Cryptography and steganography

被引:0
|
作者
机构
[1] Salama, Wessam M.
[2] Abouelseoud, Yasmine
[3] Elkamchouchi, Hassan M.
来源
| 2018年 / Institute of Telecommunications Professionals卷 / 12期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Security of information en-route through an open communication channel is critical in today's telecommunication networks. Cryptography and steganography techniques are used to cipher and to hide data in communication channel. © 2018 Institute of Telecommunications Professionals. All rights reserved.
引用
收藏
相关论文
共 50 条
  • [41] An Access Control System using Visual Cryptography and Steganography
    Bhase, Gargee
    Mangrulkar, Ramchandra S.
    2018 FOURTEENTH INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING (ICINPRO) - 2018, 2018, : 49 - 54
  • [42] Hiding Secret Message using Visual Cryptography in Steganography
    Meghrajani, Yogesh K.
    Mazumdar, Himanshu S.
    2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [43] AES Cryptography in Color Image Steganography by Genetic Algorithms
    Conci, Aura
    Brazil, Andre Luiz
    Leal Ferreira, Simone Bacellar
    MacHenry, Trueman
    2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2015,
  • [44] A Novel Secure Communication Protocol Combining Steganography and Cryptography
    Song, Shouchao
    Zhang, Jie
    Liao, Xin
    Du, Jiao
    Wen, Qiaoyan
    CEIS 2011, 2011, 15
  • [45] A safe and secured iris template using steganography and cryptography
    Abikoye, Oluwakemi Christiana
    Ojo, Umar Abdulraheem
    Awotunde, Joseph Bamidele
    Ogundokun, Roseline Oluwaseun
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (31-32) : 23483 - 23506
  • [46] Combining Steganography and Cryptography Simultaneously to Safely Mask Data in Graphics
    Mukhopadhyaya, Keka
    Anushree, M.
    Bhargav, M.
    Anusha, E.
    Vikas, M.R.
    Proceedings of 5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024, 2024, : 300 - 305
  • [47] A Video Steganography Scheme Based on Post-Quantum Cryptography
    Huang, Yiming
    Lei, Zhongkui
    Song, Zhufu
    Guo, Yueru
    Li, Yihang
    2021 IEEE INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND SOFTWARE ENGINEERING (ICICSE 2021), 2021, : 83 - 87
  • [48] Robust and Secure Image Steganography Based on Elliptic Curve Cryptography
    Ahmed, Diaa E. M.
    Khalifa, Othman O.
    2014 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE), 2014, : 288 - 291
  • [49] A Methodology Based on Steganography and Cryptography to Protect Highly Secure Messages
    Rasras, Rashad J.
    AlQadi, Ziad A.
    Abu Sara, Mutaz Rasmi
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2019, 9 (01) : 3681 - 3684
  • [50] A Comparative Study of Various Lossless Compression Techniques of Steganography and Cryptography
    Kumar, Vivek
    Singh, Gursharan
    Singh, Balraj
    2021 INTERNATIONAL CONFERENCE ON COMPUTING SCIENCES (ICCS 2021), 2021, : 285 - 288