scispace - formally typeset
Open AccessJournal ArticleDOI

Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography

Reads0
Chats0
TLDR
The study modeled the system and implemented it to be tested to explore the relation between security, capacity and data dependency, and the main outcome proved applicability to be adopting 3-LSB approach to give acceptable security with practical capacity preferred.
Abstract
This paper proposed an enhanced system for securing sensitive text-data on personal computer benefitting from the combination of both techniques: cryptography and steganography. The system security is generated by involving RSA cryptography followed by video based steganography as two sequential layers to insure best possible security gaining the advantages from both. The study modeled the system and implemented it to be tested to explore the relation between security, capacity and data dependency. The experimentations covered testing securing data within 15 different size videos showing interesting results. The research gave enhancement to capacity vs. security, as enforced unavoidable tradeoff. The work uniqueness is presented in showing different measures allowing the user and application to be the decision maker to choose. The tests provided all possibilities of accepting security of 1-LSB, 2-LSB, and 3-LSB methods detailing their effects on the cover video. The main outcome proved applicability to be adopting 3-LSB approach to give acceptable security with practical capacity preferred making 3-LSB winning among 1-LSB and 2-LSB techniques.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A privacy-preserving cryptosystem for IoT E-healthcare

TL;DR: A fast probabilistic cryptosystem to secure medical keyframes that are extracted from wireless capsule endoscopy procedure using a prioritization method and exhibits randomness behavior, which guarantee computational efficiency as well as a highest level of security for the keyframes against various attacks.
Journal ArticleDOI

An efficient watermarking technique for tamper detection and localization of medical images

TL;DR: The experimental results show that the proposed fragile watermarking technique capable of tamper detection and localization in medical/general images has lesser computational complexity when compared to other state-of-art techniques.
Journal ArticleDOI

An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer

TL;DR: A RDHEI scheme based on redundancy transfer and sparse block encoding is proposed that can achieve better rate-distortion performance than some of state-of-the-art schemes.
Journal ArticleDOI

Effective reversible data hiding in encrypted image with adaptive encoding strategy

TL;DR: Experimental results demonstrate that the proposed reversible data hiding scheme based on the adaptive encoding strategy not only can achieve satisfactory rate-distortion performance, but also can obtain greater embedding rate compared with the state-of-the-art schemes.
Journal ArticleDOI

Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons

TL;DR: This paper compares the steganography algorithms of least significant bit and discrete wavelet transform in terms of efficiency and capacity of concealing multiple images within a single cover image.
References
More filters
Journal ArticleDOI

Pixel Indicator Technique for RGB Image Steganography

TL;DR: A new improved technique is proposed that takes the advantage of the 24 bits in each pixel in the RGB images using the two least significant bits of one channel to indicate existence of data in the other two channels to insert security randomness.
Journal ArticleDOI

Counting-based secret sharing technique for multimedia applications

TL;DR: This work presented two different modeling variations that are mainly different in the secret-sharing keys generation where both are studied elaborating their pros and cons.
Journal ArticleDOI

Information Hiding Using Least Significant Bit Steganography and Cryptography

TL;DR: The result shows that the use of encryption in Steganalysis does not affect the time complexity if Diffie Hellman algorithm is used in stead of RSA algorithm.

Hash Based Least Significant Bit Technique For Video Steganography

TL;DR: A Hash based least significant bit technique for video steganography has been proposed whose main goal is to embed a secret information in a particular video file and then extract it using a stego key or password.

Data Encryption and Decryption Using RSA Algorithm in a Network Environment

TL;DR: This paper presents a design of data encryption and decryption in a network environment using RSA algorithm with a specific message block size.
Related Papers (5)