[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Prasetyadi et al., 2018 - Google Patents

File encryption and hiding application based on AES and append insertion steganography

Prasetyadi et al., 2018

View PDF
Document ID
17069089553851527328
Author
Prasetyadi G
Refianti R
Mutiara A
Publication year
Publication venue
TELKOMNIKA (Telecommunication Computing Electronics and Control)

External Links

Snippet

Steganography is a method of hiding secret message in other innocuous looking object so that its presence is not revealed. In this paper, a message, which is a computer file of any type and size, is hidden in a selected cover or carrier, which is a computer file of certain …
Continue reading at telkomnika.uad.ac.id (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0637Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/28Cryptographic mechanisms or cryptographic arrangements for secret or secure communication using particular encryption algorithm
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Similar Documents

Publication Publication Date Title
CN107809644B (en) A Double Encryption Method for Reversible Data Hiding of Encrypted Domain Image
Prasetyadi et al. File encryption and hiding application based on AES and append insertion steganography
Prasetyadi et al. File encryption and hiding application based on advanced encryption standard (AES) and append insertion steganography method
AU2005255946C1 (en) Systems and methods for digital content security
Atee et al. Cryptography and image steganography using dynamic encryption on LSB and color image based data hiding
Juneja et al. Data hiding with enhanced LSB steganography and cryptography for RGB color images
Khalil Image steganography: hiding short audio messages withidin digital images
Srivastava et al. Design and implementation of crypto based water marking techniques for EHR security
Abu-Alhaija Crypto-Steganographic LSB-based System for AES-Encrypted Data
Dhane et al. A novel high capacity reversible data hiding through encryption scheme by permuting encryption key and entropy analysis
Hegde et al. Exploring the Effectiveness of Steganography Techniques: A Comparative Analysis
Alenizi et al. A Review of Image Steganography Based on Multiple Hashing Algorithm.
Haider et al. Enhanced model for data security in cyber space using combined steganographic and encryption techniques
Rao et al. A novel information security scheme using cryptic steganography
Nehra et al. Review Paper On Image Based Steganography
Vinodkumar et al. A Novel Data Embedding Technique for Hiding Text in Video File using Steganography
Jain A review on different types of cryptography techniques “should be replaced by” exploring the potential of steganography in the modern era
Parekh Using AES Encryption to Securely Embed Data in Video Files
Amin et al. Implementation of Steganographic Techniques and its Detection.
Balodi et al. Enhancing Data Security in Networking Through AES Encryption and Steganography: A Comparative Analysis of DES and AES Algorithms
Tamezheneal et al. Secure Data Transmission Using Steganography by AES AlgorithmTitle
Allasasmh et al. Integrated Approaches to Steganography: Embedding Static Information Across Audio, Visual, and Textual Formats
Gedam et al. Image Watermarking Using QR Code
Hussein StegoCrypt: Geometric and Rudin–Shapiro Sequence–Based Bit–Cycling and 3DES
Bhatt et al. 3D-CRYPTOGRAPHY