2017
DOI: 10.1155/2017/9130683
|View full text |Cite
|
Sign up to set email alerts
|

Protecting Information with Subcodstanography

Abstract: In modern communication systems, one of the most challenging tasks involves the implementation of adequate methods for successful and secure transfer of confidential digital information over an unsecured communication channel. Many encryption algorithms have been developed for protection of confidential information. However, over time, flaws have been discovered even with the most sophisticated encryption algorithms. Each encryption algorithm can be decrypted within sufficient time and with sufficient resource… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 23 publications
0
1
0
Order By: Relevance
“…This RAR folder is embedded in a carrier image via the cryptographic and steganographic security transformation referred to as subcodstanography (Köhler, Lukić & Čik 2017). Then, this securitytransformed file along with its symmetric key is stored in a hidden folder on the website.…”
Section: Security Protocolsmentioning
confidence: 99%
“…This RAR folder is embedded in a carrier image via the cryptographic and steganographic security transformation referred to as subcodstanography (Köhler, Lukić & Čik 2017). Then, this securitytransformed file along with its symmetric key is stored in a hidden folder on the website.…”
Section: Security Protocolsmentioning
confidence: 99%