Improvisation of Security aspect of Steganographic System by applying RSA Algorithm

Abstract

The applications accessing multimedia systems and content over the internet have grown extremely in the earlier few years. Moreover, several end users or intruders can simply use tools to synthesize and modify valuable information. The safety of information over unsafe communication channel has constantly been a primary concern in the consideration of researchers. It became one of the most important problems for information technology and essential to safeguard this valuable information during transmission. It is also important to determine where and how such a multimedia file is confidential. Thus, a need exists for emerging technology that helps to defend the integrity of information and protected the intellectual property privileges of owners. Various approaches are coming up to safeguard the data from unauthorized person. Steganography and Cryptography are two different techniques for security data over communication network. The primary purpose of Cryptography is to create message concept unintelligible or ciphertext might produce suspicious in the mind of opponents. On the other hand, Steganography implant secrete message in to a cover media and hides its existence. As a normal practice, data embedding is employed in communication, image, text or multimedia contents for the purpose of copyright, authentication and digital signature etc. Both techniques provides the sufficient degree of security but are vulnerable to intruder’s attacks when used over unsecure communication channel. Attempt to combines the two techniques i.e. Cryptography and Steganography, did results in security improvement. The existing steganographic algorithms primarily focus on embedding approach with less attention to pre-processing of data which offer flexibility, robustness and high security level. Our proposed model is based on Public key cryptosystem or RSA algorithms in which RSA algorithm is used for message encryption in encoding function and the resultant encrypted image is hidden into cover image employing Least Significant Bit (LSB) embedding method.

Authors and Affiliations

Manoj Ramaiya, Dinesh Goyal, Naveen Hemrajani

Keywords

Related Articles

Size Reduction and Performance Enhancement of Pi Shaped Patch Antenna using Superstrate Configuration

Patch antennas are modern elements of today’s world communication technology. They appear to have unique characteristics and features with their unique power with handling capabilities and lighted structure. This paper f...

Implementation and Comparison of Text-Based Image Retrieval Schemes

Search engines, i.e., Google, Yahoo pro-vide various libraries and API’s to assist programmers and researchers in easier and efficient access to their collected data. When a user generates a search query, the dedicated A...

An Efficient Link Prediction Technique in Social Networks based on Node Neighborhoods

The unparalleled accomplishment of social networking sites, such as Facebook, LinkedIn and Twitter has modernized and transformed the way people communicate to each other. Nowadays, a huge amount of information is being...

Identification and Formal Representation of Change Operations in LOINC Evolution

LOINC (Logical Observation Identifiers Names and Codes) is one of the standardized health ontologies that is widely used by practitioners in the health sector. Like other ontologies in health field, LOINC evolves. This r...

Tri-Band Fractal Patch Antenna for GSM and Satellite Communication Systems

Due to their smaller size and light weighted structures patch antennas are accustomed in modern communication Technology. With additional size in reduction, micro strip antennas are commonly used in handsets, GPS receive...

Download PDF file
  • EP ID EP149295
  • DOI 10.14569/IJACSA.2016.070733
  • Views 107
  • Downloads 0

How To Cite

Manoj Ramaiya, Dinesh Goyal, Naveen Hemrajani (2016). Improvisation of Security aspect of Steganographic System by applying RSA Algorithm. International Journal of Advanced Computer Science & Applications, 7(7), 245-249. https://europub.co.uk/articles/-A-149295