[go: up one dir, main page]

Chaudhary et al., 2016 - Google Patents

An elucidation on steganography and cryptography

Chaudhary et al., 2016

Document ID
2640752884634237715
Author
Chaudhary S
Dave M
Sanghi A
Manocha J
Publication year
Publication venue
Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies

External Links

Snippet

Safety measures are the main issue while communication over digital networks, but no one can assure delivery of the right contents as burglars may on the way keeping an eye on the communication. To guard the secret data from stealing, various techniques have been …
Continue reading at dl.acm.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication

Similar Documents

Publication Publication Date Title
Gupta et al. Importance and techniques of information hiding: A review
Pramanik et al. Signature image hiding in color image using steganography and cryptography based on digital signature concepts
Kabetta et al. Information hiding in CSS: a secure scheme text-steganography using public key cryptosystem
US20130262864A1 (en) Method and system for supporting secure documents
Kaur et al. Digital watermarking and other data hiding techniques
CN104993923A (en) Radar data protection method based on combination of information hiding and encryption techniques
Sharma et al. A study on integrating crypto-stego techniques to minimize the distortion
Chaudhary et al. An elucidation on steganography and cryptography
Suresh et al. Document Security within Institutions Using Image Steganography Technique
Zaynalov et al. Features of using invisible signs in the word environment for hiding data
CN102571323A (en) Non-standard character repertoire processing method and device, and system adopting same
Mohammed A new approach to hide texts into images and audio files using steganography and cryptography techniques
Saraswat et al. A review of digital image steganography
Raj et al. Design and Implementation of Visual Cryptography scheme
Samphaiboon Steganography via running short text messages
Rao et al. A novel information security scheme using cryptic steganography
CN118761432B (en) Anti-counterfeiting code generation method, anti-counterfeiting code decoding method and device
Waghmare et al. A Methods of Medical Image Security Using Visual-Cryptography Techniques
Chunduru et al. Hiding in the Plain Text: A Critical Analysis of Whitespace Steganography
Alsayih et al. A Steganography Least Signification Bits (Lsb) Technique for Hide Text Data Encryption Within Image
Michael et al. A cost effective image steganography application for document security
Lathigara Using cryptography and image steganography to securely transfer data.(REPORT)
Pousia et al. Optimacy of Secured Data Transmission in Medical Application Based on a Steganographic Key Algorithm
Venumula et al. High Data Security Using Asymmetric Key Cryptography and Linguistic Method Steganography
Singha et al. A New Stegano-Cryptographic Approach for Enhancing Text Data Communication Security