Secure transmission of morphed stego keys over internet using IP steganography.
Anant M. BagadeSanjay N. TalbarPublished in: Int. J. Inf. Comput. Secur. (2014)
Keyphrases
- data hiding
- hidden information
- information hiding
- jpeg images
- ip address
- internet protocol
- cover image
- computer networks
- high capacity
- tcp ip
- security mechanisms
- secret key
- private key
- security requirements
- protocol stack
- authentication protocol
- spatial domain
- secret data
- end to end
- switched networks
- electronic payment
- secret message
- key establishment