Data Integrity Verification in Images Through SHA-Based Security

Main Article Content

Sri Harsha
Kale Aswini
Gamidi Sahith
Gundemeda Venkata Naga Abhiram
Duggirala Bharath Kumar

Abstract

In the current digital landscape, the need for secure data transmission has become increasingly vital due to the growing risk of data breaches and cyber threats. This research proposes a secure and efficient method of embedding and transmitting sensitive information using digital images as a medium. The framework integrates Elliptic Curve Cryptography (ECC) for lightweight and strong encryption, SHA-3 (Secure Hash Algorithm 3) for ensuring data integrity, and Huffman Compression to reduce data redundancy and optimize bandwidth usage. The sender first encrypts the secret message using ECC, then generates a secure hash using SHA-3 for tamper detection. The encrypted message is embedded into a cover image, which is subsequently compressed using Huffman coding to enhance transmission speed and storage efficiency.On the receiver’s side, the process is reversed: the compressed image is decompressed, the embedded data is extracted and verified using the SHA-3 hash, and finally decrypted using ECC to retrieve the original message. The system ensures that the message is both protected from unauthorized access and validated against any form of alteration. A custom simulation tool was developed to implement and test the complete process, demonstrating high reliability, compactness, and resistance to common attacks. The results validate that the proposed system effectively maintains confidentiality, integrity, and efficiency, making it suitable for secure multimedia communications in real-time environments.

Article Details

How to Cite
Harsha , S., Aswini , K., Sahith , G., Abhiram , G. V. N., & Kumar , D. B. (2025). Data Integrity Verification in Images Through SHA-Based Security. International Journal on Advanced Computer Engineering and Communication Technology, 14(1), 75–84. Retrieved from https://journals.mriindia.com/index.php/ijacect/article/view/174
Section
Articles

Similar Articles

1 2 3 4 5 6 7 8 9 > >> 

You may also start an advanced similarity search for this article.