SlideShare a Scribd company logo
1 of 4
Download to read offline
Nalawade .V .C et al., International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, IJARIIT All Rights Reserved Page | 817
ISSN: 2454-132X
Impact factor: 4.295
(Volume3, Issue1)
Available online at: www.ijariit.com
Dual-Layer Video Encryption and Decryption using
RSA Algorithm
C. V. Nalawade
E&TC (AP-Pune University)
chaitralip55@gmail.com
Swaleha N. Sayyad
E&TC(Pune University)
sayyadswaleha42@gmail.com
Pramila S. Sutar
E&TC(Pune University)
pramilasutar44@gmail.com
Rani S. Pise
E&TC(Pune University)
piserani@gmail.com
Vidhya H. Raut
E&TC(Pune University)
vidhyaraut86@gmail.com
Abstract— Video encryption algorithm using RSA and Pseudo Noise (PN) sequence, aimed at applications
requiring sensitive video information transfers. The system is primarily designed to work with files encoded
using the Audio Video Interleaved (AVI) codec, although it can be easily ported for use with Moving Picture
Experts Group (MPEG) encoded files. The audio and video components of the source separately undergo two
layers of encryption to ensure a reasonable level of security. Encryption of the video component involves
applying the RSA algorithm followed by the PN-based encryption.
Keywords— RSA, GUIDE, PN Sequence, MPGA, AVI.
I. INTRODUCTION
Information security has traditionally been ensured with data encryption and authentication techniques.
Different generic data encryption standards have been developed. Although these encryption standards provide a
high level of data protection, they are not efficient in the encryption of multimedia contents due to the large
volume of digital image/video data. For instance, enterprises with distributed locations having their business
meetings via video conferencing, is now a commonplace. Having an intruder intercept the path of data-
transmission and thereby gain access to the information being transferred can lead to horrendous situations
especially in scenarios wherein sensitive data is being transferred. Another related domain is the video-on-
demand application wherein certain privileged users are granted access to receive the benefits of the service. To
ascertain that the signal is not intercepted on its transmission path and hence prevent the misuse of the service,
encryption can be used.
II. LITERATURE SURVEY
a) Dual-Layer Video Encryption using RSA Algorithm
By Aman Chadha, Sushmit Mallik ,Ankit Chadha, Ravdeep Johar
This paper proposes a video encryption algorithm using RSA and Pseudo Noise (PN) sequence, aimed at
applications requiring sensitive video information transfers
b) Video Encryption and Decryption using RSA Algorithm
By Merlyne Sandra Christina C#1, Karthika M*2, Vasanthi M#3, Vinotha B*4
Security and privacy issues of the transmitted data have become an important concern in multimedia
technology. To maintain balance between computational time and security, proposed RSA algorithm has been
used to selectively encrypt and decrypt the sensitive video.
c) Separable Reversible Data Hiding in Encrypted Image
By Xinpeng Zhang
This work proposes a novel scheme for separable reversible data hiding in encrypted images. In the first phase,
a content owner encrypts the original uncompressed image using an encryption key. Then, a data-hider may
compress the least significant bits of the encrypted image using a data-hiding key to create a sparse space to
accommodate some additional data.With an encrypted image containing additional data, if a receiver has the
data-hiding key, he can extract the additional data though he does not know the image content.
Nalawade .V .C et al., International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, IJARIIT All Rights Reserved Page | 818
d) Digital Image Sharing by Diverse Image Media
By Kai-Hui Lee and Pei-Ling Chiu
Conventional visual secret sharing (VSS) schemes hide secret images in shares that are either printed on
transparencies or are encoded and stored in a digital form. The shares can appear as noise-like pixels or as
meaningful images; but it will arouse suspicion and increase interception risk during transmission of the shares.
e) RGB Based Secret Sharing Scheme in Color Visual Cryptography
By M.Karolin1, Dr.T.Meyyapan2
Information hiding in the communication spectrum became a critical task. The Visual Cryptography is a type of
cryptography that allows the image to be divided into multiple numbers of shares called transparent shares and
then transmission of images. The intruder hence cannot understand the distorted image and thus the data
communication becomes secured. In existing methods works for color images with 8 colors and even few of
them without halftone
Techniques
f) Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System By
Somdip Dey, Asoke Nath, Shalabh Agarwal
Security and authenticity of data is a big challenge. To solve this problem, we propose an innovative method to
authenticate the digital documents.
g) A visual cryptographic encryption technique for securing medical image
By Aphetsi Keste
Confidential patient information over these networks. Digital encryption of medical images before transmission
and storage is proposed as a way to effectively provide protection of patient information. Encryption before
watermarking of these images is necessary in order to ensure inaccessibility of information to unauthorized
personnel with patient.
III. SYSTEM
In this system we are using following blocks
Fig. Process diagram
IV. RSA ALGORITHM
We propose this system using RSA Algorithm.
RSA is made of the initial letters of the surnames of Ron Rivest, Adi Shamir and Leonard Adleman,who first
publicly described the algorithm in 1977
RSA algorithm consist of three stages
a) Key generation
b) Encryption
c) Decryption
a) Key generation: - A key is a piece of information that determines the functional output of a cryptographic
algorithm. Without a key, the algorithm would be useless. In encryption, a key specifies the particular
transformation of plaintext into cipher text, or vice versa during decryption. There are two keys in RSA, i.e.
Nalawade .V .C et al., International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, IJARIIT All Rights Reserved Page | 819
Public key and Private key. The public key is known to everyone and is used for encrypting the messages;
these messages can be decrypted only using the private key.
Keys for the RSA Algorithm are generated in the following manner:
1) Select two distinct prime numbers p and q.
2) Compute: n = p*q
3) Compute: φ(n) = (p – 1)(q – 1), where φ stands for the Euler’s totient function.
4) Select an integer e such that φ(n) and e are co prime.
5) Calculate d using the formula : d = e-1
(modφ(n))
The public key consists of the modulus n and e (encryption exponent). The private key consists of the
modulus n and d (decryption exponent), the decryption exponent has to be kept secret along with p,q
and φ(n), using which the decryption exponent can be calculated.
V. EXPECTED RESULT
Encryption stages:
STAGE 1
STAGE 2
STAGE 3
STAGE 4
Original Image
R,G,B
Components
After level 1
encryption
After level
2
encryption
Nalawade .V .C et al., International Journal of Advance Research, Ideas and Innovations in Technology.
© 2017, IJARIIT All Rights Reserved Page | 820
Decryption stages:
CONCLUSIONS
This system will help to secure the secret data from unauthorized use. new method of dual layer encryption
methodology which enables to achieve zero visual resemblance and high security while not being severely
penalized in Speed and Decryption ratio The dual layer approach presents a promising approach to achieving a
highly secure way of video encryption while not being very computationally intensive and time consuming.
.
ACKNOWLEDGMENT
We are very thankful to our guide who has always helped us. Thanks to our college for providing us the
best facilities and environment for research. Special thanks to our parents who has always been a source of
inspiration for us.
REFERENCES
[1] Aswathy Nair, Deepu Job, “A Secure Dual Encryption Scheme Combined with Steganography”
International Journal of Engineering Trends and Technology (IJETT) – Volume 13 Number 5 – Jul 2014
[2] Vineeta Khemchandani, Kulvinder Kaur, “Securing Visual Cryptographic Shares using Public Key
Encryption”.
[3] D. Kahn, “Cryptography Goes Public”, IEEE Communications Magazine, Vol. 18, 19–28, 1980.
[4] Kulvinder Kaur “Securing Visual Cryptographic Shares using Public Key Encryption” , 2013 3rd IEEE
International Advance Computing Conference (IACC).
[5] D. Jena and S. Jena “A Novel Visual Cryptography Scheme”. 2008 IEEE DOI 10.1109
[6] Young-Chang Hou, "Visual cryptography for color images”,Journal of Pattern Recognition, Vol.36, pp.1619
– 1629, 2009.
STAGE 5
After level 2
decryption
STAGE 6
After level 1
decryption
STAGE 7
After recombining
all R,G,B
components

More Related Content

What's hot

Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio SignalsGufran karim
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsTharindu Weerasinghe
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherAashirwad Kashyap
 
Steganography document
Steganography documentSteganography document
Steganography documentBSheghembe
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligenceijtsrd
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISShivam Porwal
 
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...EECJOURNAL
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio SteganographyRajan Yadav
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hidingijcses
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 malaOyeniyi Samuel
 
DDS in Action -- Part I
DDS in Action -- Part IDDS in Action -- Part I
DDS in Action -- Part IAngelo Corsaro
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyAlexander Decker
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET Journal
 

What's hot (20)

Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio Signals
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation UnitMIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
319 325
319 325319 325
319 325
 
Steganography document
Steganography documentSteganography document
Steganography document
 
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial IntelligenceVideo Steganography using Discrete Wavelet Transform and Artificial Intelligence
Video Steganography using Discrete Wavelet Transform and Artificial Intelligence
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Data Security Using Audio Steganography
Data Security Using Audio SteganographyData Security Using Audio Steganography
Data Security Using Audio Steganography
 
Ew25914917
Ew25914917Ew25914917
Ew25914917
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
 
digital steganography
digital steganographydigital steganography
digital steganography
 
DDS in Action -- Part I
DDS in Action -- Part IDDS in Action -- Part I
DDS in Action -- Part I
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganography
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
 

Similar to Dual-Layer Video Encryption and Decryption using RSA Algorithm

IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET Journal
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET Journal
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...IRJET Journal
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Praneeta Dehare
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography IRJESJOURNAL
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...IRJET Journal
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationIRJET Journal
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET Journal
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET Journal
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 

Similar to Dual-Layer Video Encryption and Decryption using RSA Algorithm (20)

V9I1202028.pdf
V9I1202028.pdfV9I1202028.pdf
V9I1202028.pdf
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
18. 23367.pdf
18. 23367.pdf18. 23367.pdf
18. 23367.pdf
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Ijmet 10 01_020
Ijmet 10 01_020Ijmet 10 01_020
Ijmet 10 01_020
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTINGDATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 

Recently uploaded

VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 

Recently uploaded (20)

VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 

Dual-Layer Video Encryption and Decryption using RSA Algorithm

  • 1. Nalawade .V .C et al., International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, IJARIIT All Rights Reserved Page | 817 ISSN: 2454-132X Impact factor: 4.295 (Volume3, Issue1) Available online at: www.ijariit.com Dual-Layer Video Encryption and Decryption using RSA Algorithm C. V. Nalawade E&TC (AP-Pune University) chaitralip55@gmail.com Swaleha N. Sayyad E&TC(Pune University) sayyadswaleha42@gmail.com Pramila S. Sutar E&TC(Pune University) pramilasutar44@gmail.com Rani S. Pise E&TC(Pune University) piserani@gmail.com Vidhya H. Raut E&TC(Pune University) vidhyaraut86@gmail.com Abstract— Video encryption algorithm using RSA and Pseudo Noise (PN) sequence, aimed at applications requiring sensitive video information transfers. The system is primarily designed to work with files encoded using the Audio Video Interleaved (AVI) codec, although it can be easily ported for use with Moving Picture Experts Group (MPEG) encoded files. The audio and video components of the source separately undergo two layers of encryption to ensure a reasonable level of security. Encryption of the video component involves applying the RSA algorithm followed by the PN-based encryption. Keywords— RSA, GUIDE, PN Sequence, MPGA, AVI. I. INTRODUCTION Information security has traditionally been ensured with data encryption and authentication techniques. Different generic data encryption standards have been developed. Although these encryption standards provide a high level of data protection, they are not efficient in the encryption of multimedia contents due to the large volume of digital image/video data. For instance, enterprises with distributed locations having their business meetings via video conferencing, is now a commonplace. Having an intruder intercept the path of data- transmission and thereby gain access to the information being transferred can lead to horrendous situations especially in scenarios wherein sensitive data is being transferred. Another related domain is the video-on- demand application wherein certain privileged users are granted access to receive the benefits of the service. To ascertain that the signal is not intercepted on its transmission path and hence prevent the misuse of the service, encryption can be used. II. LITERATURE SURVEY a) Dual-Layer Video Encryption using RSA Algorithm By Aman Chadha, Sushmit Mallik ,Ankit Chadha, Ravdeep Johar This paper proposes a video encryption algorithm using RSA and Pseudo Noise (PN) sequence, aimed at applications requiring sensitive video information transfers b) Video Encryption and Decryption using RSA Algorithm By Merlyne Sandra Christina C#1, Karthika M*2, Vasanthi M#3, Vinotha B*4 Security and privacy issues of the transmitted data have become an important concern in multimedia technology. To maintain balance between computational time and security, proposed RSA algorithm has been used to selectively encrypt and decrypt the sensitive video. c) Separable Reversible Data Hiding in Encrypted Image By Xinpeng Zhang This work proposes a novel scheme for separable reversible data hiding in encrypted images. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. Then, a data-hider may compress the least significant bits of the encrypted image using a data-hiding key to create a sparse space to accommodate some additional data.With an encrypted image containing additional data, if a receiver has the data-hiding key, he can extract the additional data though he does not know the image content.
  • 2. Nalawade .V .C et al., International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, IJARIIT All Rights Reserved Page | 818 d) Digital Image Sharing by Diverse Image Media By Kai-Hui Lee and Pei-Ling Chiu Conventional visual secret sharing (VSS) schemes hide secret images in shares that are either printed on transparencies or are encoded and stored in a digital form. The shares can appear as noise-like pixels or as meaningful images; but it will arouse suspicion and increase interception risk during transmission of the shares. e) RGB Based Secret Sharing Scheme in Color Visual Cryptography By M.Karolin1, Dr.T.Meyyapan2 Information hiding in the communication spectrum became a critical task. The Visual Cryptography is a type of cryptography that allows the image to be divided into multiple numbers of shares called transparent shares and then transmission of images. The intruder hence cannot understand the distorted image and thus the data communication becomes secured. In existing methods works for color images with 8 colors and even few of them without halftone Techniques f) Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System By Somdip Dey, Asoke Nath, Shalabh Agarwal Security and authenticity of data is a big challenge. To solve this problem, we propose an innovative method to authenticate the digital documents. g) A visual cryptographic encryption technique for securing medical image By Aphetsi Keste Confidential patient information over these networks. Digital encryption of medical images before transmission and storage is proposed as a way to effectively provide protection of patient information. Encryption before watermarking of these images is necessary in order to ensure inaccessibility of information to unauthorized personnel with patient. III. SYSTEM In this system we are using following blocks Fig. Process diagram IV. RSA ALGORITHM We propose this system using RSA Algorithm. RSA is made of the initial letters of the surnames of Ron Rivest, Adi Shamir and Leonard Adleman,who first publicly described the algorithm in 1977 RSA algorithm consist of three stages a) Key generation b) Encryption c) Decryption a) Key generation: - A key is a piece of information that determines the functional output of a cryptographic algorithm. Without a key, the algorithm would be useless. In encryption, a key specifies the particular transformation of plaintext into cipher text, or vice versa during decryption. There are two keys in RSA, i.e.
  • 3. Nalawade .V .C et al., International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, IJARIIT All Rights Reserved Page | 819 Public key and Private key. The public key is known to everyone and is used for encrypting the messages; these messages can be decrypted only using the private key. Keys for the RSA Algorithm are generated in the following manner: 1) Select two distinct prime numbers p and q. 2) Compute: n = p*q 3) Compute: φ(n) = (p – 1)(q – 1), where φ stands for the Euler’s totient function. 4) Select an integer e such that φ(n) and e are co prime. 5) Calculate d using the formula : d = e-1 (modφ(n)) The public key consists of the modulus n and e (encryption exponent). The private key consists of the modulus n and d (decryption exponent), the decryption exponent has to be kept secret along with p,q and φ(n), using which the decryption exponent can be calculated. V. EXPECTED RESULT Encryption stages: STAGE 1 STAGE 2 STAGE 3 STAGE 4 Original Image R,G,B Components After level 1 encryption After level 2 encryption
  • 4. Nalawade .V .C et al., International Journal of Advance Research, Ideas and Innovations in Technology. © 2017, IJARIIT All Rights Reserved Page | 820 Decryption stages: CONCLUSIONS This system will help to secure the secret data from unauthorized use. new method of dual layer encryption methodology which enables to achieve zero visual resemblance and high security while not being severely penalized in Speed and Decryption ratio The dual layer approach presents a promising approach to achieving a highly secure way of video encryption while not being very computationally intensive and time consuming. . ACKNOWLEDGMENT We are very thankful to our guide who has always helped us. Thanks to our college for providing us the best facilities and environment for research. Special thanks to our parents who has always been a source of inspiration for us. REFERENCES [1] Aswathy Nair, Deepu Job, “A Secure Dual Encryption Scheme Combined with Steganography” International Journal of Engineering Trends and Technology (IJETT) – Volume 13 Number 5 – Jul 2014 [2] Vineeta Khemchandani, Kulvinder Kaur, “Securing Visual Cryptographic Shares using Public Key Encryption”. [3] D. Kahn, “Cryptography Goes Public”, IEEE Communications Magazine, Vol. 18, 19–28, 1980. [4] Kulvinder Kaur “Securing Visual Cryptographic Shares using Public Key Encryption” , 2013 3rd IEEE International Advance Computing Conference (IACC). [5] D. Jena and S. Jena “A Novel Visual Cryptography Scheme”. 2008 IEEE DOI 10.1109 [6] Young-Chang Hou, "Visual cryptography for color images”,Journal of Pattern Recognition, Vol.36, pp.1619 – 1629, 2009. STAGE 5 After level 2 decryption STAGE 6 After level 1 decryption STAGE 7 After recombining all R,G,B components