Encrypted Transfer of Confidential Information Using Steganography and Identity Verification Using Face Data

被引:3
|
作者
Agarwal, Parth [1 ]
Moudgil, Dhruve [1 ]
Priya, S. [1 ]
机构
[1] SRM IST, CSE, Kattankulathur, India
关键词
Cryptography; Steganography; Facial recognition; Face data; Encryption; Security; AES encoding;
D O I
10.1007/978-981-15-0199-9_14
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In last few years, information security has become a significant part of data communication. In order to address this crucial point in data communication to secure the confidential data, steganography and cryptography can be combined to give better results. Steganography is a practice to hide any confidential or sensitive information into another information that plays as the cover for the information, adding a layer of security on top of science of secret writing, known as cryptography. In this paper, we discuss an improved LSB steganography technique to optimize the algorithm hiding the bits in different channels selected dynamically using key. We further propose a platform leveraging cryptographic algorithms and verification using face data in pipeline to help keep data more secure.
引用
收藏
页码:155 / 166
页数:12
相关论文
共 50 条
  • [41] Robust face-voice based speaker identity verification using multilevel fusion
    Chetty, Girija
    Wagner, Michael
    [J]. IMAGE AND VISION COMPUTING, 2008, 26 (09) : 1249 - 1260
  • [42] Data compression using encrypted text
    Franceschini, R
    Mukherjee, A
    [J]. PROCEEDINGS OF THE THIRD FORUM ON RESEARCH AND TECHNOLOGY ADVANCES IN DIGITAL LIBRARIES (ADL '96), 1996, : 130 - 138
  • [43] Data Encryption & Decryption Using Steganography
    Manohar, N.
    Kumar, Peetla Vijay
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS 2020), 2020, : 697 - 702
  • [44] Data hiding using video steganography
    Ravichandran, C.
    Vajravelu, Ashok
    Panda, Sankarsan
    Degadwala, Sheshang Dipakkumar
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (01) : 112 - 123
  • [45] AN INFORMATION SECURITY SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
    Hossain, Md. Emran
    Grout, Vic
    Bhuiyan, Monir
    Miraz, Mandi H.
    [J]. PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 11), 2011, : 607 - 608
  • [46] Patient Confidential Information Transmission Using the Integration of PSO-Based Biomedical Signal Steganography and Threshold-Based Compression
    Chen, Shih-Ying
    Lin, Shan-Ju
    Tsai, Ming-Cheng
    Tsai, Ming-Dar
    Tang, Yih-Jing
    Chen, Shuo-Tsung
    Wang, Li-Hsiang
    [J]. JOURNAL OF MEDICAL AND BIOLOGICAL ENGINEERING, 2021, 41 (04) : 433 - 446
  • [47] Identity Verification Based on Handwritten Signatures with Haptic Information Using Genetic Programming
    Alsulaiman, Fawaz A.
    Sakr, Nizar
    Valdes, Julio J.
    El Saddik, Abdulmotaleb
    [J]. ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2013, 9 (02)
  • [48] A survey on information hiding using video steganography
    Mukesh Dalal
    Mamta Juneja
    [J]. Artificial Intelligence Review, 2021, 54 : 5831 - 5895
  • [49] A survey on information hiding using video steganography
    Dalal, Mukesh
    Juneja, Mamta
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2021, 54 (08) : 5831 - 5895
  • [50] Patient Confidential Information Transmission Using the Integration of PSO-Based Biomedical Signal Steganography and Threshold-Based Compression
    Shih-Ying Chen
    Shan-Ju Lin
    Ming-Cheng Tsai
    Ming-Dar Tsai
    Yih-Jing Tang
    Shuo-Tsung Chen
    Li-Hsiang Wang
    [J]. Journal of Medical and Biological Engineering, 2021, 41 : 433 - 446