DefinePK

DefinePK hosts the largest index of Pakistani journals, research articles, news headlines, and videos. It also offers chapter-level book search.

Providing confidentiality, data integrity and authentication of transmitted information


Article Information

Title: Providing confidentiality, data integrity and authentication of transmitted information

Authors: Saleh Suleman Saraireh

Journal: ARPN Journal of Engineering and Applied Sciences

HEC Recognition History
Category From To
Y 2023-07-01 2024-09-30
Y 2022-07-01 2023-06-30
Y 2021-07-01 2022-06-30
X 2020-07-01 2021-06-30

Publisher: Khyber Medical College, Peshawar

Country: Pakistan

Year: 2019

Volume: 14

Issue: 1

Language: English

Categories

Abstract

Transmission of secret information through non - secure communication channels is subjected to many security threats and attacks. The secret information could be government documents, exam questions, patient information, hospital information and laboratory medical reports. Therefore it is essential to use a strong and robust security technique to ensure the security of such information. This requires the implementation of strong technique to satisfy different security services. In this paper different security algorithms are combined together to ensure confidentiality, authentication and data integrity. The proposed approach involves the combination between symmetric key encryption algorithm, hashing algorithm and watermarking. So, before the transmission of secret information it should be encrypted using the advanced encryption standard (AES), hashed using secure hash algorithm 3 (SHA3) and then embedded over an image using discrete wavelet transform (DWT), discrete cosine transforms (DCT) and singular value decompositions (SVD) watermarking technique. The security performance of the proposed approach is examined through different security metrics, namely, peak signal - to - noise ratio (PSNR) and normalized correlation coefficient (NC); the obtained results reflect the robustness and the resistance of the proposed approach to different attacks.


Paper summary is not available for this article yet.

Loading PDF...

Loading Statistics...