Filters








1,843 Hits in 3.6 sec

Public-Key Steganography with Active Attacks [chapter]

Michael Backes, Christian Cachin
2005 Lecture Notes in Computer Science  
A complexity-theoretic model for public-key steganography with active attacks is introduced.  ...  can be realized from any PDR-CCA-secure public-key cryptosystem with pseudorandom ciphertexts.  ...  In Section 3 we establish such an equivalence formally for public-key systems with active attacks. Dedić et al.  ... 
doi:10.1007/978-3-540-30576-7_12 fatcat:xlt6scjb75hcbnuqccafr34oa4

Steganography Security: Principle and Practice [article]

Yan Ke, Jia Liu, Min-qing Zhang, Ting-ting Su, Xiao-yuan Yang
2018 arXiv   pre-print
Under the current technology situation, we then analyze the indistinguishability of the cover and stego-cover, and consider that the steganography security should rely on the key secrecy with algorithms  ...  By specifying the role of key in steganography, the necessary conditions for a secure steganography algorithm in theory are formally presented.  ...  Therefore, the steganography system gives Eve more active privileges to complete a passive attacking goal.  ... 
arXiv:1806.03618v2 fatcat:4e4llvj4qfedjhelbyi375obra

Smart-Lock Security Re-engineered Using Cryptography and Steganography [chapter]

Chaitanya Bapat, Ganesh Baleri, Shivani Inamdar, Anant V. Nimkar
2017 Communications in Computer and Information Science  
To connect a smart lock with a key, Bluetooth Low Energy (BLE) protocol can be used. BLE protocol is vulnerable to Man-in-the-Middle (MITM) attack. Ensuring security over BLE is an ongoing challenge.  ...  The observation shows that the combination of Image Steganography and Cryptography helps to overcome the vulnerabilities of BLE protocol.  ...  Here, as the public key used for encryption was attackers public key, decryption needs to be carried out using attackers private key.  ... 
doi:10.1007/978-981-10-6898-0_27 fatcat:74iabyht5jhgxj3ziq5a6inuc4

Knowledge Management Lifecycle Model in Islamic Banks

Nurdin Nurdin, Khaeruddin Yusuf
2018 Progress in Computing Applications  
But the using steganography made invisible the data exchange to a potential attacker.  ...  In this paper we present a Diffie-Hellman key exchange implementation using stéganographied images.  ...  This attack allows an attacker E to insert in the communication between A and B, he create a common key with A and do the same with B.  ... 
doi:10.6025/pca/2018/7/2/68-78 fatcat:6udzhbqve5djlkppkgttsfsvmi

Diffie-Hellman Key Exchange through Steganographied Images

Amine Khaldi
2018 Revista de Direito, Estado e Telecomunicações  
Methodology/approach/design – We present a Diffie-Hellman key exchange implementation using steganographied images. Using steganography made invisible the data exchange to a potential attacker.  ...  The Diffie-Hellman key exchange requires the use of digital signature or creating a secure channel for data exchanging to avoid the man-in-the-middle attack.  ...  This attack allows an attacker E to insert in the communication between A and B, he create a common key with A and do the same with B.  ... 
doi:10.26512/lstr.v10i1.21504 fatcat:r4yahrburrgfdde6buhey3ils4

An Inductive Approach to the Knack of Steganology

Remya AR, A Sreekumar
2013 International Journal of Computer Applications  
This paper presents a brief overview in the field of Steganology, especially steganography. General Terms Security, Communication systems.  ...  Steganography, the practice of concealing a message in any digital medium to the extent that it is not even revealed that a hidden communication is happening through.  ...  public key steganography.  ... 
doi:10.5120/12573-9200 fatcat:3kpcl7trsvdzxooklsttptgovy

Secure Video Transmission

Manveen Kaur, Anchal Maheshwari, Nidhi Anand
2015 International Journal of Computer Applications  
In continuation with this, we start by first describing the previously used algorithms and then enhancing them by describing the use of F5.  ...  The art of hiding information is known as steganography. Till now many algorithms have been proposed for steganography but they suffer few or more drawbacks.  ...  Methods of steganography-There are three methods used for steganography namely Pure, Secret Key and Public Key steganography.  ... 
doi:10.5120/20360-2562 fatcat:zr3kfyzygfdqndptdsscxjnyee

A Novel Approach for Improving Security by Digital Signature and Image Steganography

Sarika Sharma, V. Kapoor
2017 International Journal of Computer Applications  
Steganography is an encryption technique that can be used along with cryptography as more-protected method rising to protect data. Images are the most admired cover objects used for steganography.  ...  Information security is becoming more and more vital with the progress in the exchange of data. Protected communication in the network is a key necessity.  ...  They create the overview of this technique against adaptively chosen message attacks. In a signature scheme, all users distribute a public key while observance for himself a secret key [14] .  ... 
doi:10.5120/ijca2017915145 fatcat:botoj2w7a5fgbchqioyyixwdbe

An Adequate Password Authentication Scheme for Information Interchange using Keys
English

S Sandeep Babu, N.Subhash Chandra
2014 International Journal of Computer Trends and Technology  
communication and to make it a secure way the data is encrypted using the AES (Advanced Encryption Standard) and using the concept of Steganography the key is embedded in an image file and then transmitted  ...  Security concern is the major issue so we are going to implement the technique of data sharing over network using Advanced Encryption Standard (AES) algorithm with stenography concept.  ...  Security against Active Attack First we consider the active attack to a honest server, where the active adversary A, who compromised S2 and retend to the server S2 and client C to the communicate with  ... 
doi:10.14445/22312803/ijctt-v14p103 fatcat:ggkcflmapfgttgv424jygu55ti

Image Analysis for Online Dynamic Steganography Detection

Kevin Curran, Joanne Mc Devitt
2008 Computer and Information Science  
With this in mind there is a need to detect hidden data using Steganalysis -the art of detecting messages using Steganography.  ...  Steganography may be used to hide messages within images and it is widely believed that terrorist organizations may be communicating through the use of steganography.  ...  In Public Key Steganography both a public key and a private key are used. The public key is used in the embedding process and the private key is used in the extraction process.  ... 
doi:10.5539/cis.v1n3p32 fatcat:i3oerf2ndjeitnc3avbwnggepa

A Secure and Robust Certificateless Public Key Steganography Based on SVD-DDWT

Osman Wahballa, Abubaker Wahaballa, Fagen Li, Chunxiang Xu
2016 International Journal of Network Security  
This paper proposes a novel certificateless public key steganography that allows two parties that have no prior knowledge of each other to communicate covertly over public channel.  ...  Firstly, secure and high efficient rate of key distribution are provided.  ...  Current public key steganography schemes have been constructed based on traditional public-key infrastructure (PKI) or Identity-based cryptosystem (IBC).  ... 
dblp:journals/ijnsec/WahballaWLX16 fatcat:jafppamcujbdngccfyujzqa3ii

The Security of Arithmetic Compression Based Text Steganography Method

Reihane Saniei, Karim Faez
2013 International Journal of Electrical and Computer Engineering (IJECE)  
With regard to the spread of this category and existence of wide volume of approaches, this paper deals with comparison and evaluation of steganography security by a statistical compression method called  ...  In addition, stego key was placed in a format that it would not arouse any suspicions.  ...  This method against active attacks is not secure and if the active attacker manipulate coverage text or stego key (changing email address that placed at send section or change the email text), the only  ... 
doi:10.11591/ijece.v3i6.4068 fatcat:nmtz326wzffqrizps4fqkm7dqm

Novel and secure encoding and hiding techniques using image steganography: A survey

S. Ashwin, J. Ramesh, S. Aravind Kumar, K. Gunavathi
2012 2012 International Conference on Emerging Trends in Electrical Engineering and Energy Management (ICETEEEM)  
A method for concealment knowledge with two level of security to plant knowledge at the side of sensible sensory activity transparency and high payload capability.  ...  The method of applying steganography in conjunction with cryptography, referred to as twin steganography, develops a durable model that adds a lot of challenges in distinguishing any hidden and encoded  ...  The public key is (n,e,u ) and the private key is a (d,a,u) .  ... 
doi:10.1109/iceteeem.2012.6494463 fatcat:bjvzio7qwvbexccnszmicokxtu

Image Steganography: Protection of Digital Properties against Eavesdropping [article]

Ramita Maharjan, Ajay Kumar Shrestha, Rejina Basnet
2019 arXiv   pre-print
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information.  ...  For hiding secret information in images, there exists a large variety of steganography techniques. Some are more complex than others and all of them have respective strong and weak points.  ...  However, the encryption key can be made public as described by the name, "public-key algorithm".  ... 
arXiv:1909.04685v1 fatcat:22qhzazxifelhdrydshbc3rjnq

Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication

Jung-oh Park, Sanggeun Kim
2015 Advances in Multimedia  
In this paper, steganography is utilized to confirm the Data Masquerading and Data Modification and, in addition, to strengthen the security; the user information is protected based on PKI (public key  ...  Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper.  ...  The user sends the ID and password encrypted with the public key of VMS so that the user ID and password can only be decrypted by VMS and it is safe from external attacks such as password speculation attack  ... 
doi:10.1155/2015/960416 fatcat:ektycys5tvhhhdxxs4q7rnizfa
« Previous Showing results 1 — 15 out of 1,843 results