A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Public-Key Steganography with Active Attacks
[chapter]
2005
Lecture Notes in Computer Science
A complexity-theoretic model for public-key steganography with active attacks is introduced. ...
can be realized from any PDR-CCA-secure public-key cryptosystem with pseudorandom ciphertexts. ...
In Section 3 we establish such an equivalence formally for public-key systems with active attacks. Dedić et al. ...
doi:10.1007/978-3-540-30576-7_12
fatcat:xlt6scjb75hcbnuqccafr34oa4
Steganography Security: Principle and Practice
[article]
2018
arXiv
pre-print
Under the current technology situation, we then analyze the indistinguishability of the cover and stego-cover, and consider that the steganography security should rely on the key secrecy with algorithms ...
By specifying the role of key in steganography, the necessary conditions for a secure steganography algorithm in theory are formally presented. ...
Therefore, the steganography system gives Eve more active privileges to complete a passive attacking goal. ...
arXiv:1806.03618v2
fatcat:4e4llvj4qfedjhelbyi375obra
Smart-Lock Security Re-engineered Using Cryptography and Steganography
[chapter]
2017
Communications in Computer and Information Science
To connect a smart lock with a key, Bluetooth Low Energy (BLE) protocol can be used. BLE protocol is vulnerable to Man-in-the-Middle (MITM) attack. Ensuring security over BLE is an ongoing challenge. ...
The observation shows that the combination of Image Steganography and Cryptography helps to overcome the vulnerabilities of BLE protocol. ...
Here, as the public key used for encryption was attackers public key, decryption needs to be carried out using attackers private key. ...
doi:10.1007/978-981-10-6898-0_27
fatcat:74iabyht5jhgxj3ziq5a6inuc4
Knowledge Management Lifecycle Model in Islamic Banks
2018
Progress in Computing Applications
But the using steganography made invisible the data exchange to a potential attacker. ...
In this paper we present a Diffie-Hellman key exchange implementation using stéganographied images. ...
This attack allows an attacker E to insert in the communication between A and B, he create a common key with A and do the same with B. ...
doi:10.6025/pca/2018/7/2/68-78
fatcat:6udzhbqve5djlkppkgttsfsvmi
Diffie-Hellman Key Exchange through Steganographied Images
2018
Revista de Direito, Estado e Telecomunicações
Methodology/approach/design – We present a Diffie-Hellman key exchange implementation using steganographied images. Using steganography made invisible the data exchange to a potential attacker. ...
The Diffie-Hellman key exchange requires the use of digital signature or creating a secure channel for data exchanging to avoid the man-in-the-middle attack. ...
This attack allows an attacker E to insert in the communication between A and B, he create a common key with A and do the same with B. ...
doi:10.26512/lstr.v10i1.21504
fatcat:r4yahrburrgfdde6buhey3ils4
An Inductive Approach to the Knack of Steganology
2013
International Journal of Computer Applications
This paper presents a brief overview in the field of Steganology, especially steganography. General Terms Security, Communication systems. ...
Steganography, the practice of concealing a message in any digital medium to the extent that it is not even revealed that a hidden communication is happening through. ...
public key steganography. ...
doi:10.5120/12573-9200
fatcat:3kpcl7trsvdzxooklsttptgovy
Secure Video Transmission
2015
International Journal of Computer Applications
In continuation with this, we start by first describing the previously used algorithms and then enhancing them by describing the use of F5. ...
The art of hiding information is known as steganography. Till now many algorithms have been proposed for steganography but they suffer few or more drawbacks. ...
Methods of steganography-There are three methods used for steganography namely Pure, Secret Key and Public Key steganography. ...
doi:10.5120/20360-2562
fatcat:zr3kfyzygfdqndptdsscxjnyee
A Novel Approach for Improving Security by Digital Signature and Image Steganography
2017
International Journal of Computer Applications
Steganography is an encryption technique that can be used along with cryptography as more-protected method rising to protect data. Images are the most admired cover objects used for steganography. ...
Information security is becoming more and more vital with the progress in the exchange of data. Protected communication in the network is a key necessity. ...
They create the overview of this technique against adaptively chosen message attacks. In a signature scheme, all users distribute a public key while observance for himself a secret key [14] . ...
doi:10.5120/ijca2017915145
fatcat:botoj2w7a5fgbchqioyyixwdbe
An Adequate Password Authentication Scheme for Information Interchange using Keys
English
2014
International Journal of Computer Trends and Technology
English
communication and to make it a secure way the data is encrypted using the AES (Advanced Encryption Standard) and using the concept of Steganography the key is embedded in an image file and then transmitted ...
Security concern is the major issue so we are going to implement the technique of data sharing over network using Advanced Encryption Standard (AES) algorithm with stenography concept. ...
Security against Active Attack First we consider the active attack to a honest server, where the active adversary A, who compromised S2 and retend to the server S2 and client C to the communicate with ...
doi:10.14445/22312803/ijctt-v14p103
fatcat:ggkcflmapfgttgv424jygu55ti
Image Analysis for Online Dynamic Steganography Detection
2008
Computer and Information Science
With this in mind there is a need to detect hidden data using Steganalysis -the art of detecting messages using Steganography. ...
Steganography may be used to hide messages within images and it is widely believed that terrorist organizations may be communicating through the use of steganography. ...
In Public Key Steganography both a public key and a private key are used. The public key is used in the embedding process and the private key is used in the extraction process. ...
doi:10.5539/cis.v1n3p32
fatcat:i3oerf2ndjeitnc3avbwnggepa
A Secure and Robust Certificateless Public Key Steganography Based on SVD-DDWT
2016
International Journal of Network Security
This paper proposes a novel certificateless public key steganography that allows two parties that have no prior knowledge of each other to communicate covertly over public channel. ...
Firstly, secure and high efficient rate of key distribution are provided. ...
Current public key steganography schemes have been constructed based on traditional public-key infrastructure (PKI) or Identity-based cryptosystem (IBC). ...
dblp:journals/ijnsec/WahballaWLX16
fatcat:jafppamcujbdngccfyujzqa3ii
The Security of Arithmetic Compression Based Text Steganography Method
2013
International Journal of Electrical and Computer Engineering (IJECE)
With regard to the spread of this category and existence of wide volume of approaches, this paper deals with comparison and evaluation of steganography security by a statistical compression method called ...
In addition, stego key was placed in a format that it would not arouse any suspicions. ...
This method against active attacks is not secure and if the active attacker manipulate coverage text or stego key (changing email address that placed at send section or change the email text), the only ...
doi:10.11591/ijece.v3i6.4068
fatcat:nmtz326wzffqrizps4fqkm7dqm
Novel and secure encoding and hiding techniques using image steganography: A survey
2012
2012 International Conference on Emerging Trends in Electrical Engineering and Energy Management (ICETEEEM)
A method for concealment knowledge with two level of security to plant knowledge at the side of sensible sensory activity transparency and high payload capability. ...
The method of applying steganography in conjunction with cryptography, referred to as twin steganography, develops a durable model that adds a lot of challenges in distinguishing any hidden and encoded ...
The public key is (n,e,u ) and the private key is a (d,a,u) . ...
doi:10.1109/iceteeem.2012.6494463
fatcat:bjvzio7qwvbexccnszmicokxtu
Image Steganography: Protection of Digital Properties against Eavesdropping
[article]
2019
arXiv
pre-print
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. ...
For hiding secret information in images, there exists a large variety of steganography techniques. Some are more complex than others and all of them have respective strong and weak points. ...
However, the encryption key can be made public as described by the name, "public-key algorithm". ...
arXiv:1909.04685v1
fatcat:22qhzazxifelhdrydshbc3rjnq
Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication
2015
Advances in Multimedia
In this paper, steganography is utilized to confirm the Data Masquerading and Data Modification and, in addition, to strengthen the security; the user information is protected based on PKI (public key ...
Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper. ...
The user sends the ID and password encrypted with the public key of VMS so that the user ID and password can only be decrypted by VMS and it is safe from external attacks such as password speculation attack ...
doi:10.1155/2015/960416
fatcat:ektycys5tvhhhdxxs4q7rnizfa
« Previous
Showing results 1 — 15 out of 1,843 results