ZHANG, 2024 - Google Patents
Cryptographic Techniques in Digital Media Security: Current Practices and Future Directions.ZHANG, 2024
View PDF- Document ID
- 10402208485254707463
- Author
- ZHANG G
- Publication year
- Publication venue
- International Journal of Advanced Computer Science & Applications
External Links
Snippet
Content privacy and unauthorized access to copyrighted digital media content are common in the dynamic, fast-paced digitalized media marketplace. Cryptographic methods are the foundation of modern digital media security, and they must ensure the security, integrity, and …
- 238000000034 method 0 title abstract description 54
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111327620B (en) | Data security traceability and access control system under cloud computing framework | |
US8806200B2 (en) | Method and system for securing electronic data | |
CN102129532B (en) | Method and system for digital copyright protection | |
US20130028419A1 (en) | System and a method for use in a symmetric key cryptographic communications | |
JPH1041932A (en) | Ciphering key recovery method and equipment | |
CN111541652B (en) | System for improving security of secret information keeping and transmission | |
Awadh et al. | A review of various steganography techniques in cloud computing | |
Deepak et al. | Review on Prevention of Data Leakage in Cloud Server by Utilizing Watermarking and Double Encryption Techniques | |
Mittal et al. | PData security using RSA encryption combined with image steganography | |
Pavani et al. | Data Security and Privacy Issues in Cloud Environment | |
Kwon et al. | Decentralized identifier based illegal digital content distribution tracking system using the format‐preserving encryption algorithm | |
CN117454442A (en) | Anonymous security and traceable distributed digital evidence obtaining method and system | |
Dudiki et al. | A Hybrid Cryptography Algorithm to Improve Cloud Computing Security | |
ZHANG | Cryptographic Techniques in Digital Media Security: Current Practices and Future Directions. | |
Bhawna et al. | Information hiding techniques for cryptography and steganography | |
Rai et al. | Digital Signature for Content Authentication | |
Harba | Advanced password authentication protection by hybrid cryptography & audio steganography | |
Devi et al. | Preventing Data Leakage in Cloud Servers through Watermarking and Encryption Techniques | |
Xiong et al. | Secure multimedia distribution in cloud computing using re-encryption and fingerprinting | |
Mata et al. | Enhanced secure data storage in cloud computing using hybrid cryptographic techniques (AES and Blowfish) | |
CN113111360A (en) | File processing method | |
Rane et al. | Application-level and database security for e-commerce application | |
JP2007158984A (en) | Electronic document authenticity assurance method, and electronic document disclosure system | |
Shakor et al. | Hybrid security model for medical image protection in cloud | |
CN102724043A (en) | Single user authoring system for digital rights management |