2019
DOI: 10.26735/16587790.2019.001
|View full text |Cite
|
Sign up to set email alerts
|

Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination

Abstract: In this paper, we propose a modification for security authentication systems in mobile devices. Our enhancement is designed to secure information transformation over the internet by combining hash, cryptography and steganography mechanisms. We used the combination for authentication, to secure mobile computing to transfer data in a trusted manner. The proposed work will use hash function to store the secret password to provide increased security. The hashed password is encrypted using AES encryption then hidde… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3
1

Relationship

2
8

Authors

Journals

citations
Cited by 29 publications
(12 citation statements)
references
References 11 publications
(31 reference statements)
0
11
0
Order By: Relevance
“…In fact, this function is used to convert the words that are generated by the N-Gram method into integer numbers, which speed up the comparison process and the alignment. Although the H-NGH algorithm enhances the time performance of the NGH algorithm, the accuracy is decreased, which is following the Hashing philosophy [32], but for pure security, similar to Hashing text authentication [33] and mobile trust verification [34].…”
Section: Dynamic-programming-based Methodsmentioning
confidence: 99%
“…In fact, this function is used to convert the words that are generated by the N-Gram method into integer numbers, which speed up the comparison process and the alignment. Although the H-NGH algorithm enhances the time performance of the NGH algorithm, the accuracy is decreased, which is following the Hashing philosophy [32], but for pure security, similar to Hashing text authentication [33] and mobile trust verification [34].…”
Section: Dynamic-programming-based Methodsmentioning
confidence: 99%
“…Figure 7, shows our proposed methodology graphical CAPTCHA to illustrate this usability feature. This contradiction between distortion and robotic guessing made our proposed methodology have less distorted CAPTCHA images, but protected combining cryptography and hashing (Alotaibi et al, 2019) different than HSV colour space image security (Hassan & Gutub, 2021). Table 4 shows our list of images with user selection speed for proper CAPTCHA images.…”
Section: Ms Faster Than Others 40 Char S Hashmentioning
confidence: 99%
“…While the technique is complex and has less payload. In 2019, Alotaibi et al [ 85 ] have proposed a secure framework for safe data transmission in mobile devices using hash, cryptography, and steganography. The proposed method has used a hash function for storing the secret password, cryptography with AES method for encrypting password, and LSB method for hiding encrypted password into an image.…”
Section: Literature Surveymentioning
confidence: 99%