Cryptography and Steganography of Video Information in Modern Communications
نویسندگان
چکیده
In this paper image cryptography and steganography performed in frequency domain using random phase mask encoding are presented. The use of random phase mask allows to deccorrelate initial image and makes it unrecognized. This property is used for proposed image encryption and for steganography to increase the security level of the encoded image and to make it less visible. Finally, two keys are needed to decrypt the image. The e ciency of the proposed approach is demonstrated by the computer modeling.
منابع مشابه
Secret Information Steganography Using LSB Insertion Methodwithout Bit Layout Section with Increasing Substitution Rate and High Reliability
In this paper, a faster method for embedding cryptographic information in the image ispresented by expressing the concept of latent prints (Steganography). Data is encrypted bytwo methods before embedding to increase reliability. Then they are embedded into the imageby a button, a method has been expressed to reduce potential noise impact on the wayinformation is encoded.
متن کاملThe Idea Of Using The Steganography As Encryption Tool
the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...
متن کاملA Secure Cyclic Steganographic Technique for Color Images using Randomization
There are five different types of steganography based on the carrier object that is used for embedding the secret information. The carrier object may be images, text, videos, audios or network protocol packets. If the image is used as a carrier, it is called image steganography. Similarly if video is used for hiding secret messages, we call it video steganography and so on[1, 5]. The diagrammat...
متن کاملOptimizing image steganography by combining the GA and ICA
In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Fillin...
متن کاملOn the limits of steganography
In this paper, we clarify what steganography is and what it can do. We contrast it with the related disciplines of cryptography and traffic security, present a unified terminology agreed at the first international workshop on the subject, and outline a number of approaches—many of them developed to hide encrypted copyright marks or serial numbers in digital audio or video. We then present a num...
متن کامل