Achieving Data Integrity and Confidentiality Using Image Steganography and Hashing Techniques

被引:0
|
作者
Hambouz, Ahmed [1 ]
Shaheen, Yousef [1 ]
Manna, Abdelrahman [1 ]
Al-Fayoumi, Mustafa [1 ]
Tedmori, Sara [1 ]
机构
[1] Princess Sumaya Univ Technol, Dept Comp Sci, Amman, Jordan
关键词
Steganography; Data Confidentiality; Data Integrity; PSNR; SHA; 256; Data Tampering;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Most existing steganography algorithms keen on achieving data confidentiality only by embedding the data into a cover-media. This research paper introduced a new steganography technique that achieves both data confidentiality and integrity. Data confidentiality is achieved by embedding the data bits in a secret manner into stego-image. Integrity is achieved using SHA 256 hashing algorithm to hash the decoding and encoding variables. The proposed model performed a high PSNR values for using a dataset of different image sizes with an average PSNR of 82.933%.
引用
收藏
页码:45 / 50
页数:6
相关论文
共 50 条
  • [1] Data Confidentiality Using Steganography and Cryptographic Techniques
    Prashanti, G.
    Jyothirmai, B. V.
    Chandana, K. Sai
    [J]. PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT ,POWER AND COMPUTING TECHNOLOGIES (ICCPCT), 2017,
  • [2] PSO-based steganography scheme using DWT-SVD and cryptography techniques for cloud data confidentiality and integrity
    Mahmood, Ghassan Sabeeh
    Huang, Dong Jun
    [J]. Journal of Computers (Taiwan), 2019, 30 (06) : 31 - 45
  • [3] Achieving an effective, confidentiality and integrity of data in cloud computing
    Mahmood, Ghassan Sabeeh
    Huang, Dong Jun
    Jaleel, Baidaa Abdulrahman
    [J]. International Journal of Network Security, 2019, 21 (02): : 326 - 332
  • [4] Optimize Image Steganography Based on Distinction Disparity Value and HMPSO to Ensure Confidentiality and Integrity
    Ali, Ali Salem
    Alsamaraee, Suray
    Hussein, Aya Ayad
    [J]. JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2024, 2024
  • [5] Data Integrity Mechanism Using Hashing Verification
    Hamamreh, Rushdi A.
    Jamoos, Mohammed A.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (09): : 94 - 98
  • [6] Steganography and Classification of Image Steganography Techniques
    Kaur, Sumeet
    Bansal, Savina
    Bansal, R. K.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 870 - 875
  • [7] A Review of Image Steganography Based on Multiple Hashing Algorithm
    Alenizi, Abdullah
    Mohammadi, Mohammad Sajid
    Al-Hajji, Ahmad A.
    Ansari, Arshiya Sajid
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (02): : 2463 - 2494
  • [8] Data Security Using Cryptography and Steganography Techniques
    Saleh, Marwa E.
    Aly, Abdelmgeid A.
    Omara, Fatma A.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (06) : 390 - 397
  • [9] A Novel Coverless Steganography Method Based on Image Hashing
    Huang, Cheng
    Qian, Zhen-Xing
    Zhang, Xin-Peng
    [J]. Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2020, 40 (12): : 1302 - 1306
  • [10] Data Confidentiality in Healthcare Monitoring Systems Based on Image Steganography to Improve the Exchange of Patient Information Using the Internet of Things
    AlEisa, Hussah N.
    [J]. JOURNAL OF HEALTHCARE ENGINEERING, 2022, 2022