Steganography For Extreme Secure Communication
| dc.contributor.author | Rathnayaka, P.J. | |
| dc.contributor.author | Perera, A.A.V. | |
| dc.date.accessioned | 2026-04-03T03:44:23Z | |
| dc.date.issued | 2022-11-25 | |
| dc.description.abstract | This reading source includes the learnings of research conducted regarding the credibility of Steganography, on 08 of August 2022, by the Cyber Wing of the Centre for Defence Research & Development, Sri Lanka. Information security is a crucial factor when it comes to the exchange of knowledge using conversations between two parties. Transmitting data between two points securely is a challenge in the present time as the chance of compromising the message content by an interceptor before it ever reaches the destination is considerably high. As per the methodologies of securing the content of the confidential message, there are many, but Cryptography and Steganography have proven the accuracy of the security. There is even a developed concept called “Crystography” which was built using both core ideas of Steganography and Cryptography with rapid key changing algorithms. If taking Steganography for instance which will be focused on in this analysis report; the concept is mainly using images to hide images, text files, audio, and video files sensitively without changing the image size which is very effective for extreme secure communication that sectors like military, financial and medical industry may find very interesting as when it comes to a higher chain of command, it is all about the confidentiality of data and messages being transmitted to a higherchain of command, it is all about the confidentiality of data and messages being transmitted. | |
| dc.identifier.citation | Rathnayaka, P.J. & Perera, A.A.V. (2022) Steganography For Extreme Secure Communication, International Conference On Business Innovation (ICOBI), NSBM Green University, Sri Lanka. P.414-423 | |
| dc.identifier.uri | https://nspace.nsbm.ac.lk/handle/123456789/237 | |
| dc.language.iso | en | |
| dc.publisher | NSBM Green University | |
| dc.subject | Steganography | |
| dc.subject | Cryptography | |
| dc.subject | encryption | |
| dc.subject | LSB algorithm | |
| dc.subject | PVD | |
| dc.subject | CNN-based steganography | |
| dc.subject | GAN-based steganography | |
| dc.title | Steganography For Extreme Secure Communication | |
| dc.type | Article |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- 40 Steganography For Extreme Secure Communication.pdf
- Size:
- 362.73 KB
- Format:
- Adobe Portable Document Format
License bundle
1 - 1 of 1
Loading...
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed to upon submission
- Description: