Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography
Nouf Al-Juaid,Adnan Gutub,Esam Khan +2 more
- Vol. 1, Iss: 1
Reads0
Chats0
TLDR
The study modeled the system and implemented it to be tested to explore the relation between security, capacity and data dependency, and the main outcome proved applicability to be adopting 3-LSB approach to give acceptable security with practical capacity preferred.Abstract:
This paper proposed an enhanced system for securing sensitive text-data on personal computer benefitting from the combination of both techniques: cryptography and steganography. The system security is generated by involving RSA cryptography followed by video based steganography as two sequential layers to insure best possible security gaining the advantages from both. The study modeled the system and implemented it to be tested to explore the relation between security, capacity and data dependency. The experimentations covered testing securing data within 15 different size videos showing interesting results. The research gave enhancement to capacity vs. security, as enforced unavoidable tradeoff. The work uniqueness is presented in showing different measures allowing the user and application to be the decision maker to choose. The tests provided all possibilities of accepting security of 1-LSB, 2-LSB, and 3-LSB methods detailing their effects on the cover video. The main outcome proved applicability to be adopting 3-LSB approach to give acceptable security with practical capacity preferred making 3-LSB winning among 1-LSB and 2-LSB techniques.read more
Citations
More filters
Journal ArticleDOI
A privacy-preserving cryptosystem for IoT E-healthcare
TL;DR: A fast probabilistic cryptosystem to secure medical keyframes that are extracted from wireless capsule endoscopy procedure using a prioritization method and exhibits randomness behavior, which guarantee computational efficiency as well as a highest level of security for the keyframes against various attacks.
Journal ArticleDOI
An efficient watermarking technique for tamper detection and localization of medical images
TL;DR: The experimental results show that the proposed fragile watermarking technique capable of tamper detection and localization in medical/general images has lesser computational complexity when compared to other state-of-art techniques.
Journal ArticleDOI
An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer
TL;DR: A RDHEI scheme based on redundancy transfer and sparse block encoding is proposed that can achieve better rate-distortion performance than some of state-of-the-art schemes.
Journal ArticleDOI
Effective reversible data hiding in encrypted image with adaptive encoding strategy
TL;DR: Experimental results demonstrate that the proposed reversible data hiding scheme based on the adaptive encoding strategy not only can achieve satisfactory rate-distortion performance, but also can obtain greater embedding rate compared with the state-of-the-art schemes.
Journal ArticleDOI
Efficient Implementation of Multi-image Secret Hiding Based on LSB and DWT Steganography Comparisons
Adnan Gutub,Faiza Al-Shaarani +1 more
TL;DR: This paper compares the steganography algorithms of least significant bit and discrete wavelet transform in terms of efficiency and capacity of concealing multiple images within a single cover image.
References
More filters
Journal ArticleDOI
Pixel Indicator Technique for RGB Image Steganography
TL;DR: A new improved technique is proposed that takes the advantage of the 24 bits in each pixel in the RGB images using the two least significant bits of one channel to indicate existence of data in the other two channels to insert security randomness.
Journal ArticleDOI
Counting-based secret sharing technique for multimedia applications
TL;DR: This work presented two different modeling variations that are mainly different in the secret-sharing keys generation where both are studied elaborating their pros and cons.
Journal ArticleDOI
Information Hiding Using Least Significant Bit Steganography and Cryptography
TL;DR: The result shows that the use of encryption in Steganalysis does not affect the time complexity if Diffie Hellman algorithm is used in stead of RSA algorithm.
Hash Based Least Significant Bit Technique For Video Steganography
TL;DR: A Hash based least significant bit technique for video steganography has been proposed whose main goal is to embed a secret information in a particular video file and then extract it using a stego key or password.
Data Encryption and Decryption Using RSA Algorithm in a Network Environment
TL;DR: This paper presents a design of data encryption and decryption in a network environment using RSA algorithm with a specific message block size.