Hiding Encrypted Data in Audio Wave File
نویسندگان
چکیده
منابع مشابه
Hiding Encrypted Data in Audio Wave File
Today at a time of globalization in which the whole planet become look like a small village and transport information through it with a push button in keyboard and at a time of huge evaluation in the digital world and for the millions of users to international net and some application importance, let us to use both cryptography and steganography as a means to protect the information from hackin...
متن کاملA Hybrid Techniques for Executable File Hiding in Encrypted Image
Data hiding is referred as a process of hiding a data into a cover medium. Also the process works with two links one is with a set of embedding of additional data and another one is with a set of the cover data. The relationship between these two sets of data is characterized for different applications. For instance, in some communications, the hidden data may often be irrelevant to the cover m...
متن کاملAdvanced reversible Data Hiding With Encrypted Data
The advanced RDH work focuses on both data encryption and image encryption which makes it more secure and free of errors. All previous methods embed data without encrypting the data which may subject to errors on the data extraction or image recovery. The proposed work provides a novel RDH scheme in which both data and image can be encrypted and extracted reversibly without any errors. In the p...
متن کاملReversibility improved data hiding in encrypted images
A novel reversible data hiding technique in encrypted images is presented in this paper. Instead of embedding data in encrypted images directly, some pixels are estimated before encryption so that additional data can be embedded in the estimating errors. A benchmark encryption algorithm (e.g. AES) is applied to the rest pixels of the image and a special encryption scheme is designed to encrypt ...
متن کاملEnhanced Data Hiding in Encrypted Video Streams
To maintain security and privacy, digital video needs to be processed in encrypted format. The data should be concealed in the encrypted videos for the purpose of content notation and also for the tampering detection. By following this data hiding in encrypted domain preserves the confidentiality of the content without decryption. The three major parts of a novels scheme of concealing the data ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2014
ISSN: 0975-8887
DOI: 10.5120/15867-4809