E-Government Documents Authentication and Security by Utilizing Video Crypto-Steganography
Title | E-Government Documents Authentication and Security by Utilizing Video Crypto-Steganography |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Ingale, Alpana A., Moon, Sunil K. |
Conference Name | 2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN) |
Date Published | Nov. 2018 |
Publisher | IEEE |
ISBN Number | 978-1-5386-5201-5 |
Keywords | authentication, Collaboration, Conferences, cover image, cryptography, cybersecurity, data encapsulation, data hiding procedure, data hiding scheme, E-Government, e-government documents authentication, e-government process, Electronic government, Encryption, Image color analysis, image encryption scheme, Internet, key security parameters, policy-based governance, pubcrawl, RDH, resilience, Resiliency, reversible data hiding, secret data, security, steganography, video coding, video crypto-steganography |
Abstract | In our daily lives, the advances of new technology can be used to sustain the development of people across the globe. Particularly, e-government can be the dynamo of the development for the people. The development of technology and the rapid growth in the use of internet creates a big challenge in the administration in both the public and the private sector. E-government is a vital accomplishment, whereas the security is the main downside which occurs in each e-government process. E-government has to be secure as technology grows and the users have to follow the procedures to make their own transactions safe. This paper tackles the challenges and obstacles to enhance the security of information in e-government. Hence to achieve security data hiding techniques are found to be trustworthy. Reversible data hiding (RDH) is an emerging technique which helps in retaining the quality of the cover image. Hence it is preferred over the traditional data hiding techniques. Modification in the existing algorithm is performed for image encryption scheme and data hiding scheme in order to improve the results. To achieve this secret data is split into 20 parts and data concealing is performed on each part. The data hiding procedure includes embedding of data into least significant nibble of the cover image. The bits are further equally distributed in the cover image to obtain the key security parameters. Hence the obtained results validate that the proposed scheme is better than the existing schemes. |
URL | https://ieeexplore.ieee.org/document/8668621 |
DOI | 10.1109/GCWCN.2018.8668621 |
Citation Key | ingale_e-government_2018 |
- Image color analysis
- video crypto-steganography
- video coding
- Steganography
- security
- secret data
- reversible data hiding
- Resiliency
- resilience
- RDH
- pubcrawl
- policy-based governance
- key security parameters
- internet
- image encryption scheme
- authentication
- encryption
- Electronic government
- e-government process
- e-government documents authentication
- E-Government
- data hiding scheme
- data hiding procedure
- data encapsulation
- Cybersecurity
- Cryptography
- cover image
- Conferences
- collaboration