Mobility Investigate

A Novel Steganographic Algorithm and Hashing to Improve Authentication Using Mobile Phones

Download now Free registration required

Executive Summary

Security has become major issue in all online services. Strong authentication is provided conveniently using mobile phone as security token. While sending security token to user mobile via GSM network, it is vulnerable to several attacks. The authors can avoid them using Steganography which enforces the security of hashing algorithms. They can share tokens securely with steganography and authentication to prevent participants from the intentional provision of a false stego-image. However, an illegitimate person can easily manipulate the stego-image for successful authentication but cannot recover the secret image.

  • Format: PDF
  • Size: 142.29 KB