Stegano-image as a digital signature to improve security authentication system in mobile computing

Authentication of any system means providing a security to that system. Securing confidential information on the mobile platforms has been becoming a typical issue for the specialists. One of the authentication techniques is a textual password based. This type of textual password commonly follows an...

Full description

Bibliographic Details
Main Authors: Mantoro, Teddy, Permadi, Didit Dwi, Abubakar, Adamu
Format: Proceeding Paper
Language:English
English
Published: IEEE 2016
Subjects:
Online Access:http://irep.iium.edu.my/56726/
http://irep.iium.edu.my/56726/7/iEEE_Stegano_complete.pdf
http://irep.iium.edu.my/56726/13/56726_Stegano-image%20as%20a%20digital%20signature%20to%20improve%20security%20authentication%20system%20in%20mobile%20computing_Scopus.pdf
_version_ 1848784797639376896
author Mantoro, Teddy
Permadi, Didit Dwi
Abubakar, Adamu
author_facet Mantoro, Teddy
Permadi, Didit Dwi
Abubakar, Adamu
author_sort Mantoro, Teddy
building IIUM Repository
collection Online Access
description Authentication of any system means providing a security to that system. Securing confidential information on the mobile platforms has been becoming a typical issue for the specialists. One of the authentication techniques is a textual password based. This type of textual password commonly follows an encryption algorithm to provide security. This techniques has some limitations and drawbacks. When users choose meaningful words from dictionaries, by using brute force attacks, it makes textual passwords vulnerable to dictionary and easy to break. To overcome the drawbacks, a new authenticate technique is proposed in this paper in order to provide for more security authentication system. In this paper the textual password will be hidden in an image using steganography technique. All data and critical information like passwords are stored in encrypted manner used image as carrier so it's difficult for brute force attack to crack it. Steganography is used to hide secret information onside some carrier. The most basic and important image steganography technique is Least Significant Bit (LSB) embedding technique. In this technique, data can be hidden in the least significant bits of the cover image and the human eye would be unable to notice the hidden image in the cover file. LSB steganography is combined with AES cryptography to hide textual password, in order to provide high level security on authentication system that run under Android
first_indexed 2025-11-14T16:42:58Z
format Proceeding Paper
id iium-56726
institution International Islamic University Malaysia
institution_category Local University
language English
English
last_indexed 2025-11-14T16:42:58Z
publishDate 2016
publisher IEEE
recordtype eprints
repository_type Digital Repository
spelling iium-567262017-10-22T10:32:39Z http://irep.iium.edu.my/56726/ Stegano-image as a digital signature to improve security authentication system in mobile computing Mantoro, Teddy Permadi, Didit Dwi Abubakar, Adamu QA76 Computer software Authentication of any system means providing a security to that system. Securing confidential information on the mobile platforms has been becoming a typical issue for the specialists. One of the authentication techniques is a textual password based. This type of textual password commonly follows an encryption algorithm to provide security. This techniques has some limitations and drawbacks. When users choose meaningful words from dictionaries, by using brute force attacks, it makes textual passwords vulnerable to dictionary and easy to break. To overcome the drawbacks, a new authenticate technique is proposed in this paper in order to provide for more security authentication system. In this paper the textual password will be hidden in an image using steganography technique. All data and critical information like passwords are stored in encrypted manner used image as carrier so it's difficult for brute force attack to crack it. Steganography is used to hide secret information onside some carrier. The most basic and important image steganography technique is Least Significant Bit (LSB) embedding technique. In this technique, data can be hidden in the least significant bits of the cover image and the human eye would be unable to notice the hidden image in the cover file. LSB steganography is combined with AES cryptography to hide textual password, in order to provide high level security on authentication system that run under Android IEEE 2016-10 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/56726/7/iEEE_Stegano_complete.pdf application/pdf en http://irep.iium.edu.my/56726/13/56726_Stegano-image%20as%20a%20digital%20signature%20to%20improve%20security%20authentication%20system%20in%20mobile%20computing_Scopus.pdf Mantoro, Teddy and Permadi, Didit Dwi and Abubakar, Adamu (2016) Stegano-image as a digital signature to improve security authentication system in mobile computing. In: 2016 International Conference on Informatics and Computing (ICIC), 28-29 Oct. 2016, Hotel Lombok Raya Jalan Panca Usaha No. 11 Lombok Nusa Tenggara Barat Mataram, Indonesia. http://ieeexplore.ieee.org/document/7905708/ 10.1109/IAC.2016.7905708
spellingShingle QA76 Computer software
Mantoro, Teddy
Permadi, Didit Dwi
Abubakar, Adamu
Stegano-image as a digital signature to improve security authentication system in mobile computing
title Stegano-image as a digital signature to improve security authentication system in mobile computing
title_full Stegano-image as a digital signature to improve security authentication system in mobile computing
title_fullStr Stegano-image as a digital signature to improve security authentication system in mobile computing
title_full_unstemmed Stegano-image as a digital signature to improve security authentication system in mobile computing
title_short Stegano-image as a digital signature to improve security authentication system in mobile computing
title_sort stegano-image as a digital signature to improve security authentication system in mobile computing
topic QA76 Computer software
url http://irep.iium.edu.my/56726/
http://irep.iium.edu.my/56726/
http://irep.iium.edu.my/56726/
http://irep.iium.edu.my/56726/7/iEEE_Stegano_complete.pdf
http://irep.iium.edu.my/56726/13/56726_Stegano-image%20as%20a%20digital%20signature%20to%20improve%20security%20authentication%20system%20in%20mobile%20computing_Scopus.pdf