Abstract
The stable network has now become a prerequisite for every relationship. The security hazards are expanding and rendering wired/remote organizations and Internet providers fast, shaky and problematic. Today, safety efforts are all the more important in meeting the cutting edge demands of current emerging businesses. The need is also discussed in areas such as guards, where the key points of concern are safe and checked admission of properties identified with data security. In this paper, the author described the important measures and limits for the establishment of a secure organization with regard to enormous industry / authoritative needs. In providing remote organization access to different assets and interfacing various gadgets remotely, Wi-Fi networks are extremely basic. To deal with Wi-Fi hazards and organizational hacking attempts, different prerequisites are required. This article discusses important protection efforts identified with different organizational conditions, so that an association may be set up with a fully assured organizational environment. Besides, a contextual investigation was examined to delineate the insignificant arrangement of measures necessary in any association to construct network security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Karthika P, Vidhya Saraswathi P (2017) Content based video copy detection using frame based fusion technique. J Adv Res Dyn Control Syst 9:885–894
Karthika P, Vidhya Saraswathi P (2020) Raspberry Pi—A tool for strategic machine learning security allocation in IoT, Apple Academic Press/CRC Press (A Taylor & Francis Group). Proposal has been accepted (provisionally) for the book entitled “Making Machine Intelligent by Artificial Learning”, to be published by CRC Press
Depren O, Topallar M, Anarim E, Ciliz MK (2019) Anomaly and Misuse detection in machine learning schemes for sensor networks. Expert Syst Appl 29(4):713–722
Karthika P, Vidhya Saraswathi P (2020) IoT using machine learning security enhancement in video steganography allocation for Raspberry Pi. J Ambient Intell Human Comput https://doi.org/10.1007/s12652-020-02126-4 Impact Factor 1.91
Anuar NB, Shamshirband S, Rohani VA, Kiah MLM, Petkovic D, Misra S (2019) Artificial immune system for detecting intrusion in stego-crptonetworks. J Comput Netw Appl 42(4):102–117
Maleh Y, Ezzati A, Qasmaoui Y, Mbida M (2020) Intrusion detection system fora global geometric image using machine learning system. In:Fifth International Symposium on Frontiers in Ambient and Mobile Systems (FAMS 2015) in association with Elsevier-Procedia Computer Science, vol 52, pp 1047–1052
Karthika P, Vidhya Saraswathi P (2017) A survey of Content based Video Copy detection using Big Data. Int J Sci Res Sci Technol (IJSRST). 3(5): 114–118. Online ISSN : 2395–602X, Print ISSN : 2395–6011, May-June 2017. https://ijsrst.com/ICASCT2519
Ganesh Babu R, Elangovan K, Maurya S, Karthika P (2020) Multimedia security and privacy on real time behavioral monitoring in Machine Learning IoT application using Big Data Analytics. In: Raghvendra K, Sharma R, Pattnaik PK (eds) Multimedia technologies in the Internet of Things Environment (pp 155–177) Springer
Shen Y, Liu S, Zhang Z (2020) Detection of hello flood attack caused by malicious cluster heads on efficient machine learning technique. Int J Adv Comput Technol 7(2):40–47
Karthika P, Vidhya Saraswathi P (2019) Digital Video Copy detection using steganography frame based fusion techniques. In: International Conference on ISMAC in Computational Vision and bio-engineering. pp 61–68. https://doi.org/10.1007/978-3-030-00665-5_7
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sundaram, B.B., Kannaiya Raja, N., Sreenivas, N., Mishra, M.K., Pattanaik, B., Karthika, P. (2021). RSA Algorithm Using Performance Analysis of Steganography Techniques in Network Security. In: Bindhu, V., Tavares, J.M.R.S., Boulogeorgos, AA.A., Vuppalapati, C. (eds) International Conference on Communication, Computing and Electronics Systems. Lecture Notes in Electrical Engineering, vol 733. Springer, Singapore. https://doi.org/10.1007/978-981-33-4909-4_56
Download citation
DOI: https://doi.org/10.1007/978-981-33-4909-4_56
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-4908-7
Online ISBN: 978-981-33-4909-4
eBook Packages: EngineeringEngineering (R0)