An experiment on DES statistical cryptanalysis
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Cryptanalysis of private-key encryption schemes based on burst-error-correcting codes
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
A fast MPEG video encryption algorithm
MULTIMEDIA '98 Proceedings of the sixth ACM international conference on Multimedia
Efficient frequency domain video scrambling for content access control
MULTIMEDIA '99 Proceedings of the seventh ACM international conference on Multimedia (Part 1)
Strength of two data encryption standard implementations under timing attacks
ACM Transactions on Information and System Security (TISSEC)
Finding smooth integers in short intervals using CRT decoding
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Proceedings of the 38th annual Design Automation Conference
Fundamentals of network security
Fundamentals of network security
An image watermarking technique using pyramid transform
MULTIMEDIA '01 Proceedings of the ninth ACM international conference on Multimedia
How to decrypt or even substitute DES-Encrypted messages in 228 steps
Information Processing Letters
Design of a New Cryptography System
PCM '02 Proceedings of the Third IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
The Two Faces of Lattices in Cryptology
CaLC '01 Revised Papers from the International Conference on Cryptography and Lattices
Energy-aware design techniques for differential power analysis protection
Proceedings of the 40th annual Design Automation Conference
Implementation of a hybrid encryption scheme for Ethernet
ISCC '95 Proceedings of the IEEE Symposium on Computers and Communications (ISCC'95)
Hacking: The Art of Exploitation
Hacking: The Art of Exploitation
A new CRT-RSA algorithm secure against bellcore attacks
Proceedings of the 10th ACM conference on Computer and communications security
Multimedia Security Handbook
Overcoming the obstacles of zero-knowledge watermark detection
Proceedings of the 2004 workshop on Multimedia and security
Scale-invariant image watermarking via optimization algorithms for quantizing randomized statistics
Proceedings of the 2004 workshop on Multimedia and security
Robust DWT-SVD domain image watermarking: embedding data in all frequencies
Proceedings of the 2004 workshop on Multimedia and security
Cryptanalysis of a provably secure CRT-RSA algorithm
Proceedings of the 11th ACM conference on Computer and communications security
Cryptanalysis of publicly verifiable authenticated encryption
InfoSecu '04 Proceedings of the 3rd international conference on Information security
A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs
Proceedings of the conference on Design, Automation and Test in Europe - Volume 3
Proceedings of the conference on Design, Automation and Test in Europe - Volume 3
A novel encryption algorithm for high resolution video
NOSSDAV '05 Proceedings of the international workshop on Network and operating systems support for digital audio and video
Parameterized biorthogonal wavelet lifting for lightweight JPEG 2000 transparent encryption
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Side Channel Cryptanalysis on XTR Public Key Cryptosystem*
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 03
A Framework for Describing Block Cipher Cryptanalysis
IEEE Transactions on Computers
Cryptanalysis of Block Ciphers via Improved Simulated Annealing Technique
ICIT '06 Proceedings of the 9th International Conference on Information Technology
Analysis of Current Steganography Tools: Classifications & Features
IIH-MSP '06 Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia
A Novel Hybrid Encryption Scheme against Adaptive Chosen Ciphertext Attack
CISW '07 Proceedings of the 2007 International Conference on Computational Intelligence and Security Workshops
An Empirical Analysis of RS Steganalysis
ICIMP '08 Proceedings of the 2008 The Third International Conference on Internet Monitoring and Protection
Pattern Analysis Applied on Steganalysis for Binary Text Images
ISECS '08 Proceedings of the 2008 International Symposium on Electronic Commerce and Security
IEEE Transactions on Computers
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
EUC '08 Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - Volume 02
Steganalysis of LSB Matching Based on Wavelet Denoising Estimation in Grayscale Image
FGCN '08 Proceedings of the 2008 Second International Conference on Future Generation Communication and Networking - Volume 01
A robust information hiding methodology in wavelet domain
SIP '07 Proceedings of the Ninth IASTED International Conference on Signal and Image Processing
A Markov chain Monte Carlo algorithm for bayesian dynamic signature verification
IEEE Transactions on Information Forensics and Security
Analysis and design of secure watermark-based authentication systems
IEEE Transactions on Information Forensics and Security
Approximate Message Authentication Codes for -ary Alphabets
IEEE Transactions on Information Forensics and Security
An accurate analysis of scalar quantization-based data hiding
IEEE Transactions on Information Forensics and Security
Watermarking relying on cover signal content to hide synchronization marks
IEEE Transactions on Information Forensics and Security
Steganalysis using higher-order image statistics
IEEE Transactions on Information Forensics and Security
Steganalysis of Embedding in Two Least-Significant Bits
IEEE Transactions on Information Forensics and Security
Steganalysis Frameworks of Embedding in Multiple Least-Significant Bits
IEEE Transactions on Information Forensics and Security
Efficient frequency domain selective scrambling of digital video
IEEE Transactions on Multimedia
A feature-based classification technique for blind image steganalysis
IEEE Transactions on Multimedia
Hi-index | 0.00 |
Security is an important issue related to the storage and communication of data and information. In data and information security, cryptography and steganography are two of the most common security techniques. On one hand, there is cryptography, which is the secret communication between two parties by message scrambling on the sender's side and message unscrambling on the receiver's side so that only the intended receiver gets the secret message. Cryptography and cryptanalysis constitute cryptology or crypto while steganography and steganalysis make up steganology or stegano. This paper presents a comparative survey of various cryptology and steganology techniques by analyzing and comparing different methodologies using a set of predefined parameters. It also offers to the reader valuable knowledge on the state of the art techniques used on cryptanalysis.