Key-efficient steganography
… Steganographic protocols enable one to embed covert mes… , private-key steganographic
encryption protocol secure in the … truly key-length efficient steganographic system. Furthermore, …
encryption protocol secure in the … truly key-length efficient steganographic system. Furthermore, …
Broadcast steganography
… This approach was further refined in [36] to obtain a key-efficient steganographic system,
where the gain stems from employing a novel rejection sampling method based on extractors. …
where the gain stems from employing a novel rejection sampling method based on extractors. …
Hard Communication Channels for Steganography
S Berndt, M Liskiewicz - 27th International Symposium on …, 2016 - drops.dagstuhl.de
… This paper considers steganography – the concept of hiding … Very recently the first (non-polynomial
time) steganographic … that secure and reliable steganography exists independently of …
time) steganographic … that secure and reliable steganography exists independently of …
A one-time stegosystem and applications to efficient covert communication
… We present the first information-theoretic steganographic protocol with an asymptotically
optimal ratio of key length to message length that operates on arbitrary covertext distributions …
optimal ratio of key length to message length that operates on arbitrary covertext distributions …
[PDF][PDF] Improvement of Data Hiding using Images with Random Image Key Generation
S Kumari, A Bansiya - 2018 - academia.edu
Image watermarking is one of the efficient technique to send the secret information from
sender to receiver. The concept of information hiding using mosaic images is also an efficient …
sender to receiver. The concept of information hiding using mosaic images is also an efficient …
A coverless steganography method based on generative adversarial network
X Duan, B Li, D Guo, Z Zhang, Y Ma - EURASIP Journal on Image and …, 2020 - Springer
… The simplest steganography algorithm is the least significant bit (LSB) information hiding, …
steganography image [11]. With the development of steganography, the new steganography …
steganography image [11]. With the development of steganography, the new steganography …
Reliability of system synchronization with hidden transmission of a control signal
AA Zhgun, TV Zhgun - AIP Conference Proceedings, 2022 - pubs.aip.org
… , is called steganography. In steganographic systems, the presence of a useful signal is
hidden from unauthorized users of the information system. Computer steganography is based on …
hidden from unauthorized users of the information system. Computer steganography is based on …
Secure Data Hiding with Chaotic Maps
AS Abd, OQJ Al-Thahab… - 2024 3rd International …, 2024 - ieeexplore.ieee.org
… This project proposes a secure system that uses a combination of steganography and
encryption to protect sensitive information from manipulation and unauthorized attacks. This …
encryption to protect sensitive information from manipulation and unauthorized attacks. This …
An encrypted image retrieval method based on Harris corner optimization and LSH in cloud computing
The encrypted image retrieval in cloud computing is a key technology to realize the massive
images of storage and management and images safety. In this paper, a novel feature …
images of storage and management and images safety. In this paper, a novel feature …
Quantum Based Macorpgraphy System Implementations for Attacks in Data Maintenance
P Kumar, A Pathani, Z Alsalami, KK Dixit… - 2024 4th …, 2024 - ieeexplore.ieee.org
… Strong cloud security has been developed by proposing hybrid models that involve quantum
cryptography and steganography. A novel progressive QKDP model was developed to …
cryptography and steganography. A novel progressive QKDP model was developed to …