Cryptography and Steganography: New Approach
نویسندگان
چکیده
منابع مشابه
A New Genetic Approach to Cryptography and Steganography
With the development of network techniques the problem of network security becomes more and more important. The use of Word Wide Web has grown extremely in the past few years. Furthermore, many end users can easily use tools to synthesize and edit multimedia information. Thus, security has become one of the most significant problems for distributing new information technology. It is necessary t...
متن کاملCombining Steganography and Cryptography: New Directions
Our main goal in this paper is to give new insights and directions on how to improve existing methods of hiding secret messages, possibly by combining steganography and cryptography. We start by describing the main existing methods and techniques in steganography that allow us to hide the existence of a message, together with the mostly used steganalysis techniques to counter them. We then illu...
متن کاملNew Steganography Technique with Symmetric Cryptography
This paper describes about cryptography and a short survey on steganography techniques. We also mention the strong and weak points of these techniques briefly. Steganography is a science dealing with the hiding of the secured information in a harmless signal. An image, audio or video files may be used to embed the information. For image steganography, binary, gray scale or color images may be u...
متن کاملCryptography and Steganography
Cryptography and steganography, the art of transforming the code or the plain text into either the encrypted code or a pictures format, as used by the steganographic feature, is the matter of great deal in the modern world of the ruler "security". Everyone in the entire scenario now emphasizes the need for cryptography and steganography codegroup utility which encodes and decodes binary files i...
متن کاملSteganography from weak cryptography
We introduce a problem setting which we call “the freedom fighters’ problem”. It subtly differs from the prisoners’ problem. We propose a steganographic method that allows Alice and Bob to fool Wendy the warden in this setting. Their messages are hidden in encryption keys. The recipient has no prior knowledge of these keys, and has to cryptanalyze ciphertexts in order to recover them. We show a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Transactions on Networks and Communications
سال: 2017
ISSN: 2054-7420
DOI: 10.14738/tnc.56.3914