Research Article
Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication
Table 3
Comparative analysis of safety.
| | 
 |  | ā | No authentication | Existing system | Proposed system |  | 
 |  | Password speculation attack | Weak | Weak | Safe |  | User impersonation attack | Weak | Weak | Safe |  | Replay attack | Weak | Weak | Safe |  | Omnidirectional safety | Weak | Weak | Safe |  | Website hacking | Weak | Weak | Safe |  | Input contents falsification, keyboard hacking | Weak | Weak | Safe |  | 
 | 
 |