AlKhafaji et al., 2020 - Google Patents
Improved technique for hiding data in a colored and a monochrome imageAlKhafaji et al., 2020
View PDF- Document ID
- 2823222628422525709
- Author
- AlKhafaji B
- Salih M
- Shnain S
- Nabat Z
- Publication year
- Publication venue
- Periodicals of Engineering and Natural Sciences (PEN)
External Links
Snippet
Find a new way to hide the different types of confidential and important text files inside the images without noticing any change or distortion of the information in the images after the process of concealment or attempt to be detected by hackers. And then extract these texts …
- 238000000034 method 0 title abstract description 27
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T11/00—2D [Two Dimensional] image generation
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09G—ARRANGEMENTS OR CIRCUITS FOR CONTROL OF INDICATING DEVICES USING STATIC MEANS TO PRESENT VARIABLE INFORMATION
- G09G5/00—Control arrangements or circuits for visual indicators common to cathode-ray tube indicators and other visual indicators
- G09G5/02—Control arrangements or circuits for visual indicators common to cathode-ray tube indicators and other visual indicators characterised by the way in which colour is displayed
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rustad et al. | Inverted LSB image steganography using adaptive pattern to improve imperceptibility | |
Kabulov et al. | Algorithmic method of security of the Internet of Things based on steganographic coding | |
CN109767375B (en) | Image watermark embedding and tracing method and system | |
Rawat et al. | A steganography technique for hiding image in an image using lsb method for 24 bit color image | |
Abdullah et al. | New approaches to encrypt and decrypt data in image using cryptography and steganography algorithm | |
Wang et al. | Cross-plane multi-image encryption using chaos and blurred pixels | |
Philjon et al. | Metamorphic cryptography—A paradox between cryptography and steganography using dynamic encryption | |
JP5443299B2 (en) | Information transmission / reception system and information transmission / reception method | |
AlKhafaji et al. | Improved technique for hiding data in a colored and a monochrome image | |
Maisa'a Abid Ali et al. | Dual method cryptography image by two force secure and steganography secret message in IoT | |
Sherine et al. | CMY Color Spaced‐Based Visual Cryptography Scheme for Secret Sharing of Data | |
Veerashetty | Secure communication over wireless sensor network using image steganography with generative adversarial networks | |
CN110069907A (en) | Big data source tracing method and system based on digital watermarking | |
Por et al. | StegCure: a comprehensive steganographic tool using enhanced LSB scheme | |
US20160189015A1 (en) | Data exchange methods, systems and apparatus using color images | |
Srikanth et al. | Advanced Data Security Using Modulo Operator And LSB Method | |
Osman et al. | Text Steganography Using the Second Quotient Remainder Theorem and Dark Colour Schemes | |
Anam et al. | Random pixel embedding for hiding secret text over video file | |
Tyagi et al. | Multilevel steganography for data protection | |
Munasinghe et al. | Video steganography | |
Sulema | Image protection method based on binary operations | |
Shamsi et al. | Securing Secret Information | |
Ali | Enhancing SMM Image Steganography Method by using LSBraille Image Steganography Method (SMMWB; Secret Message Matching With Braille) | |
CN115834239B (en) | Information security processing system and method based on cryptographic algorithm | |
Azooz et al. | A novel steganography scheme using logistic map, brisk descriptor, and k-means clustering |