Commercial Data Steganography Systems Using Public-Key Cryptography

Sudasawan Ngammongkolwong, Suwilai Phumpho

Abstract


Involving the application of public-key cryptography have the objective to camouflage commercial data because piracy is happening all over the world at present. RSA is an asymmetric key encryption algorithm using modular arithmetic. Public-key cryptography is popular in electronic transactions. The authors prioritize piracy and develop a steganography system using commercial image processing technology to prevent piracy. The program will camouflage texts in images and apply RSA to encode images to prevent piracy. The program will encode and decode for security. From the efficiency test of the steganography system using commercial image processing technology, users can camouflage data comfortably, easily, quickly, and efficiently. This is suitable for ordinary users who want to use the program to camouflage commercial data. One suggestion is that the system can include different encoding techniques such as AES, DES, and Chaos Key.

Keywords-component; camouflage, image decode, security, public-key cryptography


Full Text:

PDF

References


ETDA Recommendation on ICT Standard for Electronic Transactions. Electronic Transactions Development Agency, Ministry of Digital Economy and Society,2017.

Hüseyin Bodur, Resul Kara, "Secure SMS Encryption Using RSA Encryption Algorithm on Android Message Application",3RD International Symposium on Innovative Technologies in Engineering and ScienceAt : Valencia, June 2015.

Steven D Galbraith, "Mathematics of Public Key Cryptography Version 2.0",October 31, 2018.” [Online].Available:https://www.math.auckland.ac.nz/~sgal018/crypto-book/main.pdf. [Accessed: Sep. 7, 2020].

Public-KeyEncryption.2010, Oracle Corporation and/oritsaffiliates.[Online].Available:https://docs.oracle.com/cd/E19656-01/821-1507/aakfv/index.html. [Accessed: July.10, 2020].

G.-H. Chiou and W.-T. Chen, “Secure broadcasting using the secure lock.” IEEE Transactions on Engineering, Vol.15, No. 8, pp. 929-934, 1989


Refbacks

  • There are currently no refbacks.