•  
  •  
 

International Journal of Computer Science and Informatics

Abstract

Security has become major issue in all online services. Strong authentication is provided conveniently using mobile phone as security token. While sending security token to user mobile via GSM network, it is vulnerable to several attacks. We can avoid them using Steganography which enforces the security of hashing algorithms. We can share tokens securely with steganography and authentication to prevent participants from the intentional provision of a false stego-image. However, an illegitimate person can easily manipulate the stego-image for successful authentication but cannot recover the secret image. We propose a new authentication method called Σ-hash, which combines an efficient steganographic algorithm and hashing. This paper tells how ΣHash can be used for securing OTP(One Time Password) from tampering attacks and other applications.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.