Data Integrity Verification in Images Through SHA-Based Security
Main Article Content
Abstract
In the current digital landscape, the need for secure data transmission has become increasingly vital due to the growing risk of data breaches and cyber threats. This research proposes a secure and efficient method of embedding and transmitting sensitive information using digital images as a medium. The framework integrates Elliptic Curve Cryptography (ECC) for lightweight and strong encryption, SHA-3 (Secure Hash Algorithm 3) for ensuring data integrity, and Huffman Compression to reduce data redundancy and optimize bandwidth usage. The sender first encrypts the secret message using ECC, then generates a secure hash using SHA-3 for tamper detection. The encrypted message is embedded into a cover image, which is subsequently compressed using Huffman coding to enhance transmission speed and storage efficiency.On the receiver’s side, the process is reversed: the compressed image is decompressed, the embedded data is extracted and verified using the SHA-3 hash, and finally decrypted using ECC to retrieve the original message. The system ensures that the message is both protected from unauthorized access and validated against any form of alteration. A custom simulation tool was developed to implement and test the complete process, demonstrating high reliability, compactness, and resistance to common attacks. The results validate that the proposed system effectively maintains confidentiality, integrity, and efficiency, making it suitable for secure multimedia communications in real-time environments.