Muazu et al., 2022 - Google Patents
Secure data hiding and extraction using RSA AlgorithmMuazu et al., 2022
View PDF- Document ID
- 7503036580608833915
- Author
- Muazu A
- Maiwada U
- Garba A
- Qabasiyu M
- Danyaro K
- Publication year
- Publication venue
- International Conference on Advancements in Interdisciplinary Research
External Links
Snippet
Data hiding and extraction is an important aspect of information security because the data will be safer and more manageable. Data hiding technology that works well produces data that is efficient, secure, and simple to connect. The underlying communication network that …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11716197B2 (en) | System and method for generating a cryptographic key | |
Abikoye Oluwakemi et al. | Efficient data hiding system using cryptography and steganography | |
Shivani et al. | Providing security and privacy to huge and vulnerable songs repository using visual cryptography | |
Rao et al. | A Secured Cloud Architecture for Storing Image Data using Steganography | |
Muazu et al. | Secure data hiding and extraction using RSA Algorithm | |
Nalavade et al. | Deep Neural Network and GAN-Based Reversible Data Hiding in Encrypted Images: A Privacy-Preserving Approach | |
Gupta et al. | Application developed on data hiding using cryptography and steganography | |
Bhawna et al. | Information hiding techniques for cryptography and steganography | |
Bachiphale et al. | A comprehensive review of visual cryptography for enhancing high-security applications | |
Lee et al. | The Usefulness Of Visual Cryptography Techniques: A Literature Review. | |
Agarwal et al. | Encrypted transfer of confidential information using steganography and identity verification using face data | |
Vasilakis et al. | Copyright Protection on Electronic Books: Study and Design of a New Approach | |
Ahuja et al. | Visual chaos steganography with fractional transform | |
Soomro et al. | Private Cloud Hybrid Architecture for Protected Data Communication | |
Manasi et al. | Authentication on interpolated subsampled based image steganography exploiting secret sharing | |
Suresh et al. | Generation of Multi-Layered QR Codes with Efficient Compression | |
Dhar et al. | An efficient and enhanced mechanism for message hiding based on image steganography Using ECC-cryptosystem | |
Chen et al. | An improved privacy protection algorithm for multimodal data fusion | |
George et al. | TripleACrypt: Cryptography and Steganography for the Preservation of Ancient Discoveries | |
Kiliroor et al. | Coalescing Image Steganography and Cryptography for Information Security | |
Mandhula et al. | Secured Messaging Using Image and Video Steganography | |
Damsika et al. | A novel mechanism for secure e-tendering in an open electronic network | |
Maurya et al. | Encryption and Decryption: Unraveling the Intricacies of Data Reliability, Attributed by Incorporating the Usage of Color Code and Pixels | |
Bembde et al. | Data Hiding Using Steganography | |
Das et al. | Towards a novel cross-media encryption-cum-obfuscation technique |