[go: up one dir, main page]

Prakash et al., 2023 - Google Patents

I/O steganography for audio and images in secure data transmission

Prakash et al., 2023

Document ID
956559172157177593
Author
Prakash A
Mugundhan M
Keerthivasan U
Uma Makesan A
et al.
Publication year
Publication venue
2023 3rd International Conference on Pervasive Computing and Social Networking (ICPCSN)

External Links

Snippet

There are several uses for information concealing today. The use of data hiding knowledge may be morally or immorally acceptable. Data hiding methods, however, are difficult to classify into either the steganography or the watermarking categories because there is no …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication

Similar Documents

Publication Publication Date Title
Khan et al. IMG‐forensics: Multimedia‐enabled information hiding investigation using convolutional neural network
Rachmawanto et al. A performance analysis StegoCrypt algorithm based on LSB-AES 128 bit in various image size
Ntalianis et al. Remote authentication via biometrics: A robust video-object steganographic mechanism over wireless networks
Nunna et al. Secure data transfer through internet using cryptography and image steganography
Khedr A new efficient and configurable image encryption structure for secure transmission
Yahaya et al. Cryptosystem for secure data transmission using Advance Encryption Standard (AES) and Steganography
Anwar et al. Stegocrypt scheme using LSB-AES base64
Hegde et al. Exploring the effectiveness of steganography techniques: A comparative analysis
Kedia et al. Analysis and implementation of image steganography by using AES algorithm
Jain et al. Secret data transmission using vital image steganography over transposition cipher
Baby et al. Combined Strength of Steganography and Cryptography-A Literature Survey.
Osuolale Secure data transfer over the internet using image cryptosteganography
Hasija et al. Cryptographic foundations: A Comprehensive review of block cipher and stream cipher concepts
Prakash et al. I/O steganography for audio and images in secure data transmission
Omego et al. Multichannel Steganography: A Provably Secure Hybrid Steganographic Model for Secure Communication
Neforawati et al. Message digest 5 (md-5) decryption application using python-based dictionary attack technique
ENIHE Information Protection against Security Threats in an Insecure Environment using Cryptography and Steganography
Mohua A review on the integration of cryptography and steganography for enhanced information security
Sharma et al. Securing Data: Cryptography and Steganography
Hambali et al. Cloud Security Using Least Significant Bit Steganography and Data Encryption Standard Algorithm
Patil et al. Secured and Advanced Image Steganography for Mobile Multimedia Security
Yadav et al. A hybrid approach to metamorphic cryptography using KIMLA and DNA concept
Karthikeyan et al. A novel approach in Steganography combining random key and substitution cipher
Parekh Using AES Encryption to Securely Embed Data in Video Files
Aslam et al. A Novel Method of Audio Steganography using Advanced Encryption Standard.