Improvisation of Security aspect of Steganographic System by applying RSA Algorithm

被引:1
|
作者
Ramaiya, Manoj Kumar [1 ]
Goyal, Dinesh [2 ]
Hemrajani, Naveen [3 ]
机构
[1] Suresh Gyan Vihar Univ, Comp Engn, Jaipur, Rajasthan, India
[2] Suresh Gyan Vihar Univ, Sch Engn, Jaipur, Rajasthan, India
[3] JECRC Univ, Comp Engn, Jaipur, Rajasthan, India
关键词
Image Steganography; Cryptography; LSB insertion; Public key Cryptosystem; RSA algorithm;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The applications accessing multimedia systems and content over the internet have grown extremely in the earlier few years. Moreover, several end users or intruders can simply use tools to synthesize and modify valuable information. The safety of information over unsafe communication channel has constantly been a primary concern in the consideration of researchers. It became one of the most important problems for information technology and essential to safeguard this valuable information during transmission. It is also important to determine where and how such a multimedia file is confidential. Thus, a need exists for emerging technology that helps to defend the integrity of information and protected the intellectual property privileges of owners. Various approaches are coming up to safeguard the data from unauthorized person. Steganography and Cryptography are two different techniques for security data over communication network. The primary purpose of Cryptography is to create message concept unintelligible or ciphertext might produce suspicious in the mind of opponents. On the other hand, Steganography implant secrete message in to a cover media and hides its existence. As a normal practice, data embedding is employed in communication, image, text or multimedia contents for the purpose of copyright, authentication and digital signature etc. Both techniques provides the sufficient degree of security but are vulnerable to intruder's attacks when used over unsecure communication channel. Attempt to combines the two techniques i.e. Cryptography and Steganography, did results in security improvement. The existing steganographic algorithms primarily focus on embedding approach with less attention to preprocessing of data which offer flexibility, robustness and high security level. Our proposed model is based on Public key cryptosystem or RSA algorithms in which RSA algorithm is used for message encryption in encoding function and the resultant encrypted image is hidden into cover image employing Least Significant Bit (LSB) embedding method.
引用
收藏
页码:245 / 249
页数:5
相关论文
共 50 条
  • [31] Applying Encryption Algorithm for Data Security in Cloud Storage
    Kartit, Zaid
    Azougaghe, Ali
    Kamal Idrissi, H.
    El Marraki, M.
    Hedabou, M.
    Belkasmi, M.
    Kartit, A.
    ADVANCES IN UBIQUITOUS NETWORKING, 2016, 366 : 141 - 154
  • [32] THE ECONOMIC ASPECT OF A COMPREHENSIVE SYSTEM OF INTERNATIONAL SECURITY
    WEISS, H
    IPW BERICHTE, 1988, 17 (02): : 45 - 49
  • [33] An Efficient Signature System Using Optimized RSA Algorithm
    El-Sayed, Rania Salah
    Abd El-Aziem, Moustafa
    Gomaa, Mohammad Ali
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (12): : 343 - 348
  • [34] An optimization algorithm of RSA key generation in embedded system
    Department of Computer Science, North China Electric Power University, Beijing, China
    J. Theor. Appl. Inf. Technol., 1992, 1 (84-87):
  • [35] Chaotic System Image Encryption Algorithm Base RSA
    Zhao, Fuzhe
    Guo, Junnan
    Xu, Han
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL II, CENET 2023, 2024, 1126 : 81 - 91
  • [36] RSA Encryption Algorithm Optimization to Improve Performance and Security Level of Network Messages
    Meneses, Fausto
    Fuertes, Walter
    Sancho, Jose
    Salvador, Santiago
    Flores, Daniela
    Aules, Hernan
    Castro, Fidel
    Torres, Jenny
    Miranda, Alba
    Nuela, Danilo
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (08): : 55 - 62
  • [37] Enhancing the Data Security in Cloud by Implementing Hybrid (Rsa & Aes) Encryption Algorithm
    Mahalle, Vishwanath S.
    Shahade, Aniket K.
    2014 INTERNATIONAL CONFERENCE ON POWER, AUTOMATION AND COMMUNICATION (INPAC), 2014, : 146 - 149
  • [38] A Novel Approach to Enhance the Security Dimension of RSA Algorithm Using Bijective Function
    Mustafi, Kanyasree
    Sheikh, Nazimuddin
    Hazra, Tapan Kumar
    Mazumder, Maniratna
    Bhattacharya, Ishan
    Chakraborty, Ajoy Kumar
    7TH IEEE ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE IEEE IEMCON-2016, 2016,
  • [39] Steganographic Algorithm based on Chaotic Random System on Raspberry Pi Hardware
    Paraskevov, Hristo
    Stoyanov, Borislav
    APPLICATIONS OF MATHEMATICS IN ENGINEERING AND ECONOMICS (AMEE20), 2021, 2333
  • [40] A transportation security system applying RFID and GPS
    Zhang, Ruijian
    JOURNAL OF INDUSTRIAL ENGINEERING AND MANAGEMENT-JIEM, 2013, 6 (01): : 163 - 174