YU et al., 2023 - Google Patents
LH StegTool for company Lian Heng ManagementYU et al., 2023
View PDF- Document ID
- 28721706269672420
- Author
- YU J
- Rahim N
- Publication year
- Publication venue
- Applied Information Technology And Computer Science
External Links
Snippet
LH StegTool is an image steganography tool that allows Lian Heng (LH) Management two in- charge employees to conceal sensitive information within images. Steganography is a technique used to concealing information with various medium such as images, videos …
- 238000000034 method 0 abstract description 65
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8578473B2 (en) | Systems and methods for information security using one-time pad | |
Rachmawanto et al. | A performance analysis StegoCrypt algorithm based on LSB-AES 128 bit in various image size | |
GNDU RC | Dual layer security of data using LSB image steganography method and AES encryption algorithm | |
Abdul Hussien et al. | [Retracted] A Secure Environment Using a New Lightweight AES Encryption Algorithm for E‐Commerce Websites | |
Sunday et al. | An efficient data protection for cloud storage through encryption | |
Jain et al. | Secret data transmission using vital image steganography over transposition cipher | |
Sofian et al. | LSB steganography and AES encryption for multiple PDF documents | |
US8473516B2 (en) | Computer storage apparatus for multi-tiered data security | |
Wijaya et al. | Time-based steganography image with dynamic encryption key generation | |
US20100246817A1 (en) | System for data security using user selectable one-time pad | |
YU et al. | LH StegTool for company Lian Heng Management | |
Mohammed | A new approach to hide texts into images and audio files using steganography and cryptography techniques | |
Vasilakis et al. | Copyright Protection on Electronic Books: Study and Design of a New Approach | |
Ahuja et al. | Dual layer secured password manager using Blowfish and LSB | |
Prakash et al. | I/O Steganography for Audio and Images in Secure Data Transmission | |
Desai et al. | Crypto‐Stego‐Real‐Time (CSRT) System for Secure Reversible Data Hiding | |
ElSaid | Securing Sensitive Digital Data in Educational Institutions using Encryption Technology | |
Jeyabalu et al. | Hybridization of ICBC and genetic algorithm for optimizing encryption process in cloud computing application service | |
Isewon et al. | Implementation of a File Encryption Software “Hyde” using RIJNDAEL Algorithm (AES) | |
AlSideiri et al. | Cybersecurity Enhancement through Hybrid Encryption: Combining RSA and Vigenère Algorithms in the Cypher-X System | |
Bistarelli et al. | A Preliminary Study on the Creation of a Covert Channel with HTTP Headers | |
Liu | Software protection with encryption and verification | |
Parekh | Using AES Encryption to Securely Embed Data in Video Files | |
Patil et al. | Enhancing Security Through Dual Layer Techniques for Encrypting Text Messages Within Images Using LSB Image Steganography and AES Encryption Algorithms | |
Prakash et al. | Cryptography machine: Encryption and decryption model for multimedia data |