FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks.
Mohsen A. M. El-BendaryPublished in: Multim. Tools Appl. (2017)
Keyphrases
- security threats
- security mechanisms
- security problems
- computer security
- security vulnerabilities
- security breaches
- security measures
- cyber attacks
- security protocols
- java card
- denial of service attacks
- chosen plaintext
- security risks
- information security
- security issues
- countermeasures
- stream cipher
- encryption decryption
- security flaws
- intrusion detection
- encryption scheme
- cryptographic protocols
- access control
- encryption algorithm
- encryption key
- security requirements
- malicious users
- fault injection
- smart card
- key management
- dos attacks
- network security
- buffer overflow
- signal to noise ratio
- security analysis
- security policies
- secure routing
- intrusion detection and prevention
- cyber security
- spatial domain
- information leakage
- identity theft
- video transmission
- authentication scheme
- intrusion detection system