CFP last date
20 January 2025
Reseach Article

Validating Data Integrity in Steganographed Images using Embedded Checksum Technique

Published on June 2015 by Jagan Raj J, Prasath S
National Conference on Research Issues in Image Analysis and Mining Intelligence
Foundation of Computer Science USA
NCRIIAMI2015 - Number 1
June 2015
Authors: Jagan Raj J, Prasath S
cbc6e326-d025-4497-9bd8-69b58393b400

Jagan Raj J, Prasath S . Validating Data Integrity in Steganographed Images using Embedded Checksum Technique. National Conference on Research Issues in Image Analysis and Mining Intelligence. NCRIIAMI2015, 1 (June 2015), 5-8.

@article{
author = { Jagan Raj J, Prasath S },
title = { Validating Data Integrity in Steganographed Images using Embedded Checksum Technique },
journal = { National Conference on Research Issues in Image Analysis and Mining Intelligence },
issue_date = { June 2015 },
volume = { NCRIIAMI2015 },
number = { 1 },
month = { June },
year = { 2015 },
issn = 0975-8887,
pages = { 5-8 },
numpages = 4,
url = { /proceedings/ncriiami2015/number1/21016-4003/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Research Issues in Image Analysis and Mining Intelligence
%A Jagan Raj J
%A Prasath S
%T Validating Data Integrity in Steganographed Images using Embedded Checksum Technique
%J National Conference on Research Issues in Image Analysis and Mining Intelligence
%@ 0975-8887
%V NCRIIAMI2015
%N 1
%P 5-8
%D 2015
%I International Journal of Computer Applications
Abstract

In this paper, discuss on validating the data integrity of an image that carries secret information across the network. Validating the data integrity has been always a difficult task on steganographed image files. To discuss a way through which data integrity is verified for possible image tampering by intruders using md5 checksum in self embedded technique.

References
  1. Compression Algorithms for Real Programmers, Wayner Peter. Publisher: Morgan Kaufmann, 11 Oct 1999 ISBN-10: 0127887741
  2. Boritz, J. "IS Practitioners' Views on Core Concepts of Information Integrity". International Journal of Accounting Information Systems. Elsevier. Retrieved 12 August 2011.
  3. From Wikipedia, "Hash function," Jan 2014, URL: http://en. wikipedia. org/wiki/Hash_function
  4. Behrouz A. Forouzan,"Data communication and networking," Tata McGraw-Hill Publication, 2nd ed. , 2003, pp. 799-800.
  5. William Stallings," Cryptographic and network security," Pearson Prentice Hall Publication, 4th ed. , 2006, pp. 320-375
  6. Holub V, Fridrich J: Digital image steganography using universal distortion. In 1st ACM Information Hiding and Multimedia Security Workshop. Montpellier; 17–19 June 2013.
  7. W. Bender, "Techniques for Data Hiding," IBM Systems Journal, Vol. 35, no. 7, Pgs 313-336, 1996
  8. Wang Qian, et . al,"Steganography and Steganalysis based on digital image," IEEE 4th International Conference on Image and Signal Processing, Shanghai, 15-17 Oct. 2011, pp. 252-255.
  9. Adity Sharma, Anoo Agarwal and Vinay Kumar, " A simple technique for steganography", arXiv:1307. 8385v1 [cs. MM] 31 Jul-2013.
  10. Vojt?ch Holub, Jessica Fridrich, Tomáš Denemark "Universal distortion function for steganography in an arbitrary domain", EURASIP Journal on Information Security, January 2014.
  11. Denemark T, Fridrich J, Holub V: Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014. Edited by: Alattar A, Memon ND, Heitzenrater CD. San Francisco; 2–6 February 2014
Index Terms

Computer Science
Information Sciences

Keywords

Image Steganography Md5checksum Data Integrity Data Tampering Message Digest Data Security