{"title":"Securing information content using new encryption method and Steganography","authors":"A. Cheddad, J. Condell, K. Curran, P. Kevitt","doi":"10.1109/ICDIM.2008.4746742","DOIUrl":null,"url":null,"abstract":"This paper proposes a novel encryption method with password protection based on an extended version of SHA-1 (secure hash algorithm) that is able to encrypt 2D bulk data such as images. There has been a modest research in the literature on encryption of digital images though. The algorithm benefits also from the conjugate symmetry exhibited in what is termed, herein, an irreversible fast Fourier transform (IrFFT). The proposed encryption method is a preprocessing phase which aims at increasing the robustness of image steganography against hackers. This scenario lays down a multi layer of security which forms a strong shield, against eavesdroppers, that is impossible to break. Both Shannon law requirements are met and results show promising results.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"30","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Third International Conference on Digital Information Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDIM.2008.4746742","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 30
Abstract
This paper proposes a novel encryption method with password protection based on an extended version of SHA-1 (secure hash algorithm) that is able to encrypt 2D bulk data such as images. There has been a modest research in the literature on encryption of digital images though. The algorithm benefits also from the conjugate symmetry exhibited in what is termed, herein, an irreversible fast Fourier transform (IrFFT). The proposed encryption method is a preprocessing phase which aims at increasing the robustness of image steganography against hackers. This scenario lays down a multi layer of security which forms a strong shield, against eavesdroppers, that is impossible to break. Both Shannon law requirements are met and results show promising results.