A Review on Metamorphic Cryptography for Video Files

نویسندگان

  • Dhananjay M. Dumbere
  • Nitin J. Janwe
چکیده

Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Steganography is the science of embedding information into the cover image viz., text, video, and image without causing statistically significant modification to the cover image. Combining these two techniques either way together result to new technique-Metamorphic Cryptography [14]. The data (text, audio, video, images) is transformed into cipher data using a key, concealed into another cover object (audio, video, images) using Steganography converting it into a Stegno object, and is finally sent to the receiver. Or the data (text, audio, video, images) is concealed into Cover Object resulting into Stegno Object, (Steganography)and further converting Stegno Object into Cipher Stegno Object (audio, video, images) using Cryptography, and is finally sent to the receiver. This proposed both the technique thus achieves double layer security to data.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey on Steganography Using Multimedia Files

Steganography is a type of secrete communication that hides the secrete information. It deals with the different ways of hiding/embedding the secrete information such as text, image, audio or video files inside another multimedia files with the help of private key. The hidden information is termed as secrete file and the file in which the secrete file is hidden is termed as cover file. The file...

متن کامل

Throughput Analysis of Symmetric Algorithms

-------------------------------------------------------------------ABSTRACT-----------------------------------------------------------------Today’s world, for secure data transmission via Internet or any public network, there is no alternative to cryptography. The role of cryptography is most important in the field of network security. In this paper, we compare the various cryptographic algorit...

متن کامل

An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

متن کامل

CHI-SQUARED DISTANCE AND METAMORPHIC VIRUS DETECTION A Thesis

CHI-SQUARED DISTANCE AND METAMORPHIC VIRUS DETECTION by Annie H. Toderici Malware are programs that are designed with a malicious intent. Metamorphic malware change their internal structure each generation while still maintaining their original behavior. As metamorphic malware become more sophisticated, it is important to develop efficient and accurate detection techniques. Current commercial a...

متن کامل

Metamorphic Virus Variants Classification Using Opcode Frequency Histogram

In order to prevent detection and evade signature-based scanning methods, which are normally exploited by antivirus softwares, metamorphic viruses use several various obfuscation approaches. They transform their code in new instances as look entirely or partly different and contain dissimilar sequences of string, but their behavior and function remain unchanged. This obfuscation process allows ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013