This paper is published in Volume-5, Issue-2, 2019
Area
Computer Engineering
Author
Ankita Lokhande, Shweta Hargude, Saloni Karangutkar, Dipali Junankar
Org/Univ
New Horizon Institute of Technology and Management,Thane, Maharashtra, India
Pub. Date
15 April, 2019
Paper ID
V5I2-1886
Publisher
Keywords
Upload, Encryption, Sending, Receiving, Decryption

Citationsacebook

IEEE
Ankita Lokhande, Shweta Hargude, Saloni Karangutkar, Dipali Junankar. Video encryption and decryption using RSA algorithm, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Ankita Lokhande, Shweta Hargude, Saloni Karangutkar, Dipali Junankar (2019). Video encryption and decryption using RSA algorithm. International Journal of Advance Research, Ideas and Innovations in Technology, 5(2) www.IJARIIT.com.

MLA
Ankita Lokhande, Shweta Hargude, Saloni Karangutkar, Dipali Junankar. "Video encryption and decryption using RSA algorithm." International Journal of Advance Research, Ideas and Innovations in Technology 5.2 (2019). www.IJARIIT.com.

Abstract

Information security has become the area of concern as a result of widespread use of communication medium over the internet. This paper focuses on the data security approach when combined with encryption and steganography techniques for secret communication by hiding it inside the multimedia files. The high results are achieved by providing the security to data before transmitting it over the internet. The files such as images, audio, the video contain a collection of bits that can be further translated into images, audio and video. The files composed of insignificant bits or unused areas which can be used for overwriting of other data. RSA (Rivest–Shamir–Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission. In such a cryptosystem, the encryption key is public and it is different from the decryption key which is kept secret (private). A user of RSA creates and then publishes a public key based on two large prime numbers, along with an auxiliary value. The prime numbers must be kept secret. Anyone can use the public key to encrypt a message, but with currently published methods, and if the public key is large enough, only someone with knowledge of the prime numbers can decode the message feasibly.