Cryptography and Steganography are two prominent techniques to obtain secure communication over the shared media like the Internet. Steganography is slightly ahead of cryptography because of its stealthy characteristi...Cryptography and Steganography are two prominent techniques to obtain secure communication over the shared media like the Internet. Steganography is slightly ahead of cryptography because of its stealthy characteristics. In this paper, a new method has been proposed which combines cryptography and steganography to ensure even more secure communication. The Advanced Encryption Standard (AES) in spatial domain of the carrier/cover image and Least Significant Bit (LSB) replacement in the transformed domain of the same image has been used after performing a Discrete Cosine Transform (DCT) on the pixels. An additional layer of security has been introduced by applying XOR operation on the AES encrypted message with the pixel values of the carrier image. The Peak Signal to Noise Ratio (PSNR) of the proposed algorithm is better than most of the similar algorithms. With better PSNR, the proposed method depicts a three layer of security of the information and error free decryption.展开更多
Intellectual Property(IP)includes ideas,innovations,methodologies,works of authorship(viz.,literary and artistic works),emblems,brands,images,etc.This property is intangible since it is pertinent to the human intellec...Intellectual Property(IP)includes ideas,innovations,methodologies,works of authorship(viz.,literary and artistic works),emblems,brands,images,etc.This property is intangible since it is pertinent to the human intellect.Therefore,IP entities are indisputably vulnerable to infringements and modifications without the owner’s consent.IP protection regulations have been deployed and are still in practice,including patents,copyrights,contracts,trademarks,trade secrets,etc.,to address these challenges.Unfortunately,these protections are insufficient to keep IP entities from being changed or stolen without permission.As for this,some IPs require hardware IP protection mechanisms,and others require software IP protection techniques.To secure these IPs,researchers have explored the domain of Intellectual Property Protection(IPP)using different approaches.In this paper,we discuss the existing IP rights and concurrent breakthroughs in the field of IPP research;provide discussions on hardware IP and software IP attacks and defense techniques;summarize different applications of IP protection;and lastly,identify the challenges and future research prospects in hardware and software IP security.展开更多
文摘Cryptography and Steganography are two prominent techniques to obtain secure communication over the shared media like the Internet. Steganography is slightly ahead of cryptography because of its stealthy characteristics. In this paper, a new method has been proposed which combines cryptography and steganography to ensure even more secure communication. The Advanced Encryption Standard (AES) in spatial domain of the carrier/cover image and Least Significant Bit (LSB) replacement in the transformed domain of the same image has been used after performing a Discrete Cosine Transform (DCT) on the pixels. An additional layer of security has been introduced by applying XOR operation on the AES encrypted message with the pixel values of the carrier image. The Peak Signal to Noise Ratio (PSNR) of the proposed algorithm is better than most of the similar algorithms. With better PSNR, the proposed method depicts a three layer of security of the information and error free decryption.
文摘Intellectual Property(IP)includes ideas,innovations,methodologies,works of authorship(viz.,literary and artistic works),emblems,brands,images,etc.This property is intangible since it is pertinent to the human intellect.Therefore,IP entities are indisputably vulnerable to infringements and modifications without the owner’s consent.IP protection regulations have been deployed and are still in practice,including patents,copyrights,contracts,trademarks,trade secrets,etc.,to address these challenges.Unfortunately,these protections are insufficient to keep IP entities from being changed or stolen without permission.As for this,some IPs require hardware IP protection mechanisms,and others require software IP protection techniques.To secure these IPs,researchers have explored the domain of Intellectual Property Protection(IPP)using different approaches.In this paper,we discuss the existing IP rights and concurrent breakthroughs in the field of IPP research;provide discussions on hardware IP and software IP attacks and defense techniques;summarize different applications of IP protection;and lastly,identify the challenges and future research prospects in hardware and software IP security.