Chaudhary et al., 2016 - Google Patents
An elucidation on steganography and cryptographyChaudhary et al., 2016
- Document ID
- 2640752884634237715
- Author
- Chaudhary S
- Dave M
- Sanghi A
- Manocha J
- Publication year
- Publication venue
- Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
External Links
Snippet
Safety measures are the main issue while communication over digital networks, but no one can assure delivery of the right contents as burglars may on the way keeping an eye on the communication. To guard the secret data from stealing, various techniques have been …
- 238000000034 method 0 abstract description 13
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Gupta et al. | Importance and techniques of information hiding: A review | |
| Pramanik et al. | Signature image hiding in color image using steganography and cryptography based on digital signature concepts | |
| Kabetta et al. | Information hiding in CSS: a secure scheme text-steganography using public key cryptosystem | |
| US20130262864A1 (en) | Method and system for supporting secure documents | |
| Kaur et al. | Digital watermarking and other data hiding techniques | |
| CN104993923A (en) | Radar data protection method based on combination of information hiding and encryption techniques | |
| Sharma et al. | A study on integrating crypto-stego techniques to minimize the distortion | |
| Chaudhary et al. | An elucidation on steganography and cryptography | |
| Suresh et al. | Document Security within Institutions Using Image Steganography Technique | |
| Zaynalov et al. | Features of using invisible signs in the word environment for hiding data | |
| CN102571323A (en) | Non-standard character repertoire processing method and device, and system adopting same | |
| Mohammed | A new approach to hide texts into images and audio files using steganography and cryptography techniques | |
| Saraswat et al. | A review of digital image steganography | |
| Raj et al. | Design and Implementation of Visual Cryptography scheme | |
| Samphaiboon | Steganography via running short text messages | |
| Rao et al. | A novel information security scheme using cryptic steganography | |
| CN118761432B (en) | Anti-counterfeiting code generation method, anti-counterfeiting code decoding method and device | |
| Waghmare et al. | A Methods of Medical Image Security Using Visual-Cryptography Techniques | |
| Chunduru et al. | Hiding in the Plain Text: A Critical Analysis of Whitespace Steganography | |
| Alsayih et al. | A Steganography Least Signification Bits (Lsb) Technique for Hide Text Data Encryption Within Image | |
| Michael et al. | A cost effective image steganography application for document security | |
| Lathigara | Using cryptography and image steganography to securely transfer data.(REPORT) | |
| Pousia et al. | Optimacy of Secured Data Transmission in Medical Application Based on a Steganographic Key Algorithm | |
| Venumula et al. | High Data Security Using Asymmetric Key Cryptography and Linguistic Method Steganography | |
| Singha et al. | A New Stegano-Cryptographic Approach for Enhancing Text Data Communication Security |