Back to Search Start Over

Architecture of Network Camera Photo Authentication Scheme using Steganography Approach

Authors :
Nagm, Ahmad M.
Youssef, Khaled Y.
Youssef, Mohammad I.
Source :
International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 ISSN 2229-5518
Publication Year :
2021

Abstract

The aim of integrity protection process is not only to secure the send message, but also ensures that the original message is not modified during sending the message. In this paper, a novel proposed model is proposed to verify that the sent message was not modified. The proposed model starting with encrypting the original message and applying one of the hash functions on the message. The ciphered message, private key, and the output of hash function was reshaped to apply Discrete Cosine Transform (DCT), Zig-zag ordering, and Huffman coding to obtain a compressed text, this compressed text is then hidden in an image. The same steps with a reverse order are applied on the receiver to obtain the decrypted message and then apply the same hash function to verify that the message was not changed. Different experiments were conducted and the results demonstrated that the proposed model achieved high integrity protection.<br />Comment: 6 Pages, 3 Figures. arXiv admin note: text overlap with arXiv:1401.5561 by other authors

Details

Database :
arXiv
Journal :
International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 ISSN 2229-5518
Publication Type :
Report
Accession number :
edsarx.2110.01058
Document Type :
Working Paper