Nothing Special   »   [go: up one dir, main page]

ZHANG, 2024 - Google Patents

Cryptographic Techniques in Digital Media Security: Current Practices and Future Directions.

ZHANG, 2024

View PDF
Document ID
10402208485254707463
Author
ZHANG G
Publication year
Publication venue
International Journal of Advanced Computer Science & Applications

External Links

Snippet

Content privacy and unauthorized access to copyrighted digital media content are common in the dynamic, fast-paced digitalized media marketplace. Cryptographic methods are the foundation of modern digital media security, and they must ensure the security, integrity, and …
Continue reading at ftp.saiconference.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Similar Documents

Publication Publication Date Title
CN111327620B (en) Data security traceability and access control system under cloud computing framework
US8806200B2 (en) Method and system for securing electronic data
CN102129532B (en) Method and system for digital copyright protection
US20130028419A1 (en) System and a method for use in a symmetric key cryptographic communications
JPH1041932A (en) Ciphering key recovery method and equipment
CN111541652B (en) System for improving security of secret information keeping and transmission
Awadh et al. A review of various steganography techniques in cloud computing
Deepak et al. Review on Prevention of Data Leakage in Cloud Server by Utilizing Watermarking and Double Encryption Techniques
Mittal et al. PData security using RSA encryption combined with image steganography
Pavani et al. Data Security and Privacy Issues in Cloud Environment
Kwon et al. Decentralized identifier based illegal digital content distribution tracking system using the format‐preserving encryption algorithm
CN117454442A (en) Anonymous security and traceable distributed digital evidence obtaining method and system
Dudiki et al. A Hybrid Cryptography Algorithm to Improve Cloud Computing Security
ZHANG Cryptographic Techniques in Digital Media Security: Current Practices and Future Directions.
Bhawna et al. Information hiding techniques for cryptography and steganography
Rai et al. Digital Signature for Content Authentication
Harba Advanced password authentication protection by hybrid cryptography & audio steganography
Devi et al. Preventing Data Leakage in Cloud Servers through Watermarking and Encryption Techniques
Xiong et al. Secure multimedia distribution in cloud computing using re-encryption and fingerprinting
Mata et al. Enhanced secure data storage in cloud computing using hybrid cryptographic techniques (AES and Blowfish)
CN113111360A (en) File processing method
Rane et al. Application-level and database security for e-commerce application
JP2007158984A (en) Electronic document authenticity assurance method, and electronic document disclosure system
Shakor et al. Hybrid security model for medical image protection in cloud
CN102724043A (en) Single user authoring system for digital rights management