Multiple level information security using image steganography and authentication
Date
2019-12Metadata
Show full item recordShare
Abstract
The security of information during transmission in the open network is crucial. While sharing digital data on the internet, it is essential to observe information security goals: confidentiality, integrity, authenticity, and accuracy. This paper presents a multiple tier information security through image steganography technique using a novel puzzle in YCbCr color space, and digitally signed stego image for authentication. Experimental results show that the resemblance between the stego-images and cover images is high. The recognition of the stego image is small, with the use of the Human Visual System (HVS) having an average PSNR value of 47.72db. The probability of detection of the stego-images using Chi-Square Analysis is low, with the average value of 4.39E-05.
Recommended Citation
Espina, M., Fajardo, A., Gerardo, B. D., & Medina, R. P. (2019). Multiple level information security using image steganography and authentication.Type
ArticleISSN
22783091Keywords
Subject
Related items
Showing items related by title, author, creator and subject.
-
The tale of the dragon and the elephant: A review on the implications of Sino-Indian border disputes to political order in Asia
Flores, Reymund B. (Institute of China and Asia-Pacific Studies, National Sun Yat-sen University, Taiwan, ROC; Department of Administrative Studies and Politics, Faculty of Economics and Administration, University of Malaya, Malaysia, 2017)Asia is sitting on a tinderbox. Tensions such as involving China already grabbed enough headlines. One of which is the border dispute between this Asian Dragon with India. The formation of strong alliances and conflict ... -
The performance of Blum-Blum-Shub elliptic curve pseudorandom number generator as WiFi protected access 2 security key generator
Omorog, Challiz D. ; Gerardo, Bobby D. ; Medina, Ruji P. (Association for Computing Machinery, 2018-09-20)WiFi Protected Access 2 (WPA2) is considered the most secure network security protocol in wireless routers, despite the discovery of partial key exposure vulnerability. In light of, an experiment was conducted to investigate ... -
Using a modified approach of blowfish algorithm for data security in cloud computing
Corpuz, Reynaldo R.; Gerardo, Bobby D. ; Medina, Ruji P. (Association for Computing Machinery, 2018-12-29)Cloud computing brought remarkable potential changes and excellent opportunities to the information technology industry. It is particularly useful in most of the networked transactions. Cloud computing common issue problems ...