Prakash et al., 2023 - Google Patents
I/O steganography for audio and images in secure data transmissionPrakash et al., 2023
- Document ID
- 956559172157177593
- Author
- Prakash A
- Mugundhan M
- Keerthivasan U
- Uma Makesan A
- et al.
- Publication year
- Publication venue
- 2023 3rd International Conference on Pervasive Computing and Social Networking (ICPCSN)
External Links
Snippet
There are several uses for information concealing today. The use of data hiding knowledge may be morally or immorally acceptable. Data hiding methods, however, are difficult to classify into either the steganography or the watermarking categories because there is no …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Khan et al. | IMG‐forensics: Multimedia‐enabled information hiding investigation using convolutional neural network | |
| Rachmawanto et al. | A performance analysis StegoCrypt algorithm based on LSB-AES 128 bit in various image size | |
| Ntalianis et al. | Remote authentication via biometrics: A robust video-object steganographic mechanism over wireless networks | |
| Nunna et al. | Secure data transfer through internet using cryptography and image steganography | |
| Khedr | A new efficient and configurable image encryption structure for secure transmission | |
| Yahaya et al. | Cryptosystem for secure data transmission using Advance Encryption Standard (AES) and Steganography | |
| Anwar et al. | Stegocrypt scheme using LSB-AES base64 | |
| Hegde et al. | Exploring the effectiveness of steganography techniques: A comparative analysis | |
| Kedia et al. | Analysis and implementation of image steganography by using AES algorithm | |
| Jain et al. | Secret data transmission using vital image steganography over transposition cipher | |
| Baby et al. | Combined Strength of Steganography and Cryptography-A Literature Survey. | |
| Osuolale | Secure data transfer over the internet using image cryptosteganography | |
| Hasija et al. | Cryptographic foundations: A Comprehensive review of block cipher and stream cipher concepts | |
| Prakash et al. | I/O steganography for audio and images in secure data transmission | |
| Omego et al. | Multichannel Steganography: A Provably Secure Hybrid Steganographic Model for Secure Communication | |
| Neforawati et al. | Message digest 5 (md-5) decryption application using python-based dictionary attack technique | |
| ENIHE | Information Protection against Security Threats in an Insecure Environment using Cryptography and Steganography | |
| Mohua | A review on the integration of cryptography and steganography for enhanced information security | |
| Sharma et al. | Securing Data: Cryptography and Steganography | |
| Hambali et al. | Cloud Security Using Least Significant Bit Steganography and Data Encryption Standard Algorithm | |
| Patil et al. | Secured and Advanced Image Steganography for Mobile Multimedia Security | |
| Yadav et al. | A hybrid approach to metamorphic cryptography using KIMLA and DNA concept | |
| Karthikeyan et al. | A novel approach in Steganography combining random key and substitution cipher | |
| Parekh | Using AES Encryption to Securely Embed Data in Video Files | |
| Aslam et al. | A Novel Method of Audio Steganography using Advanced Encryption Standard. |