Architecture of Network Camera Photo Authentication Scheme using Steganography Approach

10/03/2021
by   Ahmad M Nagm, et al.
0

The aim of integrity protection process is not only to secure the send message, but also ensures that the original message is not modified during sending the message. In this paper, a novel proposed model is proposed to verify that the sent message was not modified. The proposed model starting with encrypting the original message and applying one of the hash functions on the message. The ciphered message, private key, and the output of hash function was reshaped to apply Discrete Cosine Transform (DCT), Zig-zag ordering, and Huffman coding to obtain a compressed text, this compressed text is then hidden in an image. The same steps with a reverse order are applied on the receiver to obtain the decrypted message and then apply the same hash function to verify that the message was not changed. Different experiments were conducted and the results demonstrated that the proposed model achieved high integrity protection.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset