Cryptography and Steganography: New Approach

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Genetic Approach to Cryptography and Steganography

With the development of network techniques the problem of network security becomes more and more important. The use of Word Wide Web has grown extremely in the past few years. Furthermore, many end users can easily use tools to synthesize and edit multimedia information. Thus, security has become one of the most significant problems for distributing new information technology. It is necessary t...

متن کامل

Combining Steganography and Cryptography: New Directions

Our main goal in this paper is to give new insights and directions on how to improve existing methods of hiding secret messages, possibly by combining steganography and cryptography. We start by describing the main existing methods and techniques in steganography that allow us to hide the existence of a message, together with the mostly used steganalysis techniques to counter them. We then illu...

متن کامل

New Steganography Technique with Symmetric Cryptography

This paper describes about cryptography and a short survey on steganography techniques. We also mention the strong and weak points of these techniques briefly. Steganography is a science dealing with the hiding of the secured information in a harmless signal. An image, audio or video files may be used to embed the information. For image steganography, binary, gray scale or color images may be u...

متن کامل

Cryptography and Steganography

Cryptography and steganography, the art of transforming the code or the plain text into either the encrypted code or a pictures format, as used by the steganographic feature, is the matter of great deal in the modern world of the ruler "security". Everyone in the entire scenario now emphasizes the need for cryptography and steganography codegroup utility which encodes and decodes binary files i...

متن کامل

Steganography from weak cryptography

We introduce a problem setting which we call “the freedom fighters’ problem”. It subtly differs from the prisoners’ problem. We propose a steganographic method that allows Alice and Bob to fool Wendy the warden in this setting. Their messages are hidden in encryption keys. The recipient has no prior knowledge of these keys, and has to cryptanalyze ciphertexts in order to recover them. We show a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Transactions on Networks and Communications

سال: 2017

ISSN: 2054-7420

DOI: 10.14738/tnc.56.3914