Secure transmission of morphed stego keys over internet using IP steganography

被引:1
|
作者
机构
[1] Bagade, Anant M.
[2] Talbar, Sanjay N.
来源
Bagade, Anant M. | 1600年 / Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 06期
关键词
16;
D O I
10.1504/IJICS.2014.065164
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] A Spatiotemporal Chaos-based Secure Image Transmission Scheme by Using Spread-Spectrum over the Internet
    Peng, Jun
    Jin, Shangzhu
    You, Mingying
    Yang, Zhiming
    Liao, Xiaofeng
    2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 2524 - +
  • [22] Wireless applications using Internet Protocol and voice over IP
    Perini, PL
    2001 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-7, 2001, : 1043 - 1050
  • [23] Secret Data Transmission using Vital Image Steganography over Transposition Cipher
    Jain, Mamta
    Lenka, Saroj Kumar
    2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015, : 1026 - 1029
  • [24] Design and analysis of secure transmission of IP over DVB-S/RCS satellite systems
    Pillai, Prashant
    Hu, Yim-Fun
    2006 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2006, : 231 - +
  • [25] DOCUMENT DELIVERY USING IMAGE TRANSMISSION OVER INTERNET
    MCCONE, GK
    PROCEEDINGS OF THE ASIS ANNUAL MEETING, 1991, 28 : 339 - 339
  • [26] Adaptive partial-matching steganography for voice over IP using triple M sequences
    Tian, Hui
    Jiang, Hong
    Zhou, Ke
    Feng, Dan
    COMPUTER COMMUNICATIONS, 2011, 34 (18) : 2236 - 2247
  • [27] Secure communication over wireless sensor network using image steganography with generative adversarial networks
    Ambika
    Virupakshappa
    Veerashetty, Sachinkumar
    Measurement: Sensors, 2022, 24
  • [28] A secure negotiation over Internet using new deniable authentication protocol
    Tsaur, Woei-Jiunn
    Lee, Wei-Bin
    Wu, Chia-Chun
    WMSCI 2005: 9TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL 5, 2005, : 24 - 28
  • [29] Using a cryptographic authentication protocol for the secure control of a robot over TCP/IP
    Groza, Bogdan
    Dragomir, Toma-Leonida
    2008 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS (AQTR 2008), THETA 16TH EDITION, VOL I, PROCEEDINGS, 2008, : 184 - 189
  • [30] Secure Image Data Storage and Transmission Using ESP32-Cam and Raspberry Pi with Steganography
    Gokhale, Hrishikesh
    Satapathy, Chirag
    Syed, Ali Zoya
    INTERNET OF THINGS, GIOTS 2022, 2022, 13533 : 292 - 301