase is the message sharing module in which authentication key is used, which is generated using the Image and Message MD5 is also very strong. The SHA-512 hash of the image will be stored in the database which will act as IMAGE DIGEST for the verification purpose at the receiver end. When the receiver receives the image, the SHA-512 function will again operate over the received image, if both the image matches with HASH which is generated at the user end image HASH stored in database, then the image is considered valid at receiver end. Similarly, the message digest for the message can also be generated as stored in the database for the verification purpose. The generated authentication keys are tested with the previous approach using the various online and offline tools and results are better that the previous.
引用
收藏
页码:975 / 985
页数:11
相关论文
共 50 条
  • [41] Image security
    Busch, C
    Nahrstedt, K
    Pitas, I
    IEEE COMPUTER GRAPHICS AND APPLICATIONS, 1999, 19 (01) : 16 - 17
  • [42] The concept of image
    Lala, MC
    FRENCH STUDIES, 1997, 51 (04) : 530 - 531
  • [43] A Novel Image Semantic Annotation Method Based on Image-Concept Distribution Model
    Ma Ying
    Zhang Laomo
    Gao Jixun
    AFFECTIVE COMPUTING AND INTELLIGENT INTERACTION, 2012, 137 : 293 - 301
  • [44] A novel image semantic annotation method based on image-concept distribution model
    Ma, Y. (cyechina@yahoo.cn), 1600, Advanced Institute of Convergence Information Technology (06):
  • [45] Reduction of Transmission Risk Problem in Image Security using Diverse Image Media
    Bodke, Minal
    Katti, J. V.
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 875 - 884
  • [46] A Novel Interactive Image Processing Approach for DICOM Medical Image Data
    Hu, Zhanli
    Zheng, Hairong
    Gui, Jianbao
    PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS, VOLS 1-4, 2009, : 54 - 57
  • [47] Digital Image Security Based on Data Hiding and Cryptography
    Al-Haj, Ali
    Abdel-Nabi, Hiba
    2017 3RD INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2017), 2017, : 437 - 440
  • [48] An Algorithm for Enhanced Image Security with Reversible Data Hiding
    Mohan, Arun K.
    Saranya, M. R.
    Anusudha, K.
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 1042 - 1045
  • [49] Smart photonic networks and computer security for image data
    Campello, J
    Gill, JT
    Morf, M
    Flynn, MJ
    MULITMEDIA NETWORKS: SECURITY, DISPLAYS, TERMINALS, AND GATEWAYS, 1998, 3228 : 272 - 279
  • [50] Linguistic Methods of Image Division for Visual Data Security
    Ogiela, Lidia
    Ogiela, Marek R.
    APPLIED SCIENCES-BASEL, 2023, 13 (08):