A Review on Metamorphic Cryptography for Video Files
نویسندگان
چکیده
Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Steganography is the science of embedding information into the cover image viz., text, video, and image without causing statistically significant modification to the cover image. Combining these two techniques either way together result to new technique-Metamorphic Cryptography [14]. The data (text, audio, video, images) is transformed into cipher data using a key, concealed into another cover object (audio, video, images) using Steganography converting it into a Stegno object, and is finally sent to the receiver. Or the data (text, audio, video, images) is concealed into Cover Object resulting into Stegno Object, (Steganography)and further converting Stegno Object into Cipher Stegno Object (audio, video, images) using Cryptography, and is finally sent to the receiver. This proposed both the technique thus achieves double layer security to data.
منابع مشابه
A Survey on Steganography Using Multimedia Files
Steganography is a type of secrete communication that hides the secrete information. It deals with the different ways of hiding/embedding the secrete information such as text, image, audio or video files inside another multimedia files with the help of private key. The hidden information is termed as secrete file and the file in which the secrete file is hidden is termed as cover file. The file...
متن کاملThroughput Analysis of Symmetric Algorithms
-------------------------------------------------------------------ABSTRACT-----------------------------------------------------------------Today’s world, for secure data transmission via Internet or any public network, there is no alternative to cryptography. The role of cryptography is most important in the field of network security. In this paper, we compare the various cryptographic algorit...
متن کاملAn Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms
Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...
متن کاملCHI-SQUARED DISTANCE AND METAMORPHIC VIRUS DETECTION A Thesis
CHI-SQUARED DISTANCE AND METAMORPHIC VIRUS DETECTION by Annie H. Toderici Malware are programs that are designed with a malicious intent. Metamorphic malware change their internal structure each generation while still maintaining their original behavior. As metamorphic malware become more sophisticated, it is important to develop efficient and accurate detection techniques. Current commercial a...
متن کاملMetamorphic Virus Variants Classification Using Opcode Frequency Histogram
In order to prevent detection and evade signature-based scanning methods, which are normally exploited by antivirus softwares, metamorphic viruses use several various obfuscation approaches. They transform their code in new instances as look entirely or partly different and contain dissimilar sequences of string, but their behavior and function remain unchanged. This obfuscation process allows ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013