Thakkar et al., 2017 - Google Patents
Video steganography using encrypted payload for satellite communicationThakkar et al., 2017
View PDF- Document ID
- 2673058807643145296
- Author
- Thakkar S
- Shivdikar K
- Warty C
- Publication year
- Publication venue
- 2017 IEEE Aerospace Conference
External Links
Snippet
In November 2014, a massive cyber-attack on a major company leaked sensitive data including thousands of personal records. Despite the fact that a lot of research and development has gone in the past decade to develop robust encryption algorithms, hackers …
- 238000004891 communication 0 title abstract description 41
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/169—Systems operating in the time domain of the television signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bloisi et al. | Image based steganography and cryptography. | |
Aung et al. | A novel secure combination technique of steganography and cryptography | |
Morkel | Image steganography applications for secure communication | |
Gutte et al. | Steganography for two and three LSBs using extended substitution algorithm | |
Osman et al. | Hybrid multistage framework for data manipulation by combining cryptography and steganography | |
Abdul-Hussein et al. | Secured Transfer and Storage Image Data for Cloud Communications. | |
Sharma et al. | A study on integrating crypto-stego techniques to minimize the distortion | |
Jain et al. | Secret data transmission using vital image steganography over transposition cipher | |
Dongare et al. | An efficient technique for image encryption and decryption for secured multimedia application | |
Thakkar et al. | Video steganography using encrypted payload for satellite communication | |
AA et al. | New image steganography method using zero order hold zooming | |
Mohamed et al. | A new image encryption scheme based on the hybridization of Lorenz Chaotic map and Fibonacci Q-matrix | |
Banupriya et al. | Video steganography using LSB algorithm for security application | |
Zeeshan et al. | A review study on unique way of information hiding: Steganography | |
Al-Kadei | Robust video data security using hybrid cryptography-steganography technique | |
Waziri et al. | Steganography and its applications in information dessimilation on the web using images as security embeddment: a wavelet approach | |
Harshini et al. | Enhanced security with crystography using AES and LSB | |
Sharma et al. | A Review of Image Steganography Techniques: Development Trends to Enhance Performance. | |
Saraireh et al. | Integration of hash-crypto-steganography for efficient security technique | |
Hegde et al. | Exploring the Effectiveness of Steganography Techniques: A Comparative Analysis | |
Prasad et al. | A Novel Secured RGB LSB Steganography with Enhanced Stego-Image Quality | |
Gaikwad et al. | Color Image Restoration for an Effective Steganography | |
Rodrigues et al. | Pixel and Block Permutation on Combinations of Bit Planes with LSB Steganography | |
Eseyin | Enhanced Asymmetric Data Encryption Algorithms Using Residue Number System and Steganography | |
Hassan | Chaotic Function Secured Message Steganography in Edge–Detected Pixels of 3D Images |