A Covert Encryption Method for Applications in Electronic Data Interchange

A principal weakness of all encryption systems is that the output data can be 'Seen' to be encrypted. In other words, encrypted data provides a 'Flag' on the potential value of the information that has been encrypted. In this paper, the authors provide a new approach to 'Hiding' encrypted data in a digital image. In conventional (symmetric) encryption, the plaintext is usually represented as a binary stream and encrypted using an XOR type operation with a binary cipher.

Provided by: Dublin Institute of Technology Topic: Security Date Added: Aug 2009 Format: PDF

Find By Topic