Data Veiling Using Residue Number System Based Encryption in Cybersecurity
Data Veiling Using Residue Number System Based Encryption in Cybersecurity
ISSN No:-2456-2165
Kazeem A. Gbolagade
Department of Computer Science
College of Library and Information Technology
Kwara State University, Malete, Ilorin
Abstract:- In today's technologically advanced world, is on image steganography, where the cover medium is a
providing a secure communication route has become a picture. Both approaches are significant, but operate
difficult task. There is an extraordinary need for superlatively when used together. When cryptography is
protection as risks to privacy become more prevalent. employed alone, the intruder has access to the ciphertext, and
Cryptography and steganography are critical security security can be undermined if sufficient cryptanalysis is
approaches, however with the upsurge in network performed. When used alone, steganography hides data,
invaders, these approaches must adapt quickly to dodge however, if discovered by an invader, decrypting the data isn't
these perils. The focus of this work is on image difficult. As a result, the combined method is recommended
steganography, where the asylum instrument is a picture. since it ensures data confidentiality, integrity, authenticity
We propose in the report a multilayer security approach and concealment. The information is secreted from the
for converting message text to its residue number system impostor in this approach, and if it is discovered, decoding it
equivalent, using asymmetric encryption method, and might be tough, providing a multilayer of security. In
embedding the ciphertext in the least significant bits of an Steganography, the stego image modelled after the
image before sending it over the network to the intended clandestine message concealment must not be slanted too
recipient. The information is buried from the interloper much and necessarly be parallel to the original image. When
in this approach, if it is discovered, decoding it would be steganographic security is conceded due to distortions Peak
problematic, providing a four-layer of security. The Signal Noise Ratio (PSNR) values are measured to determine
embedding and the extraction memory used were the extent of alterations. This research present a strategy for
measured to show the whacking capability of the model improving PSNR using asymmetric or public-key encryption
and the histogram of the message to ensure that the and picture steganography.
distortion on the image imperceptibility is not visible.
The remaining part of the paper discusses the literature
Keywords:- Least Significant Bits, Steganography, review, the proposed method, the sample working model, the
Cryptography, Residue Number System, Image Embedding, experimental results, and the conclusion.
Image Extraction, ASCII Code.
II. LITERATURE REVIEW
I. INTRODUCTION
Cryptography refers to data encryption, that transform
For secure transmission the sender turned the plaintext plain text to ciphertext that is aimed at securing data for
to an indecipherable ciphertext and the receiver translating transmission. Cryptanalysis is the decryption procedure of
the ciphertext overturn it to its initial information deprived of the awareness of encryption
schemes.William Stallings [8] discusses several forms of
text using secret keys. Cryptography's role is to ensure enciphering and deciphering schemes.
data's confidentiality, integrity, and authenticity. Aside from
the old customary methods, there are twin types of secret-key Undisclosed information is veiled in a cover media, and
cryptography: symmetric and asymmetric cryptographies. picture steganography is one type of steganography in which
the cover media is image.
Encryption is simply defined as turning a plain text into
ciphertext and decryption as transforming the ciphertext into Steganography is accomplished using a variety of
the original plaintext. While steganography is the method of techniques, one of which is LSB replacement, which involves
keeping veiled data in digital material such as imageries, replacing the image's least significant bits with the message
aural files, and audiovisual files. to convert the innovative image into a stego image. As a result
lone restricted data can be buried in the asylum image as
These digital media serve as concealment for sensitive explained in [9]. This paper examines the implanting ability
information and aid in transmission. The focus of this study of shielding pictures using LSB-based approaches for image
3.00E+09 most efficient RSA and LSB algorithms to create the most
2.50E+09 reliable and secure systems. The improvement of hiding data
2.00E+09
1.50E+09 in the asylum image is greater. To solve decryption at a
1.00E+09 sluggish pace, fast RSA-CRT algorithms are used. We
5.00E+08 employed the RSA encryption technology to protect two
0.00E+00
layers, and we discovered that decryption of RSA-CRT is
faster than standard RSA and with an enhanced reduction in
decryption memory. To identify the flaws in the RSA
decryption memory, an analytical comparison of the RSA and
Cover image RSA-CRT decryption algorithms is designed and
implemented. Initial results demonstrate that utilizing CRT to
RSA: Embeding Memory RSA-CRT:Embedingmemory decrypt with RSA improves decryption memory performance
significantly.
Fig 3 Embedding memory RSA and RSA with CRT
REFERENCES
Using Chinese Remainder Theorem on the RSA
encryption process before embedding, it is seen from Table 1 [1]. Marwa E. Saleh, Abdelmgeid A. Aly, and Fatma A.
and Figure 3 that the memory used is significantly lower than Omara, “Data Security Using Cryptography and
RSA embedding without the CRT. It thus conserved memory Steganography Techniques”,(IJACSA) International
and minimized resource utilization. Journal of Advanced Computer Science and
Applications, Vol. 7, No. 6, 2016.
Table 2 The RSA extraction memory and RSA- CRT [2]. M. E. Saleh, A. A. Aly, and F. A. Omara, “Enhancing
extraction memory Pixel Value Difference (PVD) Image Steganography by
RSA: Extraction RSA-CRT: Extraction Using Mobile Phone Keypad (MPK) Coding”,
Cover image Memory memory International Journal of Computer Science and
Eagle 2.26E+09 1.20E+09 security (IJCSS), Volume (9), Issue (2), pp. 397 - 397,
Baboon 1.27E+09 1.02E+09 2015.
Gold Fish 2.08E+09 1.19E+09 [3]. Rupali Bhardwaj and Vaishali Sharma, “Image
Pepper 1.43E+09 1.03E+09 Steganography Based on Complemented Message and
Inverted bit LSB Substitution”, 6th International
Lena 1.60E+09 1.01E+09
Conference On Advances In Computing &
Babooon 1.51E+09 1.21E+09 Communications, ICACC 2016, 6-8 September 2016,
Redroses 2.21E+09 1.01E+09 Cochin, India.
Dog 3.22E+09 1.22E+09 [4]. Bin Li, Junhui H, Jiwu Huang, and Yun Qing Shi, “A
Survey on Image Steganography and Steganalysis”, Int.
J. Inf. Hiding Multimedia Signal Process. 2 (2011) 142–
RSA Extraction Memory with CRT and 172.
without CRT [5]. Eseyin, J. B. and Gbolagade, K. A A residue number
3.50E+09 system based data hiding using steganography and
cryptography. KIU Journal of Social Sciences, [S.l.].
3.00E+09
2019;5(2):345-351. July. ISSN 2519-0474.
2.50E+09 [6]. Eseyin J. B. and Gbolagade K.A. Data Hiding in Digital
2.00E+09 Image for Efficient Information Safety Based on
1.50E+09 Residue Number System. Asian Journal of Research in
1.00E+09 Computer Science 8(4): 35-44, 2021; Article
no.AJRCOS.68473 ISSN: 2581-8260
5.00E+08
[7]. Marghny H. Mohamed and Loay M. Mohamed, (2016),
0.00E+00 “High Capacity Image Steganography Technique based
on LSB Substitution Method”, Applied Mathematics &
Information Sciences, Appl. Math. Inf. Sci. 10, No. 1,
2016, pp.: 259- 266.
RSA: Extraction Memory RSA-CRT: Extraction memory [8]. W. Stallings, “Cryptography and Network Security:
Principles and Practices, 6th edition”.
Fig 4 Extraction memory of RSA and RSA with CRT