Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography

Nouf A. Al-Juaid, Adnan A. Gutub, Esam A. Khan


This paper proposed an enhanced system for securing sensitive text-data on personal computer benefitting from the combination of both techniques: cryptography and steganography. The system security is generated by involving RSA cryptography followed by video based steganography as two sequential layers to insure best possible security gaining the advantages from both. The study modeled the system and implemented it to be tested to explore the relation between security, capacity and data dependency. The experimentations covered testing securing data within 15 different size videos showing interesting results. The research gave enhancement to capacity vs. security, as enforced unavoidable tradeoff. The work uniqueness is presented in showing different measures allowing the user and application to be the decision maker to choose. The tests provided all possibilities of accepting security of 1-LSB, 2-LSB, and 3-LSB methods detailing their effects on the cover video. The main outcome proved applicability to be adopting 3-LSB approach to give acceptable security with practical capacity preferred making 3-LSB winning among 1-LSB and 2-LSB techniques.

Full Text:



N. Al-Otaibi, & A. Gutub, "2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers", Lecture Notes on Information Theory, Engineering and Technology Publishing, Vol. 2, No. 2, pp. 151-157, June 2014.

N. Al-Otaibi, & A. Gutub, "Flexible Stego- System for Hiding Text in Images of Personal Computers Based on User Security Priority", Proceedings of 2014 International Conference on Advanced Engineering Technologies (AET-2014), December 2014, pp. 250-256.

A. Gutub, "Pixel Indicator Technique for RGB Image Steganography", Journal of Emerging Technologies in Web Intelligence (JETWI), Vol. 2, No. 1, pp. 56-64, February 2010.

N. Al-Otaibi, A. Gutub, & E. Khan, "Stego- System for Hiding Text in Images of Personal Computers", The 12th Learning and Technology Conference: Wearable Tech/Wearable Learning, Effat University, April 2015.

A. Gutub, & H. Tahhan, "Improving Cryptographic Architectures by Adopting Efficient Adders in their Modular Multiplication Hardware", The 9th Annual Gulf Internet Symposium, Khobar, Saudi Arabia, October 13-15, 2003.

S. Gupta, A. Goyal, & B. Bhushan, "Information Hiding Using Least Significant Bit Steganography and Cryptography", I. J. Modern Education and Computer Science, Vol. 6, No. 1, pp. 27-34, June2012.

Deepali, "Steganography with data integrity", International Journal of Computational Engineering Research, Vol. 2, No. 7, pp. 190-193, November 2012.

P. R. Deshmukh, & B. Rahangdale, "Hash based least significant bit techniquefor video steganography", International Journal of Engineering Research and Applications, Vol 4, No. 1, pp. 44-49, January 2014.

K. U. Singh, "Video-Steganography: Text Hiding in Video by LSB Substitution", International Journal of Engineering Research and Applications, Vol. 4, No. 5, pp. 105-108, May 2014.

H. Gupta, & S. Chaturvedi, "Video Steganography through LSB Based Hybrid Approach", International Journal of Engineering Research and Development, Vol. 6, No. 12, pp. 32-42, May 2013.

N. Prabhakaran, & D. Shanthi, "A New Cryptic Steganographic Approach using Video Steganography", International Journal of Computer Applications, Vol. 49, No. 7, pp.32-42, July 2012.

H. Aly, "Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error", IEEE Transactions on Information Forensics and Security, Vol. 6, No. 1, pp.14-18, March 2011.

P. Praveen, & R. Arun, "Audio-video Crypto Steganography using LSB substitution and advanced chaotic algorithm", International Journal of Engineering Inventions, Vol. 4, No. 2, pp. 01-07, August 2014.

A. Swathi, & S. A. K. Jilani, "Video- Steganography by LSB Substitution Using Different Polynomial Equations",International Journal of Computational Engineering Research, Vol. 2, No. 5, pp. 1620 - 1623, September 2012.

S. K. Moon, & R. D. Raut, "Analysis of secured video Steganography using computer forensics techniques for enhances data security", IEEE Second International Conference on Image Information Processing (ICIIP), pp. 660 - 665, 2013.

V. Bodhak, & L. Gunjal, "Improved protection in video Steganography using DCT & LSB", International Journal of Engineering and Innovative Technology (IJEIT), Vol. 1, No. 4, pp. 31 - 37. 2012.

A. Gutub, "Merging GF(p) Elliptic Curve Point Adding and Doubling on Pipelined VLSI Cryptographic ASIC Architecture", International Journal of Computer Science and Network Security (IJCSNS), Vol. 6, No. 3, pp. 44 -52, March 2006.

N. Goshwe, "Data Encryption and Decryption Using RSA Algorithm in a Network Environment", International Journal of Computer Science and Network Security (IJCSNS), Vol. 13, No. 7, pp. 09- 13, July 2013.

A. Gutub & E. Khan, "Using Subthreshold SRAM to Design Low-Power Crypto Hardware", International Journal of New Computer Architectures and their Applications (IJNCAA), Vol.1, No.2, pp. 474 483, 2011.

L. Ghouti, M. K. Ibrahim, & A. Gutub, "Elliptic Polynomial Cryptography with Secret Key Embedding", USPTO: United States Patents & Trademark Office, Patent number: US 8351601, Filing date: Feb 18, 2010, Patent Issue date: Jan 8, 2013.

A. Gutub, N. Al-Juaid, & E. Khan, "Counting- Based Secret Sharing Technique for Multimedia Applications", Multimedia Tools and Applications: An International Journal – Springer, ISSN 1380-7501, DOI 10.1007/s11042-017-5293-6, Published online: 2 November 2017.

M. M. Rahman, T. K. Saha, & M. Bhuiyan, "Implementation of RSA Algorithm for Speech Data Encryption and Decryption", International Journal of Computer Science and Network Security ( IJCSNS), Vol. 12, No. 3, March 2012.

N. AlAssaf, B. AlKazemi, & A. Gutub, "Applicable Light-Weight Cryptography to Secure Medical Data in IoT Systems", Journal of Research in Engineering and Applied Sciences (JREAS), Vol. 2, No. 2, pp. 50-58, April 2017.

L. Ghouti, M. K. Ibrahim, & A. Gutub, "Method of Generating a Password Protocol Using Elliptic Polynomial Cryptography", USPTO: United States Patents & Trademark Office , Patent number: US_8332651,


  • There are currently no refbacks.