保密通信和秘密数据存储的隐写术

D. K. Chaudhary, Sandeep Srivastava, T. Choudhury
{"title":"保密通信和秘密数据存储的隐写术","authors":"D. K. Chaudhary, Sandeep Srivastava, T. Choudhury","doi":"10.1109/ICGCIOT.2018.8753034","DOIUrl":null,"url":null,"abstract":"Rapid changes in the technology and the availability of the sources have resulted in large amount of useful information to be shared from one person to the other over the internet in some seconds. As the information is quiet sensitive and important it is must be kept secured and the overall privacy should be maintained. There are number of ways and techniques that could be applied on and hence worth data could be kept secured [2]. The only disadvantage can be maintaining this privacy is quite expensive. A much easier way can be using of Steganography technique to hide this useful information inside any other source and then transferring it upon the internet. The other source can be text, audio, or even images [9]. In this paper we have focused upon the use of images for the steganography technique.","PeriodicalId":269682,"journal":{"name":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"15 3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Steganography for Confidential Communication and Secret Data storage\",\"authors\":\"D. K. Chaudhary, Sandeep Srivastava, T. Choudhury\",\"doi\":\"10.1109/ICGCIOT.2018.8753034\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Rapid changes in the technology and the availability of the sources have resulted in large amount of useful information to be shared from one person to the other over the internet in some seconds. As the information is quiet sensitive and important it is must be kept secured and the overall privacy should be maintained. There are number of ways and techniques that could be applied on and hence worth data could be kept secured [2]. The only disadvantage can be maintaining this privacy is quite expensive. A much easier way can be using of Steganography technique to hide this useful information inside any other source and then transferring it upon the internet. The other source can be text, audio, or even images [9]. In this paper we have focused upon the use of images for the steganography technique.\",\"PeriodicalId\":269682,\"journal\":{\"name\":\"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)\",\"volume\":\"15 3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICGCIOT.2018.8753034\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICGCIOT.2018.8753034","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

技术的快速变化和资源的可用性导致大量有用的信息可以在几秒钟内通过互联网从一个人分享到另一个人。由于信息非常敏感和重要,因此必须加以保护,并应维护整体隐私。有许多方法和技术可以应用,因此有价值的数据可以保持安全[2]。唯一的缺点是维护这种隐私非常昂贵。一种更简单的方法是使用隐写技术将这些有用的信息隐藏在任何其他来源中,然后在互联网上传输。其他来源可以是文本、音频甚至图像[9]。在本文中,我们重点讨论了图像隐写技术的使用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Steganography for Confidential Communication and Secret Data storage
Rapid changes in the technology and the availability of the sources have resulted in large amount of useful information to be shared from one person to the other over the internet in some seconds. As the information is quiet sensitive and important it is must be kept secured and the overall privacy should be maintained. There are number of ways and techniques that could be applied on and hence worth data could be kept secured [2]. The only disadvantage can be maintaining this privacy is quite expensive. A much easier way can be using of Steganography technique to hide this useful information inside any other source and then transferring it upon the internet. The other source can be text, audio, or even images [9]. In this paper we have focused upon the use of images for the steganography technique.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Holistic Approach For Patient Health Care Monitoring System Through IoT Pomegranate Diseases and Detection using Sensors: A Review Energy Efficient Optimal Path based coded transmission for multi-sink and multi-hop WSN Iot Based Smart Shopping Mall Visual screens in Canteens providing Real Time information of Food Wastage
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1