Security

A Covert Encryption Method for Applications in Electronic Data Interchange

Free registration required

Executive Summary

A principal weakness of all encryption systems is that the output data can be 'Seen' to be encrypted. In other words, encrypted data provides a 'Flag' on the potential value of the information that has been encrypted. In this paper, the authors provide a new approach to 'Hiding' encrypted data in a digital image. In conventional (symmetric) encryption, the plaintext is usually represented as a binary stream and encrypted using an XOR type operation with a binary cipher.

  • Format: PDF
  • Size: 8705.27 KB