John Justin et al., 2012 - Google Patents
A survey on various encryption techniquesJohn Justin et al., 2012
View PDF- Document ID
- 16047259962304346318
- Author
- John Justin M
- Manimurugan S
- Publication year
- Publication venue
- International Journal of Soft Computing and Engineering (IJSCE) ISSN
External Links
Snippet
This paper focuses mainly on the different kinds of encryption techniques that are existing, and framing all the techniques together as a literature survey. Aim an extensive experimental study of implementations of various available encryption techniques. Also …
- 238000000034 method 0 title abstract description 71
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
John Justin et al. | A survey on various encryption techniques | |
Ntalianis et al. | Remote authentication via biometrics: A robust video-object steganographic mechanism over wireless networks | |
Soleymani et al. | A survey on principal aspects of secure image transmission | |
Hua et al. | Matrix-based secret sharing for reversible data hiding in encrypted images | |
Madhu et al. | An overview of image security techiques | |
Yang et al. | A visually meaningful image encryption scheme based on lossless compression spiht coding | |
Dongare et al. | An efficient technique for image encryption and decryption for secured multimedia application | |
Fkirin et al. | Two-level security approach combining watermarking and encryption for securing critical colored images | |
Parekh et al. | Multilayer symmetric and asymmetric technique for audiovisual cryptography | |
Kumar et al. | An efficient and effective lossless symmetric key cryptography algorithm for an image | |
Naidu et al. | Multilayer security in protecting and hiding multimedia data using cryptography and steganography techniques | |
Hussein et al. | Protection of images by combination of vernam stream cipher, AES, and LSB steganography in a video clip | |
Jan et al. | Logistic map-based image steganography using edge detection | |
CN113344762B (en) | Double scrambling image encryption method based on AFD adaptive decomposition | |
Waziri et al. | Steganography and its applications in information dessimilation on the web using images as security embeddment: a wavelet approach | |
QASSIM et al. | Information Security with Image through Reversible Room by using Advanced Encryption Standard and Least Significant Bit Algorithm | |
Radke et al. | Review of Image Security Approaches: Concepts, issues, challenges and applications | |
Chinniyan et al. | Image Steganography Using Deep Neural Networks. | |
Divya et al. | Privacy preservation mechanism for the data used in image authentication | |
Deepthi et al. | Pre Encryption Data Hiding Techniques using Reserving Room Approach | |
Ayoob et al. | A new method for watermarking color images using virtual hiding and El-Gamal ciphering | |
Kaur et al. | Steganography using RSA algorithm | |
Abdelmged et al. | A Combined approach of steganography and cryptography technique based on parity checker and huffman encoding | |
Yadav et al. | A hybrid approach to metamorphic cryptography using KIMLA and DNA concept | |
Hua et al. | Secure reversible data hiding in encrypted images using cipher-feedback secret sharing |