A Covert Encryption Method for Applications in Electronic Data Interchange

Download Now
Provided by: Dublin Institute of Technology
Topic: Security
Format: PDF
A principal weakness of all encryption systems is that the output data can be 'Seen' to be encrypted. In other words, encrypted data provides a 'Flag' on the potential value of the information that has been encrypted. In this paper, the authors provide a new approach to 'Hiding' encrypted data in a digital image. In conventional (symmetric) encryption, the plaintext is usually represented as a binary stream and encrypted using an XOR type operation with a binary cipher.
Download Now

Find By Topic