Bansod et al., 2012 - Google Patents
Modified BPCS steganography using Hybrid cryptography for improving data embedding capacityBansod et al., 2012
- Document ID
- 6430800826562396902
- Author
- Bansod S
- Mane V
- Ragha R
- Publication year
- Publication venue
- 2012 International Conference on Communication, Information & Computing Technology (ICCICT)
External Links
Snippet
In today's information age, information sharing and transfer has increased exponentially. The threat of an intruder accessing the secret information has been an ever existing concern for data communication experts. Cryptography and steganography are the most widely used …
- 238000000034 method 0 abstract description 30
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/04—Masking or blinding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/3232—Robust embedding or watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television, VOD [Video On Demand]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of content streams, manipulating MPEG-4 scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of content streams, manipulating MPEG-4 scene graphs involving video stream encryption
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Bansod et al. | Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity | |
| Xiong et al. | Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansion | |
| Lou et al. | A steganographic scheme for secure communications based on the chaos and Euler theorem | |
| CN109547663B (en) | An Improved LSB Image Steganography Method Combined with Cryptography | |
| Sethi et al. | A proposed novel architecture for information hiding in image steganography by using genetic algorithm and cryptography | |
| Swain et al. | A novel steganography technique by mapping words with LSB array | |
| Phad Vitthal et al. | A novel security scheme for secret data using cryptography and steganography | |
| Chanu et al. | A survey paper on secret image sharing schemes | |
| Schmitz et al. | A new approach to commutative watermarking-encryption | |
| Gladwin et al. | Combined cryptography and steganography for enhanced security in suboptimal images | |
| Maji et al. | Pixel value difference based image steganography with one time pad encryption | |
| Farschi et al. | A novel chaotic approach for information hiding in image | |
| Hegde et al. | Exploring the effectiveness of steganography techniques: A comparative analysis | |
| Geethanjali et al. | Enhanced data encryption in IOT using ECC cryptography and LSB steganography | |
| Rayappan | Pixel indicated triple layer: A way for random image steganography | |
| Manikandan et al. | Steganographic approach to enhancing secure data communication using contours and clustering | |
| CN104702814A (en) | Method for separately storing and recovering (K, N) meaningful images based on triple backup | |
| Banupriya et al. | Video steganography using LSB algorithm for security application | |
| Maiti et al. | Data hiding in images using some efficient steganography techniques | |
| Czaplewski et al. | Digital fingerprinting for color images based on the quaternion encryption scheme | |
| Kukreja et al. | A secure reversible data hiding scheme for digital images using random grid visual secret sharing | |
| Abu-Alhaija | Crypto-Steganographic LSB-based System for AES-Encrypted Data | |
| Gupta et al. | An improved image steganography technique using block division & least significant bit approach | |
| Lalengmawia et al. | Image steganography using advanced encryption standard for implantation of audio/video data | |
| Sirsikar et al. | Analysis of data hiding using digital image signal processing |