Confidentiality of Data using Hash Function
DOI:
https://doi.org/10.32628/IJSRST218486Keywords:
Hash Function, steganography, security integrity.Abstract
Steganography and Cryptography are two major fields which is widely used for data security. With the help of these technologies, data security is provided in banking system. In the proposed method, the online transactions are done virtually using hash function. Encryption of data is done by using the cryptographic hash function algorithm. The proposed approach implements an efficient algorithm for embedding the data in an image using steganography which provides the better security pattern for sending messages through a network. The authentication details of the sender and the receiver is hidden to achieve a secure transmission. The proposed approach provides better integrity and confidentiality. This paper implemented a novel methodology which can be used as a secure and highly efficient method of data hiding and data extracting.
References
- Gupta, S. and R. Jain, 2015, ‘An innovative method of Text Steganography’, Proceedings of the 2015 3rd International Conference on Image Information Processing , December 21-24, 2015, IEEE, Waknaghat, India, pp: 60-64.
- Koley, S. and K.K. Mandal, 2016. ‘A novel approach of secret message passing through text steganography’, Proceedings of the International Conference on Signal Processing, Communication, Power and EmbeddedSystem (SCOPES), October 3-5, 2016, IEEE, Paralakhemundi, India.
- Mandal, K.K., A. Jana and V. Agarwal, 2014. ‘Text Steganography based on mathematical model of number system’, Proceedings of the 2014 International Conference on Circuits, Power and Computing Technologies (ICCPCT’14), March 20-21, 2014, IEEE, Nagercoil, India.
- Por, L.Y. and B. Delina, 2008. ‘Information hiding in text steganography’, Proceeding of the7th WSEAS International Conference on Mathematics and Computers in Science and Engineering, April 6-8,2008, World Scientific and Engineering Academy and Society, Hangzhou, China.
- Sharma, S., A. Gupta, M.C. Trivedi and V.K. Yadav, 2016. ‘Analysis of different text steganography techniques’, A survey. Proceedings of the 2016 2nd International Conference on Computational Intelligence and Communication Technology (CICT), February 12-13, 2016, IEEE, Ghaziabad, India.
- Singh, H., A. Diwakar and S. Upadhyaya, 2014. A novel approach to text steganography. Proceedings of the 2014 1st International Congress on Computer, Electronics, Electrical and Communication Engineering, March 17-18, 2014, Chennai, India.
- C. Qin, P. Ji, C. C. Chang, J. Dong, and X. M. Sun, ‘Non-uniform Watermark Optimal Iterative BTC for Image Tampering Recovery’,IEEE Multimedia, 2018.
- Xintao Duan, Kai Jia, Baoxia Li1, Daidou Guo,En Zhang,and Chuan Qin ‘Reversible steganography Scheme Based on a U-Net Structure ‘, IEEE Access, 2017.
- E. P. Singh and E. P. S. Saini, ‘A Novel Approach to Robust and Secure Image Steganography Based on Hash and Encryption’,Int. J. Eng. Sci. Res. Technol., vol. 5, no. 3, pp. 194–201, 2016.
- J. Al-Saraireh, ‘An efficient approach for query processing over encrypted database’, J. Comput. Sci., vol. 13, no. 10, pp. 548–557, 2017.
- R. Indrayani, H. A. Nugroho, R. Hidayat, and I. Pratama, ‘Increasing the security of MP3 steganography using AES Encryption and MD5 hash function’, in Proceedings - 2016 2nd International Conference on Science and Technology-Computer, ICST 2016, 2017, pp. 129–132.
- S. S. Saraireh, and M. S. Saraireh, ‘Filter Bank Block Cipher and LSB Based Steganography for Secure Data Exchange’, Int. J. Commun. Antenna Propag., vol. 7, no. 1, p. 1, Feb. 2017.
- C. Qin, C. C. Chang, and Y. P. Chiu ‘A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting’, IEEE Transactions on Image Processing, vol.23, 2014.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.