Design and Implementation Digital Invitation System Based on Secure Hash Algorithm 3
DOI:
https://doi.org/10.3991/ijoe.v19i05.37583Keywords:
\Invitation System, Hash function, SHA-512 algorithm, Database, stego-systems.Abstract
Digital invitation system become one of the important systems due to the pandemic consequences specially in E-learning domains. The digital invitation needed to be secure enough for several reasons specially in the user demands. In this paper designed and implemented a digital invitation system based on secure hash algorithm which achieving multilevel of security. The first security level, that is the hash code generated for the digital invitation link used in the encryption process not only for the invitation date but also for the invitation time. on the other hand, the second security level achieved through out using the hash code as map for the hiding mechanism. The generated hash will be used for the data integrity as well. The proposed system evaluating the final stego-image as digital invitation using PSNR metric and the maximum value reach 64.28 while the minimum value reach 58.21.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Ismael AbdulSattar Jabbar, Hassan Kassim Albahadilyr, Alaa A. Jabbar Altaay
This work is licensed under a Creative Commons Attribution 4.0 International License.
The submitting author warrants that the submission is original and that she/he is the author of the submission together with the named co-authors; to the extend the submission incorporates text passages, figures, data or other material from the work of others, the submitting author has obtained any necessary permission.
Articles in this journal are published under the Creative Commons Attribution Licence (CC-BY What does this mean?). This is to get more legal certainty about what readers can do with published articles, and thus a wider dissemination and archiving, which in turn makes publishing with this journal more valuable for you, the authors.
By submitting an article the author grants to this journal the non-exclusive right to publish it. The author retains the copyright and the publishing rights for his article without any restrictions.