You are here

“Secret Sharing through Integrated Crypto-Steganographic Approach”

Journal Name:

Publication Year:

Author Name
Abstract (Original Language): 
The Internet is full of insecure links; therefore the information on the Internet is not secure. Protecting the static or flowing information on the Internet from misuse or hacking is the prime goal. Some solution to be discussed is how to passing information in a manner that the very existence of the message is unknown in order to repel attention of the potential attacker. Besides hiding data for confidentiality, this approach of information hiding can be extended to copyright protection for digital media. This research proposed the method of converting the textual information by means of Cryptography and then doubly secured by the covering it unde
1
3

REFERENCES

References: 

[1] Domenico Bloisi and Luca Iocchi, “IMAGE
B A S E D S T E G A N O G R A P H Y A N D
CRYPTOGRAPHY“
[2] Vidyasagar Potdar, Elizabeth Chang,
“Disguising Text Cryptography using Image
Cryptography“,4th International Network
Conference INC2004
[3] Pedro Peris López, “Lightweight
Cryptography in Radio Frequency Identification
(RFID)
Systems”
[ 4 ] Pr o f. Ch rist o f Pa a r, “APPLIED
CRYPTOGRAPHY AND DATA SECURITY
[5] Chaelynne M. Wolak, “Digital Watermarking”
[ 6 ] M a rt i n K u t t e r a a n d S v i a t o sl a v
Voloshynovskiya,b and Alexander Herrigela, “The
Watermark Copy Attack”, Proceedings of SPIE:
Security and Watermarking of Multimedia
Content II, Vol. 3971, January 2000, San Jose, CA,
USA.
[7] Sujay Narayana and Gaurav Prasad, “TWO
NEW APPROACHES FOR SECURED IMAGE
S T E G A N O G R A P H Y U S I N G
CRYPTOGRAPHIC TECHNIQUES AND TYPE
CONVERSIONS”, Signal & Image Processing
Vol.1, No.2, December 2010

Thank you for copying data from http://www.arastirmax.com