Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Software Implementation of Elliptic Curve Cryptography over Binary Fields
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
MP4Stego: steganography in MPEG-4 videos
International Journal of Advanced Media and Communication
A new methodology for data coding and embedding for high-capacity transmitting
International Journal of Electronic Security and Digital Forensics
Comprehensive linguistic steganography survey
International Journal of Information and Computer Security
A Novel Methodology for Data Hiding in PDF Files
Information Security Journal: A Global Perspective
KL-sense secure image steganography
International Journal of Security and Networks
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Cryptography with fast point multiplication by using ASCII codes and its implementation
International Journal of Communication Networks and Distributed Systems
An enhanced Hill cipher approach for image encryption in steganography
International Journal of Electronic Security and Digital Forensics
Hi-index | 0.00 |
Steganography is a technique of hiding the existence of information in some other data evincing no trace of data alteration. The term has its origin from Greek that literally means 'covered writing'. Unlike cryptography, which simply conceals the content or meaning of a message, steganography conceals the very existence of a message. In computer-based steganography, several forms of digital media are used as 'cover' for hidden information. Images, documents, web pages, and even MP3 music files may all serve as innocuous-looking hosts for secret messages. In cases of covert communications through internet, digital images due to their ability to carry hidden messages are possibly the most practical type of steganographic methodologies. Most of the steganography-based techniques are within the domain of private key encryption algorithms with the less security level rather than using public key algorithms. An attempt to create the secret code for image steganography for multimedia messaging service or MMS using elliptic curve cryptography has been demonstrated.