2018
DOI: 10.17576/apjitm-2018-0702(02)-05
|View full text |Cite
|
Sign up to set email alerts
|

Challenges in Multi-Layer Data Security for Video Steganography Revisited

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 18 publications
(23 citation statements)
references
References 0 publications
0
23
0
Order By: Relevance
“…(3). where MSE denotes the mean square error between the ground truth image and the encrypted image [56]. It calculated MSE using Eqn.…”
Section: Experimental Evaluation Of Proposed Techniquementioning
confidence: 99%
“…(3). where MSE denotes the mean square error between the ground truth image and the encrypted image [56]. It calculated MSE using Eqn.…”
Section: Experimental Evaluation Of Proposed Techniquementioning
confidence: 99%
“…It is not possible to get the identical hash value for two separate messages. Secure Hash Functions (SHA-1 and SHA-256) and Message Digests (MD5) [25] are some of the popular hash encryption technologies employed in cloud computing, as shown in Figure 14.…”
Section: Hash Encryptionmentioning
confidence: 99%
“…The handshake protocol allows the client and server to authenticate each other and to negotiate an encryption algorithm, MAC algorithms, and session keys for data encryption in the TLS record [17]. The TLS Record Protocol secures the connection after the TLS Handshake Protocol established using symmetric cryptography such as RC4 or AES [18] and hash functions like SHA-1 [19]. The operation is determined by the cipher suite which applied and its name represents the involved algorithms.…”
Section: B the Transport Layer Security (Tls) And Its Cipher Suitsmentioning
confidence: 99%