WIRED++WVSU Institutional Repository and Electronic Dissertation and Theses PLUS
    • English
    • Filipino
    • Deutsch
    • русский
  • English 
    • English
    • Filipino
    • Deutsch
    • русский
  • Login
View Item 
  •   WIRED++ Home
  • WVSU External Publications
  • Journal articles published externally
  • View Item
  •   WIRED++ Home
  • WVSU External Publications
  • Journal articles published externally
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Multiple level information security using image steganography and authentication

Thumbnail
View/Open
PUB-JAR-M-2019-EspinaMO-FLT.pdf (794.6Kb)
Date
2019-12
Author
Espina, Marilou ORCID
Fajardo, Arnel ORCID
Gerardo, Bobby D. ORCID
Medina, Ruji P. ORCID
Metadata
Show full item record
Share 
 
Abstract
The security of information during transmission in the open network is crucial. While sharing digital data on the internet, it is essential to observe information security goals: confidentiality, integrity, authenticity, and accuracy. This paper presents a multiple tier information security through image steganography technique using a novel puzzle in YCbCr color space, and digitally signed stego image for authentication. Experimental results show that the resemblance between the stego-images and cover images is high. The recognition of the stego image is small, with the use of the Human Visual System (HVS) having an average PSNR value of 47.72db. The probability of detection of the stego-images using Chi-Square Analysis is low, with the average value of 4.39E-05.
URI
https://hdl.handle.net/20.500.14353/436
Recommended Citation
Espina, M., Fajardo, A., Gerardo, B. D., & Medina, R. P. (2019). Multiple level information security using image steganography and authentication. International Journal of Advanced Trends in Computer Science and Engineering, 8(6), 3297-3303.
Type
Article
ISSN
22783091
Keywords
Data hiding Steganography Information security Open network Confidentiality Image stenography Novel puzzle Human visual system Latest significant bit Data security Secret communication Digital data security Peak-Signal to-Noise Ratio Secret message Stego image
Subject
Information services--Security measures OCLC - FAST (Faceted Application of Subject Terminology) Authentication OCLC - FAST (Faceted Application of Subject Terminology) Confidential communications OCLC - FAST (Faceted Application of Subject Terminology) Data protection OCLC - FAST (Faceted Application of Subject Terminology) Cryptography OCLC - FAST (Faceted Application of Subject Terminology) Hashing (Computer science) OCLC - FAST (Faceted Application of Subject Terminology) Digital signatures OCLC - FAST (Faceted Application of Subject Terminology)
Collections
  • Journal articles published externally [120]
  • Scholarly and Creative Works of Faculty Members and Researchers [26]

Related items

Showing items related by title, author, creator and subject.

  • Thumbnail

    The tale of the dragon and the elephant: A review on the implications of Sino-Indian border disputes to political order in Asia 

    Flores, Reymund B. ORCID (Institute of China and Asia-Pacific Studies, National Sun Yat-sen University, Taiwan, ROC; Department of Administrative Studies and Politics, Faculty of Economics and Administration, University of Malaya, Malaysia, 2017)
    Asia is sitting on a tinderbox. Tensions such as involving China already grabbed enough headlines. One of which is the border dispute between this Asian Dragon with India. The formation of strong alliances and conflict ...
  • Thumbnail

    The performance of Blum-Blum-Shub elliptic curve pseudorandom number generator as WiFi protected access 2 security key generator 

    Omorog, Challiz D. ORCID; Gerardo, Bobby D. ORCID; Medina, Ruji P. ORCID (Association for Computing Machinery, 2018-09-20)
    WiFi Protected Access 2 (WPA2) is considered the most secure network security protocol in wireless routers, despite the discovery of partial key exposure vulnerability. In light of, an experiment was conducted to investigate ...
  • Thumbnail

    Using a modified approach of blowfish algorithm for data security in cloud computing 

    Corpuz, Reynaldo R.; Gerardo, Bobby D. ORCID; Medina, Ruji P. ORCID (Association for Computing Machinery, 2018-12-29)
    Cloud computing brought remarkable potential changes and excellent opportunities to the information technology industry. It is particularly useful in most of the networked transactions. Cloud computing common issue problems ...

© 2025 University Learning Resource Center | WVSU
Contact Us | Send Feedback
 

 

Browse

All of WIRED++Communities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

LoginRegister

Statistics

View Usage Statistics

© 2025 University Learning Resource Center | WVSU
Contact Us | Send Feedback
 

 

EXTERNAL LINKS DISCLAIMER

This link is being provided as a convenience and for informational purposes only. West Visayas State University bears no responsibility for the accuracy, legality or content of the external site or for that of subsequent links. Contact the external site for answers to questions regarding its content.

If you come across any external links that don't work, we would be grateful if you could report them to the repository administrators.

Click DOWNLOAD to open/view the file. Chat Graciano to inform us in case the link we provided don't work.

Download