Data Veiling Using Residue Number System based Encryption in Cybersecurity


Authors : Eseyin Joseph B; Akanni Gabriel A; Kazeem A. Gbolagade

Volume/Issue : Volume 7 - 2022, Issue 11 - November

Google Scholar : https://bit.ly/3IIfn9N

Scribd : https://bit.ly/3YMZPuB

In today's technologically advanced world, providing a secure communication route has become a difficult task. There is an extraordinary need for protection as risks to privacy become more prevalent. Cryptography and steganography are critical security approaches, however with the upsurge in network invaders, these approaches must adapt quickly to dodge these perils. The focus of this work is on image steganography, where the asylum instrument is a picture. We propose in the report a multilayer security approach for converting message text to its residue number system equivalent, using asymmetric encryption method, and embedding the ciphertext in the least significant bits of an image before sending it over the network to the intended recipient. The information is buried from the interloper in this approach, if it is discovered, decoding it would be problematic, providing a four-layer of security. The embedding and the extraction memory used were measured to show the whacking capability of the model and the histogram of the message to ensure that the distortion on the image imperceptibility is not visible.

Keywords : Least Significant Bits, Steganography, Cryptography, Residue Number System, Image Embedding, Image Extraction, ASCII Code.

CALL FOR PAPERS


Paper Submission Last Date
30 - April - 2024

Paper Review Notification
In 1-2 Days

Paper Publishing
In 2-3 Days

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe