Sendhooran et al., 2021 - Google Patents
Data Hiding with Encrypted Multi Secret Sharing using Modified LSB TechniqueSendhooran et al., 2021
View PDF- Document ID
- 5737438772771282995
- Author
- Sendhooran A
- Latha R
- Publication year
- Publication venue
- International Journal of Engineering Research & Technology (IJERT)
External Links
Snippet
Stegnography is a mechanism which ensures that the presence of the secret data remains undetected. Two types of secure data hiding techniques are popular, they are cryptography and steganography. Where cryptography is form of writing secret code for input message …
- 238000000034 method 0 title abstract description 42
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Manohar et al. | Data encryption & decryption using steganography | |
CN109547663A (en) | A kind of improvement LSB image latent writing method of combining cipher | |
Salim et al. | Hide text in an image using Blowfish algorithm and development of least significant bit technique | |
Saini et al. | MEVSS: modulo encryption based visual secret sharing scheme for securing visual content | |
Nalavade et al. | Deep Neural Network and GAN-Based Reversible Data Hiding in Encrypted Images: A Privacy-Preserving Approach | |
Ghadi et al. | Enhanced payload volume in the least significant bits image steganography using hash function | |
Sendhooran et al. | Data Hiding with Encrypted Multi Secret Sharing using Modified LSB Technique | |
Mohammed | A new approach to hide texts into images and audio files using steganography and cryptography techniques | |
Rajkamal et al. | Image and Text Hiding using RSA & Blowfish Algorithms with Hash-Lsb Technique | |
Deshmukh et al. | An Effective High Level Capacity Reversible Data Hiding in Encrypted Images | |
Ediriweera et al. | Web-Based Data Hiding: A Hybrid Approach Using Steganography and Visual Cryptography | |
Vinodkumar et al. | A Novel Data Embedding Technique for Hiding Text in Video File using Steganography | |
Ahmed et al. | Comprehensive Review of Cryptography and Steganography Algorithms | |
Kumar et al. | Randomized salt LSB: a novel approach to steganography with improved concealment and robustness | |
Yadav et al. | A hybrid approach to metamorphic cryptography using KIMLA and DNA concept | |
Shrimali et al. | Fast hash-based high secure hiding technique for digital data security | |
Harsoor et al. | Reversible data hiding in encrypted image | |
Dilipkumar et al. | Efficient Data Hiding with LZW Compression and ECC Encryption for Secure Secret Sharing | |
Chang | Privacy-preserving information hiding and its applications | |
Avishek et al. | Understanding Multimedia Security | |
Patil et al. | Enhancing Security Through Dual Layer Techniques for Encrypting Text Messages Within Images Using LSB Image Steganography and AES Encryption Algorithms | |
Mohammed et al. | An Efficient Methodology for Encrypting Audio Data by Combining Rijndael and Steganography Algorithms | |
Mandal et al. | Securing the Information Using Combined Method | |
Mohamad | Data hiding by using AES Algorithm | |
Sawant et al. | Sound Secret Audio Crypt—LSB-Based Audio Steganography Using RSA |