Research Article

Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication

Table 3

Comparative analysis of safety.

ā€‰No authenticationExisting systemProposed system

Password speculation attackWeakWeakSafe
User impersonation attackWeakWeakSafe
Replay attackWeakWeakSafe
Omnidirectional safetyWeakWeakSafe
Website hackingWeakWeakSafe
Input contents falsification, keyboard hackingWeakWeakSafe