Inicio > > Seguridad informática > A Resilient Protocol for Concealing Data within Multimedia to Enhance Security
A Resilient Protocol for Concealing Data within Multimedia to Enhance Security

A Resilient Protocol for Concealing Data within Multimedia to Enhance Security

Prabhash Kumar Singh

38,12 €
IVA incluido
Consulta disponibilidad
Editorial:
Draft2Digital
Año de edición:
2024
Materia
Seguridad informática
ISBN:
9798224956432
Añadir a favoritos

The internet has made distances shorter and the world smaller for communication. As per the survey done by Internet World Stats in June 2019, 58.8% (i.e. approximately 4.5 billion) of the total world population are using the internet. World Economic Forum report of 2018 suggests that by 2030, nine out of ten persons above fifteen would be online and digital conscious. Nowadays, the internet has become essential for living and running businesses smoothly. The latest web-enabled devices and high-speed communication technology have revolutionised the sharing of multimedia documents. It can be for various purposes, including social, commercial and industrial applications. Therefore, the first requirement is to protect the digital content from unauthorised access. As a result of rising cyber-terrorism and the widespread availability of the internet, data integrity is jeopardised. It can cause financial and emotional damage by stealing data or manipulating it. Thus, it is necessary to provide comprehensive security solutions with continual updates to counter fraud and evil intents. Effective prevention of forgery of digital works and identification of intellectual property rights of digital media have become an urgent problem which needs to be solved. A possible solution leads to data hiding technologies which embed valuable secret data within the multimedia objects such as image, audio or video to protect from adversaries. Data hiding can be achieved through cryptography, steganography and watermarking techniques. Each has its own advantages and disadvantages. Over the years, various data hiding techniques developed can be classified as reversible or irreversible. In reversible techniques, original host file, referred as cover, can be recovered after extraction of the secret message from the media in which the secret data was hidden (stego). Medical and military fields where the original image is as vital as the secret message prefers reversible techniques. Any changes to the original cover during transmission can affect the recoverability of the secret message. An irreversible data hiding algorithms enables the recovery of the hidden secret data however, fails to recover the original cover image.

Artículos relacionados

  • Privacy, Intrusion Detection and Response
    Peyman Kabiri
    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, ...
    Disponible

    255,72 €

  • TLS Cryptography In-Depth
    Dr. Paul Duplys / Dr. Roland Schmitz
    A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary referenceKey Features- Learn about real-world cryptographic pitfalls and how to avoid them- Understand past attacks on TLS, how these attacks worked, and how they were fixed- Discover the inner workings of modern cryptography and its application within TLS- Purchase of the...
    Disponible

    73,25 €

  • A Secured Framework for Enhanced and Efficient Communication in IoT Ecosystem
    V S Saranya
    IoT security technologies ensure the protection of devices and networks associated with Internet of Things (IoT) ecosystem. IoT affords internet connectivity amid various inter related devices. It presents a unique identification and automates data transfer within the network. There are possibilities for severe vulnerabilities for the devices which are allowed with internet con...
  • Batch Verification of Digital Signatures in IoT
    Apurva S. Kittur
    Internet of Things (IoT) is coined in 1999 by Kevin Ashton. IoT can be defined in many ways. ’Internet’ refers to the interconnectivity of devices to create a network, and ’Things’ refers to the embedded objects or devices that can connect to the Internet. One way of defining is, ’it is a network of sensors and smart devices which sense the data which is further processed and ana...
  • Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms
    In an era of rapid technological advancements, blockchain technology has emerged as a groundbreaking solution for decentralized trust and immutable record-keeping. Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms delves into the intricate world of blockchain, offering a comprehensive exploration of its various dimensions. At its core, blockchain disrupts the ...
    Disponible

    373,22 €

  • Innovative Machine Learning Applications for Cryptography
    Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of traditional cryptosystems to human error and evolving cyber threats is a pressing concern. The stakes are higher than ever, and the need for innovative solutions to safeguard sensitive information is unden...
    Disponible

    393,00 €