Architecture of Network Camera Photo Authentication Scheme using Steganography Approach

10/03/2021
by   Ahmad M Nagm, et al.
0

The aim of integrity protection process is not only to secure the send message, but also ensures that the original message is not modified during sending the message. In this paper, a novel proposed model is proposed to verify that the sent message was not modified. The proposed model starting with encrypting the original message and applying one of the hash functions on the message. The ciphered message, private key, and the output of hash function was reshaped to apply Discrete Cosine Transform (DCT), Zig-zag ordering, and Huffman coding to obtain a compressed text, this compressed text is then hidden in an image. The same steps with a reverse order are applied on the receiver to obtain the decrypted message and then apply the same hash function to verify that the message was not changed. Different experiments were conducted and the results demonstrated that the proposed model achieved high integrity protection.

READ FULL TEXT

page 1

page 5

research
05/10/2020

A Generic Message Authentication Code: A combination of the Inter MAC and Carter-Wegman MAC

Message Authentication Code (MAC) is a method for providing integrity an...
research
11/13/2020

Information-theoretically secure data origin authentication with quantum and classical resources

In conventional cryptography, information-theoretically secure message a...
research
01/08/2019

Using fuzzy bits and neural networks to partially invert few rounds of some cryptographic hash functions

We consider fuzzy, or continuous, bits, which take values in [0;1] and (...
research
03/15/2021

Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes

Message authentication guarantees the integrity of messages exchanged ov...
research
04/28/2020

Specifying a Cryptographical Protocol in Lustre and SCADE

We present SCADE and Lustre models of the Message Authenticator Algorith...
research
11/17/2020

Secure Location-Aware Authentication and Communication for Intelligent Transportation Systems

Intelligent transportation systems (ITS) are expected to effectively cre...
research
02/28/2021

Protocol-independent Detection of "Messaging Ordering" Network Covert Channels

Detection methods are available for several known covert channels. Howev...

Please sign up or login with your details

Forgot password? Click here to reset