Achieving Data Integrity and Confidentiality Using Image Steganography and Hashing Techniques
- Resource Type
- Conference
- Authors
- Hambouz, Ahmed; Shaheen, Yousef; Manna, Abdelrahman; Al-Fayoumi, Mustafa; Tedmori, Sara
- Source
- 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS) Trends in Computing Sciences (ICTCS), 2019 2nd International Conference on new. :1-6 Oct, 2019
- Subject
- Computing and Processing
Encoding
Encryption
Data privacy
Decoding
Image quality
Robustness
Steganography
Data Confidentiality
Data Integrity
PSNR
SHA 256
Data Tampering
- Language
Most existing steganography algorithms keen on achieving data confidentiality only by embedding the data into a cover-media. This research paper introduced a new steganography technique that achieves both data confidentiality and integrity. Data confidentiality is achieved by embedding the data bits in a secret manner into stego-image. Integrity is achieved using SHA 256 hashing algorithm to hash the decoding and encoding variables. The proposed model performed a high PSNR values for using a dataset of different image sizes with an average PSNR of 82.933%.