
A Novel Steganographic Algorithm and Hashing to Improve Authentication using Mobile Phones
Author(s) -
G. Sumalatha,
P. Madhuravani
Publication year - 2013
Publication title -
international journal of computer science and informatics
Language(s) - English
Resource type - Journals
ISSN - 2231-5292
DOI - 10.47893/ijcsi.2013.1115
Subject(s) - computer science , steganography , hash function , security token , authentication (law) , computer security , password , mobile phone , computer network , hash chain , image (mathematics) , artificial intelligence , telecommunications
Security has become major issue in all online services. Strong authentication is provided conveniently using mobile phone as security token. While sending security token to user mobile via GSM network, it is vulnerable to several attacks. We can avoid them using Steganography which enforces the security of hashing algorithms. We can share tokens securely with steganography and authentication to prevent participants from the intentional provision of a false stego-image. However, an illegitimate person can easily manipulate the stego-image for successful authentication but cannot recover the secret image. We propose a new authentication method called Σ-hash, which combines an efficient steganographic algorithm and hashing. This paper tells how ΣHash can be used for securing OTP(One Time Password) from tampering attacks and other applications.