Multiple level information security using image steganography and authentication
dc.contributor.author | Espina, Marilou | |
dc.contributor.author | Fajardo, Arnel | |
dc.contributor.author | Gerardo, Bobby D. | |
dc.contributor.author | Medina, Ruji P. | |
dc.date.accessioned | 2024-05-11T06:01:00Z | |
dc.date.available | 2024-05-11T06:01:00Z | |
dc.date.issued | 2019-12 | |
dc.identifier.citation | Espina, M. O., Fajardo, A. C., Gerardo, B. D., & Medina, R. P. (2019). Multiple level information security using image steganography and authentication. Int. J. Adv. Trends Comput. Sci. Eng. ISSN 2278, 3091, 3297-3303. | en |
dc.identifier.issn | 22783091 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14353/436 | |
dc.description.abstract | The security of information during transmission in the open network is crucial. While sharing digital data on the internet, it is essential to observe information security goals: confidentiality, integrity, authenticity, and accuracy. This paper presents a multiple tier information security through image steganography technique using a novel puzzle in YCbCr color space, and digitally signed stego image for authentication. Experimental results show that the resemblance between the stego-images and cover images is high. The recognition of the stego image is small, with the use of the Human Visual System (HVS) having an average PSNR value of 47.72db. The probability of detection of the stego-images using Chi-Square Analysis is low, with the average value of 4.39E-05. | en |
dc.language.iso | en | en |
dc.publisher | World Academy of Research in Science and Engineering | en |
dc.subject | Data hiding | en |
dc.subject | Steganography | en |
dc.subject | Information security | en |
dc.subject | Open network | en |
dc.subject | Confidentiality | en |
dc.subject | Image stenography | en |
dc.subject | Novel puzzle | en |
dc.subject | Human visual system | en |
dc.subject | Latest significant bit | en |
dc.subject | Data security | en |
dc.subject | Secret communication | en |
dc.subject | Digital data security | en |
dc.subject | Peak-Signal to-Noise Ratio | en |
dc.subject | Secret message | en |
dc.subject | Stego image | en |
dc.subject.lcsh | Information services--Security measures | en |
dc.subject.lcsh | Authentication | en |
dc.subject.lcsh | Confidential communications | en |
dc.subject.lcsh | Data protection | en |
dc.subject.lcsh | Cryptography | en |
dc.subject.lcsh | Hashing (Computer science) | en |
dc.subject.lcsh | Digital signatures | en |
dc.title | Multiple level information security using image steganography and authentication | en |
dc.type | Article | en |
dcterms.accessRights | Open access | en |
dc.citation.journaltitle | International Journal of Advanced Trends in Computer Science and Engineering | en |
dc.citation.volume | 8 | en |
dc.citation.issue | 6 | en |
dc.citation.firstpage | 3297 | en |
dc.citation.lastpage | 3303 | en |
local.isIndexedBy | Scopus | en |
Dateien zu dieser Ressource
Das Dokument erscheint in:
-
Journal articles published externally [106]
Journal articles published externally, written by WVSU faculty members, staff, and students -
Scholarly and Creative Works of Faculty Members and Researchers [26]
Journal Articles, Books, Book Chapters, Conference Proceedings, and Creative Works Produced by WVSU CICT Faculty Members