Network Based Public Key Method for Steganography

Samir Kumar Bandyopadhyay, Tai-Hoon Kim, Sarthak Parui
2011 2011 International Conference on Ubiquitous Computing and Multimedia Applications  
Steganography (a rough Greek translation of the term Steganography is secret writing) has been used in various forms for 2500 years. It has found use in variously in military, diplomatic, personal and intellectual property applications. Briefly stated, steganography is the term applied to any number of processes that will hide a message within an object, where the hidden message will not be apparent to an observer. The original steganographic applications used "null ciphers", or clear text. A
more » ... ll cipher conveys that the message has not been encrypted in any way, whether it is using basic character shifting, substitution or advanced modern day encryption algorithm. So, the message is often in plain view but for a reason can either not be detected as being present or cannot be seen once detected. As is common with cryptography, steganography has its roots in military and government applications and has advanced in ingenuity and complexity. In this paper, Network Based Public Key Method for Steganography is proposed under RSA cryptographic assumptions.
doi:10.1109/ucma.2011.19 fatcat:ceyvn7ewkbhl7basuu4zhv3sgq