Improvisation of Security aspect of Steganographic System by applying RSA Algorithm
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 7
Abstract
The applications accessing multimedia systems and content over the internet have grown extremely in the earlier few years. Moreover, several end users or intruders can simply use tools to synthesize and modify valuable information. The safety of information over unsafe communication channel has constantly been a primary concern in the consideration of researchers. It became one of the most important problems for information technology and essential to safeguard this valuable information during transmission. It is also important to determine where and how such a multimedia file is confidential. Thus, a need exists for emerging technology that helps to defend the integrity of information and protected the intellectual property privileges of owners. Various approaches are coming up to safeguard the data from unauthorized person. Steganography and Cryptography are two different techniques for security data over communication network. The primary purpose of Cryptography is to create message concept unintelligible or ciphertext might produce suspicious in the mind of opponents. On the other hand, Steganography implant secrete message in to a cover media and hides its existence. As a normal practice, data embedding is employed in communication, image, text or multimedia contents for the purpose of copyright, authentication and digital signature etc. Both techniques provides the sufficient degree of security but are vulnerable to intruder’s attacks when used over unsecure communication channel. Attempt to combines the two techniques i.e. Cryptography and Steganography, did results in security improvement. The existing steganographic algorithms primarily focus on embedding approach with less attention to pre-processing of data which offer flexibility, robustness and high security level. Our proposed model is based on Public key cryptosystem or RSA algorithms in which RSA algorithm is used for message encryption in encoding function and the resultant encrypted image is hidden into cover image employing Least Significant Bit (LSB) embedding method.
Authors and Affiliations
Manoj Ramaiya, Dinesh Goyal, Naveen Hemrajani
Improved QoS for Multimedia Transmission using Buffer Management in Wireless Sensor Network
Wireless Sensor Network (WSN) diverts the attention of the research community as it is easy to deploy, self-maintained and does not require predefine infrastructure. These networks are commonly used to broadcast multimed...
Analysis of Resource Utilization on GPU
The problems arising due to massive data storage and data analysis can be handled by recent technologies, like cloud computing and parallel computing. MapReduce, MPI, CUDA, OpenMP, OpenCL are some of the widely available...
Electronic Health as a Component of G2C Services
This paper explores electronic health as a segment of electronic government. International practice in electronic health field and electronic health strategies adopted in Europe are analysed. Current practices in deliver...
Creating a Knowledge Database for Lectures of Faculty Members, Proposed E-Module for Isra University
Higher education in Jordan is currently expanding as new universities open and compete for offering the best learning experience. Many universities face accreditation challenges, hence, they attend to recruit lecturers w...
Performance Analysis of Acceleration Sensor for Movement Detection in Vehicle Security System
The vehicle security system is a critical part of an entire car system in order to prevent unauthorized access into the car. As the statistic has shown that the number of cases of the private car being stolen is increasi...