Efficient Authentication Protocol Using Cryptographic Hash Function & LSB Dynamic Hop Image Steganographic Technique for Secure Communication
Efficient Authentication Protocol Using Cryptographic Hash Function & LSB Dynamic Hop Image Steganographic Technique for Secure Communication
- Author(s): B. Madhuravani and D.S.R. Murthy
- DOI: 10.1049/cp.2016.1469
For access to this article, please select a purchase option:
Buy conference paper PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
International Conference on Recent Trends in Engineering, Science & Technology - (ICRTEST 2016) — Recommend this title to your library
Thank you
Your recommendation has been sent to your librarian.
- Author(s): B. Madhuravani and D.S.R. Murthy Source: International Conference on Recent Trends in Engineering, Science & Technology - (ICRTEST 2016), 2016 page ()
- Conference: International Conference on Recent Trends in Engineering, Science & Technology - (ICRTEST 2016)
- « Previous article
- Table of contents
- Next article »
- DOI: 10.1049/cp.2016.1469
- ISBN: 978-1-78561-785-0
- Location: Hyderabad, India
- Conference date: 25-27 Oct. 2016
- Format: PDF
A novel new verification convention utilizing a cryptographic hash function and a Steganography using a hop variable is displayed in this paper. This convention chooses a cryptographic hash work progressively and creates message digest. As opposed to LSB Steganography, we utilize a hop variable LSB steganography to implant private information into a stego object. This convention sets up a safe correspondence channel between two gatherings and trades information safely over the web.
Inspec keywords: image coding; telecommunication security; steganography; cryptography; cryptographic protocols; message authentication
Subjects: Computer communications; Cryptography; Computer vision and image processing techniques; Multimedia communications; Data security; Multimedia
Related content
content/conferences/10.1049/cp.2016.1469
pub_keyword,iet_inspecKeyword,pub_concept
6
6