Improvisation of Security aspect of Steganographic System by applying RSA Algorithm

被引:1
|
作者
Ramaiya, Manoj Kumar [1 ]
Goyal, Dinesh [2 ]
Hemrajani, Naveen [3 ]
机构
[1] Suresh Gyan Vihar Univ, Comp Engn, Jaipur, Rajasthan, India
[2] Suresh Gyan Vihar Univ, Sch Engn, Jaipur, Rajasthan, India
[3] JECRC Univ, Comp Engn, Jaipur, Rajasthan, India
关键词
Image Steganography; Cryptography; LSB insertion; Public key Cryptosystem; RSA algorithm;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The applications accessing multimedia systems and content over the internet have grown extremely in the earlier few years. Moreover, several end users or intruders can simply use tools to synthesize and modify valuable information. The safety of information over unsafe communication channel has constantly been a primary concern in the consideration of researchers. It became one of the most important problems for information technology and essential to safeguard this valuable information during transmission. It is also important to determine where and how such a multimedia file is confidential. Thus, a need exists for emerging technology that helps to defend the integrity of information and protected the intellectual property privileges of owners. Various approaches are coming up to safeguard the data from unauthorized person. Steganography and Cryptography are two different techniques for security data over communication network. The primary purpose of Cryptography is to create message concept unintelligible or ciphertext might produce suspicious in the mind of opponents. On the other hand, Steganography implant secrete message in to a cover media and hides its existence. As a normal practice, data embedding is employed in communication, image, text or multimedia contents for the purpose of copyright, authentication and digital signature etc. Both techniques provides the sufficient degree of security but are vulnerable to intruder's attacks when used over unsecure communication channel. Attempt to combines the two techniques i.e. Cryptography and Steganography, did results in security improvement. The existing steganographic algorithms primarily focus on embedding approach with less attention to preprocessing of data which offer flexibility, robustness and high security level. Our proposed model is based on Public key cryptosystem or RSA algorithms in which RSA algorithm is used for message encryption in encoding function and the resultant encrypted image is hidden into cover image employing Least Significant Bit (LSB) embedding method.
引用
收藏
页码:245 / 249
页数:5
相关论文
共 50 条
  • [1] Improvisation of Security aspect in Steganography applying DES
    Ramaiya, Manoj Kumar
    Hemrajani, Naveen
    Saxena, Anil Kishore
    2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 431 - 436
  • [2] An Algorithm to Enhance Security in RSA
    Minni, Rohit
    Sultania, Kaushal
    Mishra, Saurabh
    Vincent, Durai Raj
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [3] AMENDATORY DEFINITION OF SECURITY FOR STEGANOGRAPHIC SYSTEM
    Song Hui Kong Xiangwei You Xingang (School of Electronic and Information Engineering
    Journal of Electronics(China), 2010, 27 (02) : 267 - 272
  • [4] A Hybrid Security Algorithm for RSA Cryptosystem
    Panda, Prabhat K.
    Chattopadhyay, Sudipta
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [5] Applying of Kutter-Jordan-Bossen Steganographic Algorithm in Video Sequences
    Lysenko, Nikolay
    Labkov, Gleb
    PROCEEDINGS OF THE 2017 IEEE RUSSIA SECTION YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING CONFERENCE (2017 ELCONRUS), 2017, : 695 - 696
  • [6] Data security system using hybrid cryptosystem RC4A-RSA algorithm
    Rahmadani, R.
    Putri, T. T. A.
    Sriadhi, S.
    Sari, R. D.
    Hutahaean, H. D.
    INTERNATIONAL CONFERENCE ON INNOVATION IN ENGINEERING AND VOCATIONAL EDUCATION 2019 (ICIEVE 2019), PTS 1-4, 2020, 830
  • [7] Security Analysis of RSA Cryptosystem Algorithm and it's Properties
    Liu, Chenglian
    Guo, Yongning
    Lin, Juan
    INTERNATIONAL CONFERENCE OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING 2014 (ICCMSE 2014), 2014, 1618 : 468 - 470
  • [8] Enhancement of Security Using B-RSA Algorithm
    Gupta, Aman
    Gupta, Saurabh
    Yadav, Nishi
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 439 - 450
  • [9] Hybrid Security RSA Algorithm in Application of Web Service
    Gondaliya, Jayraj
    Savani, Jinisha
    Dhaduvai, Vivek Sheetal
    Hossain, Gahangir
    2018 1ST INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2018), 2018, : 149 - 152
  • [10] A Modified RSA Algorithm to Enhance Security for Digital Signature
    Jaju, Sangita A.
    Chowhan, Santosh S.
    2015 INTERNATIONAL CONFERENCE AND WORKSHOP ON COMPUTING AND COMMUNICATION (IEMCON), 2015,