Rejani et al., 2013 - Google Patents
STEGANODB-A Secure Database using SteganographyRejani et al., 2013
View PDF- Document ID
- 17670047854405321245
- Author
- Rejani R
- Murugan D
- Krishnan D
- Publication year
- Publication venue
- ICTACT Journal on Communication Technology
External Links
Snippet
The safety of data and communications for both organizations and personal purposes which at the same time is easy to maintain and having less overhead on system resources is a very important issue. This paper presents a new/alternate secure Database system based on …
- 238000000034 method 0 abstract description 18
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Pandey et al. | A reliable transmission and extraction of textual information using keyless encryption, steganography, and deep algorithm with cuckoo optimization | |
Li et al. | Data hiding in iris image for privacy protection | |
Yahya et al. | Introduction to steganography | |
Wang et al. | Reversible AMBTC-based data hiding with security improvement by chaotic encryption | |
Gao et al. | High-performance reversible data hiding in encrypted images with adaptive Huffman code | |
Rejani et al. | STEGANODB-A Secure Database using Steganography | |
Agarwal et al. | Encrypted transfer of confidential information using steganography and identity verification using face data | |
Suneetha et al. | Enhancement of Security for Cloud Data Using Partition-Based Steganography | |
Hassan et al. | The most common characteristics of fragile video watermarking | |
Chinniyan et al. | Image Steganography Using Deep Neural Networks. | |
Lafta et al. | Secure Content-Based Image Retrieval with Copyright Protection within Cloud Computing Environment. | |
Mahasree et al. | An improved reversible data hiding for encrypted images over cloud | |
Deepthi et al. | Pre Encryption Data Hiding Techniques using Reserving Room Approach | |
Nalavade et al. | Deep Neural Network and GAN-Based Reversible Data Hiding in Encrypted Images: A Privacy-Preserving Approach | |
Jan et al. | Realization of Efficient Steganographic Scheme Using Hybrid Edge Detection and Chaos | |
Shawkat et al. | Evolutionary programming approach for securing medical images using genetic algorithm and standard deviation | |
Bhuva et al. | An Analysis of Effectiveness of StegoAppDB and Data Hiding Efficiency of StegHide Image Steganography Tools | |
Xu et al. | Content security protection for remote sensing images integrating selective content encryption and digital fingerprint | |
Kumar et al. | Hiding the text messages of variable size using encryption and decryption algorithms in image steganography | |
Nikam et al. | Design and Implementation of Efficient Transmission of Cloud Data in Wireless Media | |
Rao et al. | A novel information security scheme using cryptic steganography | |
Jana et al. | Voronoi Diagrams Based Digital Tattoo for Multimedia Data Protection | |
Sameerunnisa et al. | A Brief Analysis on Video Compression and Deduplication Models Using Video Steganography with Optimised Feature Extraction Techniques for Integrity Preservation | |
Adam et al. | Multi-level Data Security Using Video Steganography | |
Sarkar et al. | A Study on Hiding Internet of Things (IoT) Communication |