Steganographic manipulations with elliptic curve cryptography
by T.N. Shankar; G. Sahoo; S. Niranjan
International Journal of Electronic Security and Digital Forensics (IJESDF), Vol. 4, No. 4, 2012

Abstract: Steganography is a technique of hiding the existence of information in some other data evincing no trace of data alteration. The term has its origin from Greek that literally means 'covered writing'. Unlike cryptography, which simply conceals the content or meaning of a message, steganography conceals the very existence of a message. In computer-based steganography, several forms of digital media are used as 'cover' for hidden information. Images, documents, web pages, and even MP3 music files may all serve as innocuous-looking hosts for secret messages. In cases of covert communications through internet, digital images due to their ability to carry hidden messages are possibly the most practical type of steganographic methodologies. Most of the steganography-based techniques are within the domain of private key encryption algorithms with the less security level rather than using public key algorithms. An attempt to create the secret code for image steganography for multimedia messaging service or MMS using elliptic curve cryptography has been demonstrated.

Online publication date: Wed, 19-Nov-2014

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Electronic Security and Digital Forensics (IJESDF):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com