We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo ScienceWISE logo

Computer Science > Cryptography and Security

Title: Architecture of Network Camera Photo Authentication Scheme using Steganography Approach

Abstract: The aim of integrity protection process is not only to secure the send message, but also ensures that the original message is not modified during sending the message. In this paper, a novel proposed model is proposed to verify that the sent message was not modified. The proposed model starting with encrypting the original message and applying one of the hash functions on the message. The ciphered message, private key, and the output of hash function was reshaped to apply Discrete Cosine Transform (DCT), Zig-zag ordering, and Huffman coding to obtain a compressed text, this compressed text is then hidden in an image. The same steps with a reverse order are applied on the receiver to obtain the decrypted message and then apply the same hash function to verify that the message was not changed. Different experiments were conducted and the results demonstrated that the proposed model achieved high integrity protection.
Comments: 6 Pages, 3 Figures. arXiv admin note: text overlap with arXiv:1401.5561 by other authors
Subjects: Cryptography and Security (cs.CR)
Journal reference: International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April-2017 ISSN 2229-5518
Cite as: arXiv:2110.01058 [cs.CR]
  (or arXiv:2110.01058v1 [cs.CR] for this version)

Submission history

From: Ahmad Nagm Nagm [view email]
[v1] Sun, 3 Oct 2021 18:01:27 GMT (790kb)

Link back to: arXiv, form interface, contact.