Steganography-Based Secure Communication.
Manjot BhatiaSunil Kumar MuttooMahinder Pal Singh BhatiaPublished in: SocProS (2012)
Keyphrases
- secure communication
- smart card
- secret key
- secret sharing
- public key
- key management
- information security
- network security
- digital signature
- ad hoc networks
- chaotic systems
- data hiding
- key technologies
- secret sharing scheme
- security protocols
- cryptographic protocols
- computing environments
- adaptive control
- low cost
- computer networks
- end to end
- operating system