Information Security Architecture: An Integrated Approach to Security in the Organization
Information Security Architecture: An Integrated Approach to Security in the Organization
IEEE Internet Computing
Digital Steganography: Hiding Data within Data
IEEE Internet Computing
Obfuscation of executable code to improve resistance to static disassembly
Proceedings of the 10th ACM conference on Computer and communications security
Principles of Computer Security: Security+ and Beyond
Principles of Computer Security: Security+ and Beyond
Cyber warfare: steganography vs. steganalysis
Communications of the ACM - Voting systems
Binary image steganographic techniques classification based on multi-class steganalysis
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Hi-index | 0.00 |
When communicating secret information there is more than one route to follow to ensure the confidentiality of the message being transmitted Encryption might be an obvious choice; however there are limitations and disadvantages to using encryption An alternative approach is steganography, which is a technology for hiding information in other information Combining the two disciplines may provide better security but more overhead, since the receiver must now have knowledge not only of how the information was encrypted, but also of how it was hidden, in order to retrieve the message This paper proposes a system where image steganography is combined with encryption by hiding not only a message inside an image, but also the means to extract and decrypt the message An executable program is hidden inside the image that functions as a decryptor, enabling the receiver to be oblivious to the encryption algorithm used.