[go: up one dir, main page]

YU et al., 2023 - Google Patents

LH StegTool for company Lian Heng Management

YU et al., 2023

View PDF
Document ID
28721706269672420
Author
YU J
Rahim N
Publication year
Publication venue
Applied Information Technology And Computer Science

External Links

Snippet

LH StegTool is an image steganography tool that allows Lian Heng (LH) Management two in- charge employees to conceal sensitive information within images. Steganography is a technique used to concealing information with various medium such as images, videos …
Continue reading at publisher.uthm.edu.my (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Similar Documents

Publication Publication Date Title
US8578473B2 (en) Systems and methods for information security using one-time pad
Rachmawanto et al. A performance analysis StegoCrypt algorithm based on LSB-AES 128 bit in various image size
GNDU RC Dual layer security of data using LSB image steganography method and AES encryption algorithm
Abdul Hussien et al. [Retracted] A Secure Environment Using a New Lightweight AES Encryption Algorithm for E‐Commerce Websites
Sunday et al. An efficient data protection for cloud storage through encryption
Jain et al. Secret data transmission using vital image steganography over transposition cipher
Sofian et al. LSB steganography and AES encryption for multiple PDF documents
US8473516B2 (en) Computer storage apparatus for multi-tiered data security
Wijaya et al. Time-based steganography image with dynamic encryption key generation
US20100246817A1 (en) System for data security using user selectable one-time pad
YU et al. LH StegTool for company Lian Heng Management
Mohammed A new approach to hide texts into images and audio files using steganography and cryptography techniques
Vasilakis et al. Copyright Protection on Electronic Books: Study and Design of a New Approach
Ahuja et al. Dual layer secured password manager using Blowfish and LSB
Prakash et al. I/O Steganography for Audio and Images in Secure Data Transmission
Desai et al. Crypto‐Stego‐Real‐Time (CSRT) System for Secure Reversible Data Hiding
ElSaid Securing Sensitive Digital Data in Educational Institutions using Encryption Technology
Jeyabalu et al. Hybridization of ICBC and genetic algorithm for optimizing encryption process in cloud computing application service
Isewon et al. Implementation of a File Encryption Software “Hyde” using RIJNDAEL Algorithm (AES)
AlSideiri et al. Cybersecurity Enhancement through Hybrid Encryption: Combining RSA and Vigenère Algorithms in the Cypher-X System
Bistarelli et al. A Preliminary Study on the Creation of a Covert Channel with HTTP Headers
Liu Software protection with encryption and verification
Parekh Using AES Encryption to Securely Embed Data in Video Files
Patil et al. Enhancing Security Through Dual Layer Techniques for Encrypting Text Messages Within Images Using LSB Image Steganography and AES Encryption Algorithms
Prakash et al. Cryptography machine: Encryption and decryption model for multimedia data