scholarly journals Image Steganography embedded with Advance Encryption Standard (AES) securing with SHA-256

The proposed paper, works upon the idea of securing the classified information. This is achieved by using steganography which is an approach to hide classified information into some other file while maintaining its visual aids and secondly is cryptography which works upon textual data and transform it in a way that no one can comprehend it. The proposed method secures the weaker section which is the key in Advance Encryption Standard using hashing technique. The proposed work enhances the level of concealment of information from unauthorized access and for covert information exchange by encrypting the data and hiding it into a multimedia file known as image. The Secure Hash Algorithm 256 generates a hash key of 256 bits which is an unbreakable hashing technique after that the key is used in the process of encrypting the text with Advance Encryption Standard 256 which is an unbreakable encryption technique till this time and a cipher text is obtained. The cipher text is embedded into a target image using Least Significant Bit method which make changes in image that cannot be understand by naked eyes. The change in byte is 0.000002%. It ensures the visual quality of an image remains intact. The distortion or change in the image remains intermittent to human eyes. The major issue concerned for the government and security agencies such as were to exchange highly classified information in a secure and undetectable manner and abide the notion of hacker to comprehend any such information.

Author(s):  
Taufan Abdurrachman ◽  
Bernard Renaldy Suteja

Currently, Indonesian government is changing the government system into an Sistem Pemerintahan Berbasis Elektronik (SPBE) or often heard as e-government. With this change in the government system, it has an impact on various sector of life. One of many sectors is construction service sector. LPJK as a non-structural institution under Ministry of Public Works and Public Housing issued a letter to the construction services association regarding the development of integrated application with SIKI LPJK. LPJK and OSS institutions has implemented digital signatures on business entity licensing document. Construction service associations has responded to develop of these regulations by creating an association information system application that implements digital signatures. This research was conducted to apply an digital signatures to the validation of the Membership Card using the secure hash algorithm (SHA) and advanced encryption standard (AES) methods generated through the association information system. This application generates an digital signatures which is implemented with QR Code. The existence of this application is expected to be a form of support for the government which is making changes to the government system.


Author(s):  
R. Kayalvizhi ◽  
R. Harihara Subramanian ◽  
R. Girish Santhosh ◽  
J. Gurubaran ◽  
V. Vaidehi

2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Guodong Ye ◽  
Kaixin Jiao ◽  
Chen Pan ◽  
Xiaoling Huang

In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of the drawbacks, namely, fixed key and low sensitivity, of some current algorithms, this work tries to solve these two problems and includes two contributions: (1) removal of the phenomenon of summation invariance in a plain-image, for which SHA-3 is proposed to calculate the hash value for the plain-image, with the results being employed to influence the initial keys for chaotic map; (2) resolution of the problem of fixed key by using an ECG signal, that can be different for different subjects or different for same subject at different times. The Wolf algorithm is employed to produce all the control parameters and initial keys in the proposed encryption method. It is believed that combining with the classical architecture of permutation-diffusion, the summation invariance in the plain-image and shortcoming of a fixed key will be avoided in our algorithm. Furthermore, the experimental results and security analysis show that the proposed encryption algorithm can achieve confidentiality.


2015 ◽  
Author(s):  
Ching-Kuang Shene ◽  
Chaoli Wang ◽  
Jun Tao ◽  
Melissa Keranen ◽  
Jun Ma ◽  
...  

2014 ◽  
Vol 40 (1) ◽  
pp. 194-202 ◽  
Author(s):  
Rommel García ◽  
Ignacio Algredo-Badillo ◽  
Miguel Morales-Sandoval ◽  
Claudia Feregrino-Uribe ◽  
René Cumplido

2013 ◽  
Vol 37 (2) ◽  
pp. 104-104
Author(s):  
Dirk Fox

2021 ◽  
Author(s):  
Shuhuan Zhou ◽  
Yi Wang

BACKGROUND During the COVID-19 outbreak, social media served as the main platform for information exchange, through which the Chinese government, media and public would spread information. At the same time, a variety of emotions interweave, and the public emotions would also be affected by the government and media. OBJECTIVE This study aims to investigate the types, trends and relationships of emotional diffusion in Chinese social media among the public, the government and the media under the pandemic of COVID-19 (December 30,2019, to July 1,2020) . METHODS In this paper, Python 3.7.0 and its data crawling framework Scrapy 1.5.1 are used to write a web crawler program to search for super topics related to COVID-19 on Sina Weibo platform of different keywords . Then, we used emotional lexicon to analyze the types and trends of the public, government and media emotions on social media. Finally cross-lagged regression was applied to build the relationships of different subjects’ emotions. RESULTS The highlights of our study are threefold: (1) The public, the government and the media mainly diffuse positive emotions during the COVID-19 pandemic in China; (2) Emotional diffusion shows a certain change over time, and negative emotions are obvious in the initial phase of the pandemic, with the development of the pandemic, positive emotions surpass negative emotions and remain stable. (3)The impact among the three main emotions with the period as the time point is weak, while the impact of emotion with the day as the time point is relatively obvious. The emotions of the public and the government impact each other, and the media emotions can guide the public emotions. CONCLUSIONS This is the first study of comparing pubic, government and media emotions on the social media during COVID-19 pandemic in China. The pubic, the government and the media mainly diffuse positive emotions during the pandemic. And the government and the media have better effect on short-term emotional guidance. Therefore, when the pandemic suddenly occurs, the government and the media should intervene in time to solve problems and conflicts and diffuse positive and neutral emotions. In this regard, the government and the media can play important roles through social media in the major outbreaks. At the theoretical level, this paper takes China's epidemic environment and social media as the background to provide one of the explanatory perspectives for the spread of emotions on social media. At the some time, because of this special background, it can provide comparison and reference for the research on internet emotions in other countries.


Sign in / Sign up

Export Citation Format

Share Document