Download now Free registration required
Security has become major issue in all online services. Strong authentication is provided conveniently using mobile phone as security token. While sending security token to user mobile via GSM network, it is vulnerable to several attacks. The authors can avoid them using Steganography which enforces the security of hashing algorithms. They can share tokens securely with steganography and authentication to prevent participants from the intentional provision of a false stego-image. However, an illegitimate person can easily manipulate the stego-image for successful authentication but cannot recover the secret image.
- Format: PDF
- Size: 142.29 KB