Research Article
Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication
Table 3
Comparative analysis of safety.
| ā | No authentication | Existing system | Proposed system |
| Password speculation attack | Weak | Weak | Safe | User impersonation attack | Weak | Weak | Safe | Replay attack | Weak | Weak | Safe | Omnidirectional safety | Weak | Weak | Safe | Website hacking | Weak | Weak | Safe | Input contents falsification, keyboard hacking | Weak | Weak | Safe |
|
|