[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Muazu et al., 2022 - Google Patents

Secure data hiding and extraction using RSA Algorithm

Muazu et al., 2022

View PDF
Document ID
7503036580608833915
Author
Muazu A
Maiwada U
Garba A
Qabasiyu M
Danyaro K
Publication year
Publication venue
International Conference on Advancements in Interdisciplinary Research

External Links

Snippet

Data hiding and extraction is an important aspect of information security because the data will be safer and more manageable. Data hiding technology that works well produces data that is efficient, secure, and simple to connect. The underlying communication network that …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Similar Documents

Publication Publication Date Title
US11716197B2 (en) System and method for generating a cryptographic key
Abikoye Oluwakemi et al. Efficient data hiding system using cryptography and steganography
Shivani et al. Providing security and privacy to huge and vulnerable songs repository using visual cryptography
Rao et al. A Secured Cloud Architecture for Storing Image Data using Steganography
Muazu et al. Secure data hiding and extraction using RSA Algorithm
Nalavade et al. Deep Neural Network and GAN-Based Reversible Data Hiding in Encrypted Images: A Privacy-Preserving Approach
Gupta et al. Application developed on data hiding using cryptography and steganography
Bhawna et al. Information hiding techniques for cryptography and steganography
Bachiphale et al. A comprehensive review of visual cryptography for enhancing high-security applications
Lee et al. The Usefulness Of Visual Cryptography Techniques: A Literature Review.
Agarwal et al. Encrypted transfer of confidential information using steganography and identity verification using face data
Vasilakis et al. Copyright Protection on Electronic Books: Study and Design of a New Approach
Ahuja et al. Visual chaos steganography with fractional transform
Soomro et al. Private Cloud Hybrid Architecture for Protected Data Communication
Manasi et al. Authentication on interpolated subsampled based image steganography exploiting secret sharing
Suresh et al. Generation of Multi-Layered QR Codes with Efficient Compression
Dhar et al. An efficient and enhanced mechanism for message hiding based on image steganography Using ECC-cryptosystem
Chen et al. An improved privacy protection algorithm for multimodal data fusion
George et al. TripleACrypt: Cryptography and Steganography for the Preservation of Ancient Discoveries
Kiliroor et al. Coalescing Image Steganography and Cryptography for Information Security
Mandhula et al. Secured Messaging Using Image and Video Steganography
Damsika et al. A novel mechanism for secure e-tendering in an open electronic network
Maurya et al. Encryption and Decryption: Unraveling the Intricacies of Data Reliability, Attributed by Incorporating the Usage of Color Code and Pixels
Bembde et al. Data Hiding Using Steganography
Das et al. Towards a novel cross-media encryption-cum-obfuscation technique