SlideShare a Scribd company logo
Nalawade .V .C et al., International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, IJARIIT All Rights Reserved Page | 817
ISSN: 2454-132X
Impact factor: 4.295
(Volume3, Issue1)
Available online at: www.ijariit.com
Dual-Layer Video Encryption and Decryption using
RSA Algorithm
C. V. Nalawade
E&TC (AP-Pune University)
chaitralip55@gmail.com
Swaleha N. Sayyad
E&TC(Pune University)
sayyadswaleha42@gmail.com
Pramila S. Sutar
E&TC(Pune University)
pramilasutar44@gmail.com
Rani S. Pise
E&TC(Pune University)
piserani@gmail.com
Vidhya H. Raut
E&TC(Pune University)
vidhyaraut86@gmail.com
Abstract— Video encryption algorithm using RSA and Pseudo Noise (PN) sequence, aimed at applications
requiring sensitive video information transfers. The system is primarily designed to work with files encoded
using the Audio Video Interleaved (AVI) codec, although it can be easily ported for use with Moving Picture
Experts Group (MPEG) encoded files. The audio and video components of the source separately undergo two
layers of encryption to ensure a reasonable level of security. Encryption of the video component involves
applying the RSA algorithm followed by the PN-based encryption.
Keywords— RSA, GUIDE, PN Sequence, MPGA, AVI.
I. INTRODUCTION
Information security has traditionally been ensured with data encryption and authentication techniques.
Different generic data encryption standards have been developed. Although these encryption standards provide a
high level of data protection, they are not efficient in the encryption of multimedia contents due to the large
volume of digital image/video data. For instance, enterprises with distributed locations having their business
meetings via video conferencing, is now a commonplace. Having an intruder intercept the path of data-
transmission and thereby gain access to the information being transferred can lead to horrendous situations
especially in scenarios wherein sensitive data is being transferred. Another related domain is the video-on-
demand application wherein certain privileged users are granted access to receive the benefits of the service. To
ascertain that the signal is not intercepted on its transmission path and hence prevent the misuse of the service,
encryption can be used.
II. LITERATURE SURVEY
a) Dual-Layer Video Encryption using RSA Algorithm
By Aman Chadha, Sushmit Mallik ,Ankit Chadha, Ravdeep Johar
This paper proposes a video encryption algorithm using RSA and Pseudo Noise (PN) sequence, aimed at
applications requiring sensitive video information transfers
b) Video Encryption and Decryption using RSA Algorithm
By Merlyne Sandra Christina C#1, Karthika M*2, Vasanthi M#3, Vinotha B*4
Security and privacy issues of the transmitted data have become an important concern in multimedia
technology. To maintain balance between computational time and security, proposed RSA algorithm has been
used to selectively encrypt and decrypt the sensitive video.
c) Separable Reversible Data Hiding in Encrypted Image
By Xinpeng Zhang
This work proposes a novel scheme for separable reversible data hiding in encrypted images. In the first phase,
a content owner encrypts the original uncompressed image using an encryption key. Then, a data-hider may
compress the least significant bits of the encrypted image using a data-hiding key to create a sparse space to
accommodate some additional data.With an encrypted image containing additional data, if a receiver has the
data-hiding key, he can extract the additional data though he does not know the image content.
Nalawade .V .C et al., International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, IJARIIT All Rights Reserved Page | 818
d) Digital Image Sharing by Diverse Image Media
By Kai-Hui Lee and Pei-Ling Chiu
Conventional visual secret sharing (VSS) schemes hide secret images in shares that are either printed on
transparencies or are encoded and stored in a digital form. The shares can appear as noise-like pixels or as
meaningful images; but it will arouse suspicion and increase interception risk during transmission of the shares.
e) RGB Based Secret Sharing Scheme in Color Visual Cryptography
By M.Karolin1, Dr.T.Meyyapan2
Information hiding in the communication spectrum became a critical task. The Visual Cryptography is a type of
cryptography that allows the image to be divided into multiple numbers of shares called transparent shares and
then transmission of images. The intruder hence cannot understand the distorted image and thus the data
communication becomes secured. In existing methods works for color images with 8 colors and even few of
them without halftone
Techniques
f) Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System By
Somdip Dey, Asoke Nath, Shalabh Agarwal
Security and authenticity of data is a big challenge. To solve this problem, we propose an innovative method to
authenticate the digital documents.
g) A visual cryptographic encryption technique for securing medical image
By Aphetsi Keste
Confidential patient information over these networks. Digital encryption of medical images before transmission
and storage is proposed as a way to effectively provide protection of patient information. Encryption before
watermarking of these images is necessary in order to ensure inaccessibility of information to unauthorized
personnel with patient.
III. SYSTEM
In this system we are using following blocks
Fig. Process diagram
IV. RSA ALGORITHM
We propose this system using RSA Algorithm.
RSA is made of the initial letters of the surnames of Ron Rivest, Adi Shamir and Leonard Adleman,who first
publicly described the algorithm in 1977
RSA algorithm consist of three stages
a) Key generation
b) Encryption
c) Decryption
a) Key generation: - A key is a piece of information that determines the functional output of a cryptographic
algorithm. Without a key, the algorithm would be useless. In encryption, a key specifies the particular
transformation of plaintext into cipher text, or vice versa during decryption. There are two keys in RSA, i.e.
Nalawade .V .C et al., International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, IJARIIT All Rights Reserved Page | 819
Public key and Private key. The public key is known to everyone and is used for encrypting the messages;
these messages can be decrypted only using the private key.
Keys for the RSA Algorithm are generated in the following manner:
1) Select two distinct prime numbers p and q.
2) Compute: n = p*q
3) Compute: φ(n) = (p – 1)(q – 1), where φ stands for the Euler’s totient function.
4) Select an integer e such that φ(n) and e are co prime.
5) Calculate d using the formula : d = e-1
(modφ(n))
The public key consists of the modulus n and e (encryption exponent). The private key consists of the
modulus n and d (decryption exponent), the decryption exponent has to be kept secret along with p,q
and φ(n), using which the decryption exponent can be calculated.
V. EXPECTED RESULT
Encryption stages:
STAGE 1
STAGE 2
STAGE 3
STAGE 4
Original Image
R,G,B
Components
After level 1
encryption
After level
2
encryption
Nalawade .V .C et al., International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, IJARIIT All Rights Reserved Page | 820
Decryption stages:
CONCLUSIONS
This system will help to secure the secret data from unauthorized use. new method of dual layer encryption
methodology which enables to achieve zero visual resemblance and high security while not being severely
penalized in Speed and Decryption ratio The dual layer approach presents a promising approach to achieving a
highly secure way of video encryption while not being very computationally intensive and time consuming.
.
ACKNOWLEDGMENT
We are very thankful to our guide who has always helped us. Thanks to our college for providing us the
best facilities and environment for research. Special thanks to our parents who has always been a source of
inspiration for us.
REFERENCES
[1] Aswathy Nair, Deepu Job, “A Secure Dual Encryption Scheme Combined with Steganography”
International Journal of Engineering Trends and Technology (IJETT) – Volume 13 Number 5 – Jul 2014
[2] Vineeta Khemchandani, Kulvinder Kaur, “Securing Visual Cryptographic Shares using Public Key
Encryption”.
[3] D. Kahn, “Cryptography Goes Public”, IEEE Communications Magazine, Vol. 18, 19–28, 1980.
[4] Kulvinder Kaur “Securing Visual Cryptographic Shares using Public Key Encryption” , 2013 3rd IEEE
International Advance Computing Conference (IACC).
[5] D. Jena and S. Jena “A Novel Visual Cryptography Scheme”. 2008 IEEE DOI 10.1109
[6] Young-Chang Hou, "Visual cryptography for color images”,Journal of Pattern Recognition, Vol.36, pp.1619
– 1629, 2009.
STAGE 5
After level 2
decryption
STAGE 6
After level 1
decryption
STAGE 7
After recombining
all R,G,B
components
Ad

Recommended

96683234 project-report-steganography
96683234 project-report-steganography
Mahmut Yildiz
 
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
Mohit Goel
 
Sample projectdocumentation
Sample projectdocumentation
hlksd
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: Report
Aparna Nk
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
 
Data hiding in audio signals ppt
Data hiding in audio signals ppt
jackkhush
 
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
Mohit Goel
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
Northeastern University
 
Data Hiding in Audio Signals
Data Hiding in Audio Signals
Gufran karim
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
Association of Scientists, Developers and Faculties
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
vivatechijri
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Tharindu Weerasinghe
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
Aashirwad Kashyap
 
319 325
319 325
Editor IJARCET
 
Steganography document
Steganography document
BSheghembe
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
ijtsrd
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
Shivam Porwal
 
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
EECJOURNAL
 
Ijetcas14 355
Ijetcas14 355
Iasir Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Data Security Using Audio Steganography
Data Security Using Audio Steganography
Rajan Yadav
 
Ew25914917
Ew25914917
IJERA Editor
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
ijcses
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
Oyeniyi Samuel
 
digital steganography
digital steganography
mahesh paliwal
 
DDS in Action -- Part I
DDS in Action -- Part I
Angelo Corsaro
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganography
Alexander Decker
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET Journal
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
PiyushPatil73
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
ijtsrd
 

More Related Content

What's hot (20)

Data Hiding in Audio Signals
Data Hiding in Audio Signals
Gufran karim
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
Association of Scientists, Developers and Faculties
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
vivatechijri
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Tharindu Weerasinghe
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
Aashirwad Kashyap
 
319 325
319 325
Editor IJARCET
 
Steganography document
Steganography document
BSheghembe
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
ijtsrd
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
Shivam Porwal
 
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
EECJOURNAL
 
Ijetcas14 355
Ijetcas14 355
Iasir Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Data Security Using Audio Steganography
Data Security Using Audio Steganography
Rajan Yadav
 
Ew25914917
Ew25914917
IJERA Editor
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
ijcses
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
Oyeniyi Samuel
 
digital steganography
digital steganography
mahesh paliwal
 
DDS in Action -- Part I
DDS in Action -- Part I
Angelo Corsaro
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganography
Alexander Decker
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET Journal
 
Data Hiding in Audio Signals
Data Hiding in Audio Signals
Gufran karim
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
vivatechijri
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Tharindu Weerasinghe
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
Aashirwad Kashyap
 
Steganography document
Steganography document
BSheghembe
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
ijtsrd
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
Shivam Porwal
 
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
EECJOURNAL
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Data Security Using Audio Steganography
Data Security Using Audio Steganography
Rajan Yadav
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
ijcses
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
Oyeniyi Samuel
 
DDS in Action -- Part I
DDS in Action -- Part I
Angelo Corsaro
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganography
Alexander Decker
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET Journal
 

Similar to Dual-Layer Video Encryption and Decryption using RSA Algorithm (20)

Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
PiyushPatil73
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
ijtsrd
 
A Brief Study of Video Encryption Algorithms
A Brief Study of Video Encryption Algorithms
IJERA Editor
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)
Mumbai Academisc
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)
Mumbai Academisc
 
RSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
Universitas Pembangunan Panca Budi
 
IRJET- Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
IRJET Journal
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
IRJET Journal
 
Documentation20
Documentation20
gebremedhinfitsum
 
Basic techniques in cryptography
Basic techniques in cryptography
Shraddha Gupta
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
ijtsrd
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
Tuhin_Das
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)
Mumbai Academisc
 
Cryptography and network security
Cryptography and network security
patisa
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
IJEACS
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
IRJET Journal
 
Rsa cryptography &steganography
Rsa cryptography &steganography
Puneet Singla
 
Data security using rsa
Data security using rsa
LAKSHMI TEJA SAYABARAPU
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
IOSR Journals
 
Rsa Crptosystem
Rsa Crptosystem
Amlan Patel
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
PiyushPatil73
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
ijtsrd
 
A Brief Study of Video Encryption Algorithms
A Brief Study of Video Encryption Algorithms
IJERA Editor
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)
Mumbai Academisc
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)
Mumbai Academisc
 
IRJET- Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
IRJET Journal
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
IRJET Journal
 
Basic techniques in cryptography
Basic techniques in cryptography
Shraddha Gupta
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
ijtsrd
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
Tuhin_Das
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)
Mumbai Academisc
 
Cryptography and network security
Cryptography and network security
patisa
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
IJEACS
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
IRJET Journal
 
Rsa cryptography &steganography
Rsa cryptography &steganography
Puneet Singla
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
IOSR Journals
 
Ad

Recently uploaded (20)

最新版美国特拉华大学毕业证(UDel毕业证书)原版定制
最新版美国特拉华大学毕业证(UDel毕业证书)原版定制
taqyea
 
ChatGPT_and_Its_Uses_Presentationss.pptx
ChatGPT_and_Its_Uses_Presentationss.pptx
Neha Prakash
 
Global Networking Trends, presented at the India ISP Conclave 2025
Global Networking Trends, presented at the India ISP Conclave 2025
APNIC
 
Azure_Landing_Zone_Best_Practices_Visuals.pptx
Azure_Landing_Zone_Best_Practices_Visuals.pptx
fredsonbarbosa1
 
PROCESS FOR CREATION OF BUSINESS PARTNER IN SAP
PROCESS FOR CREATION OF BUSINESS PARTNER IN SAP
AhmadAli716831
 
BASICS OF SAP _ ALL ABOUT SAP _WHY SAP OVER ANY OTHER ERP SYSTEM
BASICS OF SAP _ ALL ABOUT SAP _WHY SAP OVER ANY OTHER ERP SYSTEM
AhmadAli716831
 
BroadLink Cloud Service introduction.pdf
BroadLink Cloud Service introduction.pdf
DevendraDwivdi1
 
The ARUBA Kind of new Proposal Umum .pptx
The ARUBA Kind of new Proposal Umum .pptx
andiwarneri
 
DDoS in India, presented at INNOG 8 by Dave Phelan
DDoS in India, presented at INNOG 8 by Dave Phelan
APNIC
 
Clive Dickens RedTech Public Copy - Collaborate or Die
Clive Dickens RedTech Public Copy - Collaborate or Die
Clive Dickens
 
Paper: The World Game (s) Great Redesign.pdf
Paper: The World Game (s) Great Redesign.pdf
Steven McGee
 
原版一样(ANU毕业证书)澳洲澳大利亚国立大学毕业证在线购买
原版一样(ANU毕业证书)澳洲澳大利亚国立大学毕业证在线购买
Taqyea
 
Almos Entirely Correct Mixing with Apps to Voting
Almos Entirely Correct Mixing with Apps to Voting
gapati2964
 
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
notgachabite123
 
Logging and Automated Alerting Webinar.pdf
Logging and Automated Alerting Webinar.pdf
ControlCase
 
Slides: Eco Economic Epochs for The World Game (s) pdf
Slides: Eco Economic Epochs for The World Game (s) pdf
Steven McGee
 
ChatGPT A.I. Powered Chatbot and Popularization.pdf
ChatGPT A.I. Powered Chatbot and Popularization.pdf
StanleySamson1
 
原版一样(ISM毕业证书)德国多特蒙德国际管理学院毕业证多少钱
原版一样(ISM毕业证书)德国多特蒙德国际管理学院毕业证多少钱
taqyed
 
Pitch PitchPitchPitchPitchPitchPitch.pptx
Pitch PitchPitchPitchPitchPitchPitch.pptx
157551
 
最新版加拿大奎斯特大学毕业证(QUC毕业证书)原版定制
最新版加拿大奎斯特大学毕业证(QUC毕业证书)原版定制
taqyed
 
最新版美国特拉华大学毕业证(UDel毕业证书)原版定制
最新版美国特拉华大学毕业证(UDel毕业证书)原版定制
taqyea
 
ChatGPT_and_Its_Uses_Presentationss.pptx
ChatGPT_and_Its_Uses_Presentationss.pptx
Neha Prakash
 
Global Networking Trends, presented at the India ISP Conclave 2025
Global Networking Trends, presented at the India ISP Conclave 2025
APNIC
 
Azure_Landing_Zone_Best_Practices_Visuals.pptx
Azure_Landing_Zone_Best_Practices_Visuals.pptx
fredsonbarbosa1
 
PROCESS FOR CREATION OF BUSINESS PARTNER IN SAP
PROCESS FOR CREATION OF BUSINESS PARTNER IN SAP
AhmadAli716831
 
BASICS OF SAP _ ALL ABOUT SAP _WHY SAP OVER ANY OTHER ERP SYSTEM
BASICS OF SAP _ ALL ABOUT SAP _WHY SAP OVER ANY OTHER ERP SYSTEM
AhmadAli716831
 
BroadLink Cloud Service introduction.pdf
BroadLink Cloud Service introduction.pdf
DevendraDwivdi1
 
The ARUBA Kind of new Proposal Umum .pptx
The ARUBA Kind of new Proposal Umum .pptx
andiwarneri
 
DDoS in India, presented at INNOG 8 by Dave Phelan
DDoS in India, presented at INNOG 8 by Dave Phelan
APNIC
 
Clive Dickens RedTech Public Copy - Collaborate or Die
Clive Dickens RedTech Public Copy - Collaborate or Die
Clive Dickens
 
Paper: The World Game (s) Great Redesign.pdf
Paper: The World Game (s) Great Redesign.pdf
Steven McGee
 
原版一样(ANU毕业证书)澳洲澳大利亚国立大学毕业证在线购买
原版一样(ANU毕业证书)澳洲澳大利亚国立大学毕业证在线购买
Taqyea
 
Almos Entirely Correct Mixing with Apps to Voting
Almos Entirely Correct Mixing with Apps to Voting
gapati2964
 
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
notgachabite123
 
Logging and Automated Alerting Webinar.pdf
Logging and Automated Alerting Webinar.pdf
ControlCase
 
Slides: Eco Economic Epochs for The World Game (s) pdf
Slides: Eco Economic Epochs for The World Game (s) pdf
Steven McGee
 
ChatGPT A.I. Powered Chatbot and Popularization.pdf
ChatGPT A.I. Powered Chatbot and Popularization.pdf
StanleySamson1
 
原版一样(ISM毕业证书)德国多特蒙德国际管理学院毕业证多少钱
原版一样(ISM毕业证书)德国多特蒙德国际管理学院毕业证多少钱
taqyed
 
Pitch PitchPitchPitchPitchPitchPitch.pptx
Pitch PitchPitchPitchPitchPitchPitch.pptx
157551
 
最新版加拿大奎斯特大学毕业证(QUC毕业证书)原版定制
最新版加拿大奎斯特大学毕业证(QUC毕业证书)原版定制
taqyed
 
Ad

Dual-Layer Video Encryption and Decryption using RSA Algorithm

  • 1. Nalawade .V .C et al., International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, IJARIIT All Rights Reserved Page | 817 ISSN: 2454-132X Impact factor: 4.295 (Volume3, Issue1) Available online at: www.ijariit.com Dual-Layer Video Encryption and Decryption using RSA Algorithm C. V. Nalawade E&TC (AP-Pune University) [email protected] Swaleha N. Sayyad E&TC(Pune University) [email protected] Pramila S. Sutar E&TC(Pune University) [email protected] Rani S. Pise E&TC(Pune University) [email protected] Vidhya H. Raut E&TC(Pune University) [email protected] Abstract— Video encryption algorithm using RSA and Pseudo Noise (PN) sequence, aimed at applications requiring sensitive video information transfers. The system is primarily designed to work with files encoded using the Audio Video Interleaved (AVI) codec, although it can be easily ported for use with Moving Picture Experts Group (MPEG) encoded files. The audio and video components of the source separately undergo two layers of encryption to ensure a reasonable level of security. Encryption of the video component involves applying the RSA algorithm followed by the PN-based encryption. Keywords— RSA, GUIDE, PN Sequence, MPGA, AVI. I. INTRODUCTION Information security has traditionally been ensured with data encryption and authentication techniques. Different generic data encryption standards have been developed. Although these encryption standards provide a high level of data protection, they are not efficient in the encryption of multimedia contents due to the large volume of digital image/video data. For instance, enterprises with distributed locations having their business meetings via video conferencing, is now a commonplace. Having an intruder intercept the path of data- transmission and thereby gain access to the information being transferred can lead to horrendous situations especially in scenarios wherein sensitive data is being transferred. Another related domain is the video-on- demand application wherein certain privileged users are granted access to receive the benefits of the service. To ascertain that the signal is not intercepted on its transmission path and hence prevent the misuse of the service, encryption can be used. II. LITERATURE SURVEY a) Dual-Layer Video Encryption using RSA Algorithm By Aman Chadha, Sushmit Mallik ,Ankit Chadha, Ravdeep Johar This paper proposes a video encryption algorithm using RSA and Pseudo Noise (PN) sequence, aimed at applications requiring sensitive video information transfers b) Video Encryption and Decryption using RSA Algorithm By Merlyne Sandra Christina C#1, Karthika M*2, Vasanthi M#3, Vinotha B*4 Security and privacy issues of the transmitted data have become an important concern in multimedia technology. To maintain balance between computational time and security, proposed RSA algorithm has been used to selectively encrypt and decrypt the sensitive video. c) Separable Reversible Data Hiding in Encrypted Image By Xinpeng Zhang This work proposes a novel scheme for separable reversible data hiding in encrypted images. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. Then, a data-hider may compress the least significant bits of the encrypted image using a data-hiding key to create a sparse space to accommodate some additional data.With an encrypted image containing additional data, if a receiver has the data-hiding key, he can extract the additional data though he does not know the image content.
  • 2. Nalawade .V .C et al., International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, IJARIIT All Rights Reserved Page | 818 d) Digital Image Sharing by Diverse Image Media By Kai-Hui Lee and Pei-Ling Chiu Conventional visual secret sharing (VSS) schemes hide secret images in shares that are either printed on transparencies or are encoded and stored in a digital form. The shares can appear as noise-like pixels or as meaningful images; but it will arouse suspicion and increase interception risk during transmission of the shares. e) RGB Based Secret Sharing Scheme in Color Visual Cryptography By M.Karolin1, Dr.T.Meyyapan2 Information hiding in the communication spectrum became a critical task. The Visual Cryptography is a type of cryptography that allows the image to be divided into multiple numbers of shares called transparent shares and then transmission of images. The intruder hence cannot understand the distorted image and thus the data communication becomes secured. In existing methods works for color images with 8 colors and even few of them without halftone Techniques f) Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System By Somdip Dey, Asoke Nath, Shalabh Agarwal Security and authenticity of data is a big challenge. To solve this problem, we propose an innovative method to authenticate the digital documents. g) A visual cryptographic encryption technique for securing medical image By Aphetsi Keste Confidential patient information over these networks. Digital encryption of medical images before transmission and storage is proposed as a way to effectively provide protection of patient information. Encryption before watermarking of these images is necessary in order to ensure inaccessibility of information to unauthorized personnel with patient. III. SYSTEM In this system we are using following blocks Fig. Process diagram IV. RSA ALGORITHM We propose this system using RSA Algorithm. RSA is made of the initial letters of the surnames of Ron Rivest, Adi Shamir and Leonard Adleman,who first publicly described the algorithm in 1977 RSA algorithm consist of three stages a) Key generation b) Encryption c) Decryption a) Key generation: - A key is a piece of information that determines the functional output of a cryptographic algorithm. Without a key, the algorithm would be useless. In encryption, a key specifies the particular transformation of plaintext into cipher text, or vice versa during decryption. There are two keys in RSA, i.e.
  • 3. Nalawade .V .C et al., International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, IJARIIT All Rights Reserved Page | 819 Public key and Private key. The public key is known to everyone and is used for encrypting the messages; these messages can be decrypted only using the private key. Keys for the RSA Algorithm are generated in the following manner: 1) Select two distinct prime numbers p and q. 2) Compute: n = p*q 3) Compute: φ(n) = (p – 1)(q – 1), where φ stands for the Euler’s totient function. 4) Select an integer e such that φ(n) and e are co prime. 5) Calculate d using the formula : d = e-1 (modφ(n)) The public key consists of the modulus n and e (encryption exponent). The private key consists of the modulus n and d (decryption exponent), the decryption exponent has to be kept secret along with p,q and φ(n), using which the decryption exponent can be calculated. V. EXPECTED RESULT Encryption stages: STAGE 1 STAGE 2 STAGE 3 STAGE 4 Original Image R,G,B Components After level 1 encryption After level 2 encryption
  • 4. Nalawade .V .C et al., International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, IJARIIT All Rights Reserved Page | 820 Decryption stages: CONCLUSIONS This system will help to secure the secret data from unauthorized use. new method of dual layer encryption methodology which enables to achieve zero visual resemblance and high security while not being severely penalized in Speed and Decryption ratio The dual layer approach presents a promising approach to achieving a highly secure way of video encryption while not being very computationally intensive and time consuming. . ACKNOWLEDGMENT We are very thankful to our guide who has always helped us. Thanks to our college for providing us the best facilities and environment for research. Special thanks to our parents who has always been a source of inspiration for us. REFERENCES [1] Aswathy Nair, Deepu Job, “A Secure Dual Encryption Scheme Combined with Steganography” International Journal of Engineering Trends and Technology (IJETT) – Volume 13 Number 5 – Jul 2014 [2] Vineeta Khemchandani, Kulvinder Kaur, “Securing Visual Cryptographic Shares using Public Key Encryption”. [3] D. Kahn, “Cryptography Goes Public”, IEEE Communications Magazine, Vol. 18, 19–28, 1980. [4] Kulvinder Kaur “Securing Visual Cryptographic Shares using Public Key Encryption” , 2013 3rd IEEE International Advance Computing Conference (IACC). [5] D. Jena and S. Jena “A Novel Visual Cryptography Scheme”. 2008 IEEE DOI 10.1109 [6] Young-Chang Hou, "Visual cryptography for color images”,Journal of Pattern Recognition, Vol.36, pp.1619 – 1629, 2009. STAGE 5 After level 2 decryption STAGE 6 After level 1 decryption STAGE 7 After recombining all R,G,B components