Skip to main content

RSA Algorithm Using Performance Analysis of Steganography Techniques in Network Security

  • Conference paper
  • First Online:
International Conference on Communication, Computing and Electronics Systems

Abstract

The stable network has now become a prerequisite for every relationship. The security hazards are expanding and rendering wired/remote organizations and Internet providers fast, shaky and problematic. Today, safety efforts are all the more important in meeting the cutting edge demands of current emerging businesses. The need is also discussed in areas such as guards, where the key points of concern are safe and checked admission of properties identified with data security. In this paper, the author described the important measures and limits for the establishment of a secure organization with regard to enormous industry / authoritative needs. In providing remote organization access to different assets and interfacing various gadgets remotely, Wi-Fi networks are extremely basic. To deal with Wi-Fi hazards and organizational hacking attempts, different prerequisites are required. This article discusses important protection efforts identified with different organizational conditions, so that an association may be set up with a fully assured organizational environment. Besides, a contextual investigation was examined to delineate the insignificant arrangement of measures necessary in any association to construct network security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Karthika P, Vidhya Saraswathi P (2017) Content based video copy detection using frame based fusion technique. J Adv Res Dyn Control Syst 9:885–894

    Google Scholar 

  2. Karthika P, Vidhya Saraswathi P (2020) Raspberry Pi—A tool for strategic machine learning security allocation in IoT, Apple Academic Press/CRC Press (A Taylor & Francis Group). Proposal has been accepted (provisionally) for the book entitled “Making Machine Intelligent by Artificial Learning”, to be published by CRC Press

    Google Scholar 

  3. Depren O, Topallar M, Anarim E, Ciliz MK (2019) Anomaly and Misuse detection in machine learning schemes for sensor networks. Expert Syst Appl 29(4):713–722

    Article  Google Scholar 

  4. Karthika P, Vidhya Saraswathi P (2020) IoT using machine learning security enhancement in video steganography allocation for Raspberry Pi. J Ambient Intell Human Comput https://doi.org/10.1007/s12652-020-02126-4 Impact Factor 1.91

  5. Anuar NB, Shamshirband S, Rohani VA, Kiah MLM, Petkovic D, Misra S (2019) Artificial immune system for detecting intrusion in stego-crptonetworks. J Comput Netw Appl 42(4):102–117

    Google Scholar 

  6. Maleh Y, Ezzati A, Qasmaoui Y, Mbida M (2020) Intrusion detection system fora global geometric image using machine learning system. In:Fifth International Symposium on Frontiers in Ambient and Mobile Systems (FAMS 2015) in association with Elsevier-Procedia Computer Science, vol 52, pp 1047–1052

    Google Scholar 

  7. Karthika P, Vidhya Saraswathi P (2017) A survey of Content based Video Copy detection using Big Data. Int J Sci Res Sci Technol (IJSRST). 3(5): 114–118. Online ISSN : 2395–602X, Print ISSN : 2395–6011, May-June 2017. https://ijsrst.com/ICASCT2519

  8. Ganesh Babu R, Elangovan K, Maurya S, Karthika P (2020) Multimedia security and privacy on real time behavioral monitoring in Machine Learning IoT application using Big Data Analytics. In: Raghvendra K, Sharma R, Pattnaik PK (eds) Multimedia technologies in the Internet of Things Environment (pp 155–177) Springer

    Google Scholar 

  9. Shen Y, Liu S, Zhang Z (2020) Detection of hello flood attack caused by malicious cluster heads on efficient machine learning technique. Int J Adv Comput Technol 7(2):40–47

    Google Scholar 

  10. Karthika P, Vidhya Saraswathi P (2019) Digital Video Copy detection using steganography frame based fusion techniques. In: International Conference on ISMAC in Computational Vision and bio-engineering. pp 61–68. https://doi.org/10.1007/978-3-030-00665-5_7

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Barani Sundaram .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sundaram, B.B., Kannaiya Raja, N., Sreenivas, N., Mishra, M.K., Pattanaik, B., Karthika, P. (2021). RSA Algorithm Using Performance Analysis of Steganography Techniques in Network Security. In: Bindhu, V., Tavares, J.M.R.S., Boulogeorgos, AA.A., Vuppalapati, C. (eds) International Conference on Communication, Computing and Electronics Systems. Lecture Notes in Electrical Engineering, vol 733. Springer, Singapore. https://doi.org/10.1007/978-981-33-4909-4_56

Download citation

  • DOI: https://doi.org/10.1007/978-981-33-4909-4_56

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-33-4908-7

  • Online ISBN: 978-981-33-4909-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics