T. Li, Chih-Kai Chuang, Fang-Ming Yu, Jia-Rong Sun
{"title":"High Adaptive Multiple-Encryption of Hidden Information Technology","authors":"T. Li, Chih-Kai Chuang, Fang-Ming Yu, Jia-Rong Sun","doi":"10.1109/ICMSS.2010.5578470","DOIUrl":null,"url":null,"abstract":"With the penetration of the Internet and the rapid development of information technology, the secure transmission of the text and image herewith gets a great deal of attention. The traditional methods of encryption can only maintain the information security. However, the information could be cracked and to proceed criminal acts by the illegal use of the relevant information. Therefore, it is necessary to apply both time-varying and information-varying of encryption/decryption methods to enhance information security.","PeriodicalId":329390,"journal":{"name":"2010 International Conference on Management and Service Science","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Management and Service Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMSS.2010.5578470","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
With the penetration of the Internet and the rapid development of information technology, the secure transmission of the text and image herewith gets a great deal of attention. The traditional methods of encryption can only maintain the information security. However, the information could be cracked and to proceed criminal acts by the illegal use of the relevant information. Therefore, it is necessary to apply both time-varying and information-varying of encryption/decryption methods to enhance information security.