[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

AlKhafaji et al., 2020 - Google Patents

Improved technique for hiding data in a colored and a monochrome image

AlKhafaji et al., 2020

View PDF
Document ID
2823222628422525709
Author
AlKhafaji B
Salih M
Shnain S
Nabat Z
Publication year
Publication venue
Periodicals of Engineering and Natural Sciences (PEN)

External Links

Snippet

Find a new way to hide the different types of confidential and important text files inside the images without noticing any change or distortion of the information in the images after the process of concealment or attempt to be detected by hackers. And then extract these texts …
Continue reading at core.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T11/002D [Two Dimensional] image generation
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09GARRANGEMENTS OR CIRCUITS FOR CONTROL OF INDICATING DEVICES USING STATIC MEANS TO PRESENT VARIABLE INFORMATION
    • G09G5/00Control arrangements or circuits for visual indicators common to cathode-ray tube indicators and other visual indicators
    • G09G5/02Control arrangements or circuits for visual indicators common to cathode-ray tube indicators and other visual indicators characterised by the way in which colour is displayed

Similar Documents

Publication Publication Date Title
Rustad et al. Inverted LSB image steganography using adaptive pattern to improve imperceptibility
Kabulov et al. Algorithmic method of security of the Internet of Things based on steganographic coding
CN109767375B (en) Image watermark embedding and tracing method and system
Rawat et al. A steganography technique for hiding image in an image using lsb method for 24 bit color image
Abdullah et al. New approaches to encrypt and decrypt data in image using cryptography and steganography algorithm
Wang et al. Cross-plane multi-image encryption using chaos and blurred pixels
Philjon et al. Metamorphic cryptography—A paradox between cryptography and steganography using dynamic encryption
JP5443299B2 (en) Information transmission / reception system and information transmission / reception method
AlKhafaji et al. Improved technique for hiding data in a colored and a monochrome image
Maisa'a Abid Ali et al. Dual method cryptography image by two force secure and steganography secret message in IoT
Sherine et al. CMY Color Spaced‐Based Visual Cryptography Scheme for Secret Sharing of Data
Veerashetty Secure communication over wireless sensor network using image steganography with generative adversarial networks
CN110069907A (en) Big data source tracing method and system based on digital watermarking
Por et al. StegCure: a comprehensive steganographic tool using enhanced LSB scheme
US20160189015A1 (en) Data exchange methods, systems and apparatus using color images
Srikanth et al. Advanced Data Security Using Modulo Operator And LSB Method
Osman et al. Text Steganography Using the Second Quotient Remainder Theorem and Dark Colour Schemes
Anam et al. Random pixel embedding for hiding secret text over video file
Tyagi et al. Multilevel steganography for data protection
Munasinghe et al. Video steganography
Sulema Image protection method based on binary operations
Shamsi et al. Securing Secret Information
Ali Enhancing SMM Image Steganography Method by using LSBraille Image Steganography Method (SMMWB; Secret Message Matching With Braille)
CN115834239B (en) Information security processing system and method based on cryptographic algorithm
Azooz et al. A novel steganography scheme using logistic map, brisk descriptor, and k-means clustering