[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Thakkar et al., 2017 - Google Patents

Video steganography using encrypted payload for satellite communication

Thakkar et al., 2017

View PDF
Document ID
2673058807643145296
Author
Thakkar S
Shivdikar K
Warty C
Publication year
Publication venue
2017 IEEE Aerospace Conference

External Links

Snippet

In November 2014, a massive cyber-attack on a major company leaked sensitive data including thousands of personal records. Despite the fact that a lot of research and development has gone in the past decade to develop robust encryption algorithms, hackers …
Continue reading at wiki.kaustubh.us (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/169Systems operating in the time domain of the television signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • H04N2201/3236Details of authentication information generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity

Similar Documents

Publication Publication Date Title
Bloisi et al. Image based steganography and cryptography.
Aung et al. A novel secure combination technique of steganography and cryptography
Morkel Image steganography applications for secure communication
Gutte et al. Steganography for two and three LSBs using extended substitution algorithm
Osman et al. Hybrid multistage framework for data manipulation by combining cryptography and steganography
Abdul-Hussein et al. Secured Transfer and Storage Image Data for Cloud Communications.
Sharma et al. A study on integrating crypto-stego techniques to minimize the distortion
Jain et al. Secret data transmission using vital image steganography over transposition cipher
Dongare et al. An efficient technique for image encryption and decryption for secured multimedia application
Thakkar et al. Video steganography using encrypted payload for satellite communication
AA et al. New image steganography method using zero order hold zooming
Mohamed et al. A new image encryption scheme based on the hybridization of Lorenz Chaotic map and Fibonacci Q-matrix
Banupriya et al. Video steganography using LSB algorithm for security application
Zeeshan et al. A review study on unique way of information hiding: Steganography
Al-Kadei Robust video data security using hybrid cryptography-steganography technique
Waziri et al. Steganography and its applications in information dessimilation on the web using images as security embeddment: a wavelet approach
Harshini et al. Enhanced security with crystography using AES and LSB
Sharma et al. A Review of Image Steganography Techniques: Development Trends to Enhance Performance.
Saraireh et al. Integration of hash-crypto-steganography for efficient security technique
Hegde et al. Exploring the Effectiveness of Steganography Techniques: A Comparative Analysis
Prasad et al. A Novel Secured RGB LSB Steganography with Enhanced Stego-Image Quality
Gaikwad et al. Color Image Restoration for an Effective Steganography
Rodrigues et al. Pixel and Block Permutation on Combinations of Bit Planes with LSB Steganography
Eseyin Enhanced Asymmetric Data Encryption Algorithms Using Residue Number System and Steganography
Hassan Chaotic Function Secured Message Steganography in Edge–Detected Pixels of 3D Images