Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Validating Data Integrity in Steganographed Images using Embedded Checksum Technique

Print
PDF
IJCA Proceedings on National Conference on Research Issues in Image Analysis and Mining Intelligence
© 2015 by IJCA Journal
NCRIIAMI 2015 - Number 1
Year of Publication: 2015
Authors:
Jagan Raj J
Prasath S

Jagan Raj J and Prasath S. Article: Validating Data Integrity in Steganographed Images using Embedded Checksum Technique. IJCA Proceedings on National Conference on Research Issues in Image Analysis and Mining Intelligence NCRIIAMI 2015(1):5-8, June 2015. Full text available. BibTeX

@article{key:article,
	author = {Jagan Raj J and Prasath S},
	title = {Article: Validating Data Integrity in Steganographed Images using Embedded Checksum Technique},
	journal = {IJCA Proceedings on National Conference on Research Issues in Image Analysis and Mining Intelligence},
	year = {2015},
	volume = {NCRIIAMI 2015},
	number = {1},
	pages = {5-8},
	month = {June},
	note = {Full text available}
}

Abstract

In this paper, discuss on validating the data integrity of an image that carries secret information across the network. Validating the data integrity has been always a difficult task on steganographed image files. To discuss a way through which data integrity is verified for possible image tampering by intruders using md5 checksum in self embedded technique.

References

  • Compression Algorithms for Real Programmers, Wayner Peter. Publisher: Morgan Kaufmann, 11 Oct 1999 ISBN-10: 0127887741
  • Boritz, J. "IS Practitioners' Views on Core Concepts of Information Integrity". International Journal of Accounting Information Systems. Elsevier. Retrieved 12 August 2011.
  • From Wikipedia, "Hash function," Jan 2014, URL: http://en. wikipedia. org/wiki/Hash_function
  • Behrouz A. Forouzan,"Data communication and networking," Tata McGraw-Hill Publication, 2nd ed. , 2003, pp. 799-800.
  • William Stallings," Cryptographic and network security," Pearson Prentice Hall Publication, 4th ed. , 2006, pp. 320-375
  • Holub V, Fridrich J: Digital image steganography using universal distortion. In 1st ACM Information Hiding and Multimedia Security Workshop. Montpellier; 17–19 June 2013.
  • W. Bender, "Techniques for Data Hiding," IBM Systems Journal, Vol. 35, no. 7, Pgs 313-336, 1996
  • Wang Qian, et . al,"Steganography and Steganalysis based on digital image," IEEE 4th International Conference on Image and Signal Processing, Shanghai, 15-17 Oct. 2011, pp. 252-255.
  • Adity Sharma, Anoo Agarwal and Vinay Kumar, " A simple technique for steganography", arXiv:1307. 8385v1 [cs. MM] 31 Jul-2013.
  • Vojt?ch Holub, Jessica Fridrich, Tomáš Denemark "Universal distortion function for steganography in an arbitrary domain", EURASIP Journal on Information Security, January 2014.
  • Denemark T, Fridrich J, Holub V: Proceedings SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics 2014. Edited by: Alattar A, Memon ND, Heitzenrater CD. San Francisco; 2–6 February 2014