CFP last date
20 December 2024
Reseach Article

A Novel Approach for Improving Security by Digital Signature and Image Steganography

by Sarika Sharma, V. Kapoor
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 171 - Number 8
Year of Publication: 2017
Authors: Sarika Sharma, V. Kapoor
10.5120/ijca2017915145

Sarika Sharma, V. Kapoor . A Novel Approach for Improving Security by Digital Signature and Image Steganography. International Journal of Computer Applications. 171, 8 ( Aug 2017), 7-11. DOI=10.5120/ijca2017915145

@article{ 10.5120/ijca2017915145,
author = { Sarika Sharma, V. Kapoor },
title = { A Novel Approach for Improving Security by Digital Signature and Image Steganography },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2017 },
volume = { 171 },
number = { 8 },
month = { Aug },
year = { 2017 },
issn = { 0975-8887 },
pages = { 7-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume171/number8/28199-2017915145/ },
doi = { 10.5120/ijca2017915145 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:18:52.605774+05:30
%A Sarika Sharma
%A V. Kapoor
%T A Novel Approach for Improving Security by Digital Signature and Image Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 171
%N 8
%P 7-11
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information security is becoming more and more vital with the progress in the exchange of data. Protected communication in the network is a key necessity. Propose a novel technique to encrypt the image and embed the digital signature into the image. A digital signature is a procedure used to certify the authenticity and integrity of a message, software and digital documents. It is a also worn to give testimony of non-repudiation of communications. Steganography is an encryption technique that can be used along with cryptography as more-protected method rising to protect data. Images are the most admired cover objects used for steganography. In the province of digital images lots of different image file formats are present. Java technology proposed to authenticate the performance of the proposed model in circumstances of message length, key length, cipher text length and computational time for encryption and decryption.

References
  1. Atul Kahate, Cryptography and Network Security, Tata McGraw-Hill Publication Company Limited.
  2. Amrita Jain and Vivek Kapoor, “Policy for Secure Communication using Hybrid Encryption Algorithm”, International Journal of Computer Application (0975 - 8887) Volume 125 – No. 3, September 2015
  3. Jorge L, Hemandez–Ardieta, Ana I. Gonzalez- Tablas, Jose M. de Fuentes and Benjamin Ramos, “A taxonomy and survey of attacks on digital signatures”, Computer & Security, Volume 34, May 2013
  4. Mansi S. Subhedar and Vijay H. Mankar, “Current Status and Key Issues in image steganography: A survey”, Computer Science Review, Volumes 13 – 14, November 2014
  5. Ching–Nung Yang, Tse–Shih Chen, Kun Hsuan Yu and Chung–Chun Wang, “Improvements of image sharing with steganography and authentication”, Journal of Systems and Software, Volume 80, July 2007.
  6. Ching-Chiuan Lin, “An information hiding scheme with minimal image distortion”, Computer Standards & Interfaces, Volume 33, September 2011
  7. Pairat Thorncharoensri, Willy Susilo and Yi Mu, “Policy-controlled signatures and their applications”, Computer Standards & Interfaces, August 2016.
  8. Xiao-yun JIA, Shou-shan LUO, Chao-wei YUAN, "A New Signature Scheme with Shared Verification", The Journal of China Universities of Posts and Telecommunications, Volume 13, June 2006.
  9. Je Hong Park, Seongtaek Chee, “A note on digital signature scheme using a self-pairing map”, Applied Mathematics and Computation, Volume 169, October 2005.
  10. J. Zhou, K.Y. Lam, “Securing digital signature for non-repudiation”, Computer Communications, Volume 22, May 1999.
  11. Silman J., “Steganography and Steganalysis: An Overview”, SANS Institute, 2001
  12. Lee Y.K. and Chen L. H., “High capacity image steganographic model”, IEEE Proceedings of Visual Image Signal Processing, Volume 147, 2000.
  13. Menezes, A., van Oorschot, P., and Vanstone, S. 1996. Handbook of Applied Cryptography
  14. David Pointcheval and Jacques Stern, Security proofs for signature schemes, EUROCRYPT ’96, Zaragoza, Spain, 1996.
  15. Brain LaMacchia, Kristin lauter and Anton Mityagin, “Strong security of Authentication key Exchange”, 2013
  16. Petitcolas, F.A.P., Anderson, R.J. & Kuhn and MG., “Information Hiding – A survey”, Proceedings of the IEEE, 87:07, July1999
  17. Priyanka B. Kutade and Parul S. Arora Bhalotra, “A Survey of Various Approaches of Image Steganography”, International Journal of Computer Application (0975 - 8887) Volume 109 – No. 3, January 2015.
  18. Manish Trehan and Sumit Mittu, “Steganography and Cryptography Approaches Combined using Medical Digital Images”, International Journal of Engineering Research & Technology (IJERT), Volume 4, June 2015
  19. Richard Walton, “Cryptography and trust”, Information Security Technical Report, Volume 11, 2006.
  20. Dennis K. Branstad, Miles E. Smid, “Integrity and security standards based on cryptography”, Computers & Security, Volume 1, November 1982.
  21. Ren-Chiung Wang, Wen-Shenq Jaung, Chin-Laung Lie, “Robust authentication and key agreement scheme preserving the privacy of secret key”, Computer Communications, Volume 34, March 2011
  22. Chris Mitchell, “Authentication using cryptography”, Information Security Technical Report, Volume 2, 1997.
  23. A. Srivastava, “Electronic signatures and security issues: An empirical study”, Computer Law & Security Review, Volume 25, June 2002
  24. Taekyoung Kwon, “Digital signature algorithm for securing digital identities”, Information Processing Letters, Volume 82, June 2002
  25. Jianhong Zhang and Jane Mao, “An effective RSA-based certificateless signature scheme”, Journal of Systems and Software, Volume 85, March 2012.
  26. Neil F. Johnson and Sushil Jajodia, “Exploring Steganography: Seeing and Unseen”, IEEE Computer, Volume 31, 1998.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Security Features Image Encryption Decryption