Improvisation of Security aspect of Steganographic System by applying RSA Algorithm

Abstract

The applications accessing multimedia systems and content over the internet have grown extremely in the earlier few years. Moreover, several end users or intruders can simply use tools to synthesize and modify valuable information. The safety of information over unsafe communication channel has constantly been a primary concern in the consideration of researchers. It became one of the most important problems for information technology and essential to safeguard this valuable information during transmission. It is also important to determine where and how such a multimedia file is confidential. Thus, a need exists for emerging technology that helps to defend the integrity of information and protected the intellectual property privileges of owners. Various approaches are coming up to safeguard the data from unauthorized person. Steganography and Cryptography are two different techniques for security data over communication network. The primary purpose of Cryptography is to create message concept unintelligible or ciphertext might produce suspicious in the mind of opponents. On the other hand, Steganography implant secrete message in to a cover media and hides its existence. As a normal practice, data embedding is employed in communication, image, text or multimedia contents for the purpose of copyright, authentication and digital signature etc. Both techniques provides the sufficient degree of security but are vulnerable to intruder’s attacks when used over unsecure communication channel. Attempt to combines the two techniques i.e. Cryptography and Steganography, did results in security improvement. The existing steganographic algorithms primarily focus on embedding approach with less attention to pre-processing of data which offer flexibility, robustness and high security level. Our proposed model is based on Public key cryptosystem or RSA algorithms in which RSA algorithm is used for message encryption in encoding function and the resultant encrypted image is hidden into cover image employing Least Significant Bit (LSB) embedding method.

Authors and Affiliations

Manoj Ramaiya, Dinesh Goyal, Naveen Hemrajani

Keywords

Related Articles

Seamless Connectivity for Adaptive Multimedia Provisioning over P2P-enabled IP Multimedia Subsystem

The subsystem multimedia internet network (IMS) has been upgraded to support peer-to-peer content distribution services, the peer heterogeneity constraint imposes a challenge that is the guarantee of a certain level of Q...

An Efficient Protocol using Fuzzy Logic and Grids with Two-Dimensional Techniques for Saving Energy in WSN

This work proposes an energy-saving protocol for wireless sensor networks (WSNs) using fuzzy logic and grids with two-dimensional techniques, namely, gravity and energy centers, to address the pressing issue of energy ef...

Edge Detection with Neuro-Fuzzy Approach in Digital Synthesis Images

This paper presents an enhanced Neuro-Fuzzy (NF) Approach of edge detection with an analysis of the characteristic of the method. The specificity of our method is an enhancement of the learning database of the diagonal e...

An Advanced Emergency Warning Message Scheme based on Vehicles Speed and Traffic Densities

In intelligent transportation systems, broadcasting Warning Messages (WMs) by Vehicular Ad hoc Networks (VANETs) communication is a significant task. Designing efficient dissemination schemes for fast and reliable delive...

MAC Protocol with Regression based Dynamic Duty Cycle Feature for Mission Critical Applications in WSN

Wireless sensor networks demand energy efficient and application specific medium access control protocol when deployed in critical areas which are not frequently accessible. In such areas, the residual energy of nodes al...

Download PDF file
  • EP ID EP149295
  • DOI 10.14569/IJACSA.2016.070733
  • Views 80
  • Downloads 0

How To Cite

Manoj Ramaiya, Dinesh Goyal, Naveen Hemrajani (2016). Improvisation of Security aspect of Steganographic System by applying RSA Algorithm. International Journal of Advanced Computer Science & Applications, 7(7), 245-249. https://europub.co.uk/articles/-A-149295