基于滑动图像和图像摘要的数据安全新概念

Neha Singhal, Vibhakar Pathak
{"title":"基于滑动图像和图像摘要的数据安全新概念","authors":"Neha Singhal, Vibhakar Pathak","doi":"10.1080/09720529.2022.2091021","DOIUrl":null,"url":null,"abstract":"Abstract We are living in the tech world and information or data centers are growing day by day. Even the government departments are coming with the online portals and more rapid computerization, which enables them to get the data as well as to send the important data and report, online from anywhere in the world. With the ease, also comes some security issues, like how to keep the data protected from unauthorized access. For this purpose, we have proposed the security model in which we have enhanced the security in two phases, one is the authentication phase where the slider-based image partition concept is used and second phase is the message sharing module in which authentication key is used, which is generated using the Image and Message MD5 is also very strong. The SHA-512 hash of the image will be stored in the database which will act as IMAGE DIGEST for the verification purpose at the receiver end. When the receiver receives the image, the SHA-512 function will again operate over the received image, if both the image matches with HASH which is generated at the user end image HASH stored in database, then the image is considered valid at receiver end. Similarly, the message digest for the message can also be generated as stored in the database for the verification purpose. The generated authentication keys are tested with the previous approach using the various online and offline tools and results are better that the previous.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.2000,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Novel concept of data security using sliding image and image digest\",\"authors\":\"Neha Singhal, Vibhakar Pathak\",\"doi\":\"10.1080/09720529.2022.2091021\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract We are living in the tech world and information or data centers are growing day by day. Even the government departments are coming with the online portals and more rapid computerization, which enables them to get the data as well as to send the important data and report, online from anywhere in the world. With the ease, also comes some security issues, like how to keep the data protected from unauthorized access. For this purpose, we have proposed the security model in which we have enhanced the security in two phases, one is the authentication phase where the slider-based image partition concept is used and second phase is the message sharing module in which authentication key is used, which is generated using the Image and Message MD5 is also very strong. The SHA-512 hash of the image will be stored in the database which will act as IMAGE DIGEST for the verification purpose at the receiver end. When the receiver receives the image, the SHA-512 function will again operate over the received image, if both the image matches with HASH which is generated at the user end image HASH stored in database, then the image is considered valid at receiver end. Similarly, the message digest for the message can also be generated as stored in the database for the verification purpose. The generated authentication keys are tested with the previous approach using the various online and offline tools and results are better that the previous.\",\"PeriodicalId\":46563,\"journal\":{\"name\":\"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":1.2000,\"publicationDate\":\"2022-05-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/09720529.2022.2091021\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"MATHEMATICS, APPLIED\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/09720529.2022.2091021","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"MATHEMATICS, APPLIED","Score":null,"Total":0}
引用次数: 0

摘要

摘要我们生活在科技世界,信息或数据中心日益增长。即使是政府部门也推出了在线门户网站和更快速的计算机化,这使他们能够从世界任何地方在线获取数据以及发送重要数据和报告。随之而来的还有一些安全问题,比如如何保护数据免受未经授权的访问。为此,我们提出了安全模型,在该模型中,我们分两个阶段增强了安全性,一个是使用基于滑块的图像分割概念的身份验证阶段,另一个阶段是使用身份验证密钥的消息共享模块,该模块使用图像和消息生成,MD5也非常强大。图像的SHA-512散列将被存储在数据库中,该数据库将作为图像DIGEST用于接收器端的验证目的。当接收器接收到图像时,SHA-512功能将再次对接收到的图像进行操作,如果两个图像都与存储在数据库中的用户端图像HASH生成的HASH匹配,则该图像在接收器端被认为是有效的。类似地,消息的消息摘要也可以生成为存储在数据库中用于验证目的。生成的身份验证密钥使用以前的方法使用各种在线和离线工具进行测试,结果比以前的要好。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Novel concept of data security using sliding image and image digest
Abstract We are living in the tech world and information or data centers are growing day by day. Even the government departments are coming with the online portals and more rapid computerization, which enables them to get the data as well as to send the important data and report, online from anywhere in the world. With the ease, also comes some security issues, like how to keep the data protected from unauthorized access. For this purpose, we have proposed the security model in which we have enhanced the security in two phases, one is the authentication phase where the slider-based image partition concept is used and second phase is the message sharing module in which authentication key is used, which is generated using the Image and Message MD5 is also very strong. The SHA-512 hash of the image will be stored in the database which will act as IMAGE DIGEST for the verification purpose at the receiver end. When the receiver receives the image, the SHA-512 function will again operate over the received image, if both the image matches with HASH which is generated at the user end image HASH stored in database, then the image is considered valid at receiver end. Similarly, the message digest for the message can also be generated as stored in the database for the verification purpose. The generated authentication keys are tested with the previous approach using the various online and offline tools and results are better that the previous.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
3.10
自引率
21.40%
发文量
126
期刊最新文献
A4-graph for the twisted group 3D4 (3) Modern Metrics (MM): Software size estimation using function points for artificial intelligence and data analytics applications and finding the effort modifiers of the functional units using indian software industry Optimized deep learning methodology for intruder behavior detection and classification in cloud I-prime fuzzy submodules Information security based on sub-system keys generator by utilizing polynomials method and logic gate
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1