Visible to the public E-Government Documents Authentication and Security by Utilizing Video Crypto-Steganography

TitleE-Government Documents Authentication and Security by Utilizing Video Crypto-Steganography
Publication TypeConference Paper
Year of Publication2018
AuthorsIngale, Alpana A., Moon, Sunil K.
Conference Name2018 IEEE Global Conference on Wireless Computing and Networking (GCWCN)
Date PublishedNov. 2018
ISBN Number978-1-5386-5201-5
Keywordsauthentication, Collaboration, Conferences, cover image, cryptography, cybersecurity, data encapsulation, data hiding procedure, data hiding scheme, E-Government, e-government documents authentication, e-government process, Electronic government, Encryption, Image color analysis, image encryption scheme, Internet, key security parameters, policy-based governance, pubcrawl, RDH, resilience, Resiliency, reversible data hiding, secret data, security, steganography, video coding, video crypto-steganography

In our daily lives, the advances of new technology can be used to sustain the development of people across the globe. Particularly, e-government can be the dynamo of the development for the people. The development of technology and the rapid growth in the use of internet creates a big challenge in the administration in both the public and the private sector. E-government is a vital accomplishment, whereas the security is the main downside which occurs in each e-government process. E-government has to be secure as technology grows and the users have to follow the procedures to make their own transactions safe. This paper tackles the challenges and obstacles to enhance the security of information in e-government. Hence to achieve security data hiding techniques are found to be trustworthy. Reversible data hiding (RDH) is an emerging technique which helps in retaining the quality of the cover image. Hence it is preferred over the traditional data hiding techniques. Modification in the existing algorithm is performed for image encryption scheme and data hiding scheme in order to improve the results. To achieve this secret data is split into 20 parts and data concealing is performed on each part. The data hiding procedure includes embedding of data into least significant nibble of the cover image. The bits are further equally distributed in the cover image to obtain the key security parameters. Hence the obtained results validate that the proposed scheme is better than the existing schemes.

Citation Keyingale_e-government_2018