scholarly journals Steganography in Color Animated Image Sequence for Secret Data Sharing Using Secure Hash Algorithm

Author(s):  
Ratan Kumar Basak ◽  
Ritam Chatterjee ◽  
Paramartha Dutta ◽  
Kousik Dasgupta
2021 ◽  
Author(s):  
Ratan Kumar Basak ◽  
Ritam Chatterjee ◽  
Paramartha Dutta ◽  
Kousik Dasgupta

Abstract This paper presents a high capacity steganographic approach with secret message validation scheme at the receiver end. The proposed idea develops specifically for animated GIF, the cover media, to conceal secret text messages where Least Significant Digit (LSD) method is employed to embed secret information in the form of ASCII value. To validate the secret information at the receiver end, the secret text is encoded with Secure Hash Algorithm-1(SHA1) which is subsequently embedded in certain pre-defined portion of the cover media. The proposed algorithm is experimented on a large set of colored animated image sequences by varying text messages which produces satisfactory results. The proposed method also maintains good visual perceptibility while securing high embedding capacity


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Guodong Ye ◽  
Kaixin Jiao ◽  
Chen Pan ◽  
Xiaoling Huang

In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of the drawbacks, namely, fixed key and low sensitivity, of some current algorithms, this work tries to solve these two problems and includes two contributions: (1) removal of the phenomenon of summation invariance in a plain-image, for which SHA-3 is proposed to calculate the hash value for the plain-image, with the results being employed to influence the initial keys for chaotic map; (2) resolution of the problem of fixed key by using an ECG signal, that can be different for different subjects or different for same subject at different times. The Wolf algorithm is employed to produce all the control parameters and initial keys in the proposed encryption method. It is believed that combining with the classical architecture of permutation-diffusion, the summation invariance in the plain-image and shortcoming of a fixed key will be avoided in our algorithm. Furthermore, the experimental results and security analysis show that the proposed encryption algorithm can achieve confidentiality.


2015 ◽  
Author(s):  
Ching-Kuang Shene ◽  
Chaoli Wang ◽  
Jun Tao ◽  
Melissa Keranen ◽  
Jun Ma ◽  
...  

2014 ◽  
Vol 40 (1) ◽  
pp. 194-202 ◽  
Author(s):  
Rommel García ◽  
Ignacio Algredo-Badillo ◽  
Miguel Morales-Sandoval ◽  
Claudia Feregrino-Uribe ◽  
René Cumplido

2021 ◽  
pp. 1-8
Author(s):  
Jyoti Patil Devaji ◽  
Nalini C. Iyer ◽  
Rajeshwari Mattimani

Sensors ◽  
2020 ◽  
Vol 20 (12) ◽  
pp. 3458
Author(s):  
Lidia Ogiela ◽  
Marek R. Ogiela ◽  
Hoon Ko

This paper will present the authors’ own techniques of secret data management and protection, with particular attention paid to techniques securing data services. Among the solutions discussed, there will be information-sharing protocols dedicated to the tasks of secret (confidential) data sharing. Such solutions will be presented in an algorithmic form, aimed at solving the tasks of protecting and securing data against unauthorized acquisition. Data-sharing protocols will execute the tasks of securing a special type of information, i.e., data services. The area of data protection will be defined for various levels, within which will be executed the tasks of data management and protection. The authors’ solution concerning securing data with the use of cryptographic threshold techniques used to split the secret among a specified group of secret trustees, simultaneously enhanced by the application of linguistic methods of description of the shared secret, forms a new class of protocols, i.e., intelligent linguistic threshold schemes. The solutions presented in this paper referring to the service management and securing will be dedicated to various levels of data management. These levels could be differentiated both in the structure of a given entity and in its environment. There is a special example thereof, i.e., the cloud management processes. These will also be subject to the assessment of feasibility of application of the discussed protocols in these areas. Presented solutions will be based on the application of an innovative approach, in which we can use a special formal graph for the creation of a secret representation, which can then be divided and transmitted over a distributed network.


Sign in / Sign up

Export Citation Format

Share Document