[go: up one dir, main page]

Chaturvedi et al., 2017 - Google Patents

Overview on Various Techniques Developed In Steganography By Different Agencies

Chaturvedi et al., 2017

View PDF
Document ID
16222313378623278444
Author
Chaturvedi A
Verma P
Publication year

External Links

Snippet

In the era of ICT, every stream needs to use the online transactions. Although the citizens of the developed nations are at ease to work with it, however the citizens of the developing nations are still struggling to handle the same. The basic reason behind the lack of ease to …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • G06F2221/0722Content
    • G06F2221/0737Traceability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks

Similar Documents

Publication Publication Date Title
US12095742B2 (en) Method and apparatus of DRM systems for protecting enterprise confidentiality
Bandyopadhyay et al. A tutorial review on steganography
Kumar et al. Steganography-A data hiding technique
Umamaheswari et al. Analysis of different steganographic algorithms for secured data hiding
Muyco et al. Least significant bit hash algorithm for digital image watermarking authentication
Panigrahi et al. An effective steganographic technique for hiding the image data using the LSB technique
Suresh et al. Document Security within Institutions Using Image Steganography Technique
Arab et al. Comparison of data hiding techniques for video watermarking applications
Verma et al. Encryption and decryption of images based on steganography and cryptography algorithms: a new model
Katariya Digital watermarking
Lee Multipurpose protection for numeric data with capabilities of self-authentication and ownership declaration
Chaturvedi et al. Overview on Various Techniques Developed In Steganography By Different Agencies
Yadav Study of Information Hiding Techniques and their Counterattacks
Hoshi et al. Digital watermarking: Innovations and challenges in copyright protection
Beyer Women in computer science: Deterrents
Sharma et al. Digital watermarking for secure e-government framework
Mazhar et al. ‘Survey on relational database watermarking employing evolutionary methods
Dadkhah et al. Efficient image authentication and tamper localization algorithm using active watermarking
Sharma et al. A comprehensive survey on data hiding technique
Maiti Secure watermarking techniques for copyright protection and authentication of digital images and audio signals
Kakkar Silent Guardians: Exploring the Vital Role of Steganography in Cyber Security
Sivasankari et al. A Study on Cybernated Watermarking Approach on Image With Cryptographic Encryption
Srivadana Digital watermarking
JP2005535959A (en) Digital content containing information of potential value to buyers and method of creating it
Eyre et al. Steganography and Terrorist Communications: Current Information and Trends-Tools, Analysis and Future Directions in Steganalysis in Context with Terrorists and Other Criminals