[go: up one dir, main page]

Sendhooran et al., 2021 - Google Patents

Data Hiding with Encrypted Multi Secret Sharing using Modified LSB Technique

Sendhooran et al., 2021

View PDF
Document ID
5737438772771282995
Author
Sendhooran A
Latha R
Publication year
Publication venue
International Journal of Engineering Research & Technology (IJERT)

External Links

Snippet

Stegnography is a mechanism which ensures that the presence of the secret data remains undetected. Two types of secure data hiding techniques are popular, they are cryptography and steganography. Where cryptography is form of writing secret code for input message …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/12Details relating to cryptographic hardware or logic circuitry
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/04Masking or blinding
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication

Similar Documents

Publication Publication Date Title
Manohar et al. Data encryption & decryption using steganography
CN109547663A (en) A kind of improvement LSB image latent writing method of combining cipher
Salim et al. Hide text in an image using Blowfish algorithm and development of least significant bit technique
Saini et al. MEVSS: modulo encryption based visual secret sharing scheme for securing visual content
Nalavade et al. Deep Neural Network and GAN-Based Reversible Data Hiding in Encrypted Images: A Privacy-Preserving Approach
Ghadi et al. Enhanced payload volume in the least significant bits image steganography using hash function
Sendhooran et al. Data Hiding with Encrypted Multi Secret Sharing using Modified LSB Technique
Mohammed A new approach to hide texts into images and audio files using steganography and cryptography techniques
Rajkamal et al. Image and Text Hiding using RSA & Blowfish Algorithms with Hash-Lsb Technique
Deshmukh et al. An Effective High Level Capacity Reversible Data Hiding in Encrypted Images
Ediriweera et al. Web-Based Data Hiding: A Hybrid Approach Using Steganography and Visual Cryptography
Vinodkumar et al. A Novel Data Embedding Technique for Hiding Text in Video File using Steganography
Ahmed et al. Comprehensive Review of Cryptography and Steganography Algorithms
Kumar et al. Randomized salt LSB: a novel approach to steganography with improved concealment and robustness
Yadav et al. A hybrid approach to metamorphic cryptography using KIMLA and DNA concept
Shrimali et al. Fast hash-based high secure hiding technique for digital data security
Harsoor et al. Reversible data hiding in encrypted image
Dilipkumar et al. Efficient Data Hiding with LZW Compression and ECC Encryption for Secure Secret Sharing
Chang Privacy-preserving information hiding and its applications
Avishek et al. Understanding Multimedia Security
Patil et al. Enhancing Security Through Dual Layer Techniques for Encrypting Text Messages Within Images Using LSB Image Steganography and AES Encryption Algorithms
Mohammed et al. An Efficient Methodology for Encrypting Audio Data by Combining Rijndael and Steganography Algorithms
Mandal et al. Securing the Information Using Combined Method
Mohamad Data hiding by using AES Algorithm
Sawant et al. Sound Secret Audio Crypt—LSB-Based Audio Steganography Using RSA