Key-efficient steganography

A Kiayias, A Russell, N Shashidhar - International Workshop on …, 2012 - Springer
Steganographic protocols enable one to embed covert mes… , private-key steganographic
encryption protocol secure in the … truly key-length efficient steganographic system. Furthermore, …

Broadcast steganography

N Fazio, AR Nicolosi, IM Perera - Cryptographers' Track at the RSA …, 2014 - Springer
… This approach was further refined in [36] to obtain a key-efficient steganographic system,
where the gain stems from employing a novel rejection sampling method based on extractors. …

Hard Communication Channels for Steganography

S Berndt, M Liskiewicz - 27th International Symposium on …, 2016 - drops.dagstuhl.de
… This paper considers steganography – the concept of hiding … Very recently the first (non-polynomial
time) steganographic … that secure and reliable steganography exists independently of …

A one-time stegosystem and applications to efficient covert communication

A Kiayias, Y Raekow, A Russell, N Shashidhar - Journal of cryptology, 2014 - Springer
… We present the first information-theoretic steganographic protocol with an asymptotically
optimal ratio of key length to message length that operates on arbitrary covertext distributions …

[PDF][PDF] Improvement of Data Hiding using Images with Random Image Key Generation

S Kumari, A Bansiya - 2018 - academia.edu
Image watermarking is one of the efficient technique to send the secret information from
sender to receiver. The concept of information hiding using mosaic images is also an efficient …

A coverless steganography method based on generative adversarial network

X Duan, B Li, D Guo, Z Zhang, Y Ma - EURASIP Journal on Image and …, 2020 - Springer
… The simplest steganography algorithm is the least significant bit (LSB) information hiding, …
steganography image [11]. With the development of steganography, the new steganography

Reliability of system synchronization with hidden transmission of a control signal

AA Zhgun, TV Zhgun - AIP Conference Proceedings, 2022 - pubs.aip.org
… , is called steganography. In steganographic systems, the presence of a useful signal is
hidden from unauthorized users of the information system. Computer steganography is based on …

Secure Data Hiding with Chaotic Maps

AS Abd, OQJ Al-Thahab… - 2024 3rd International …, 2024 - ieeexplore.ieee.org
… This project proposes a secure system that uses a combination of steganography and
encryption to protect sensitive information from manipulation and unauthorized attacks. This …

An encrypted image retrieval method based on Harris corner optimization and LSH in cloud computing

J Qin, H Li, X Xiang, Y Tan, W Pan, W Ma… - IEEE Access, 2019 - ieeexplore.ieee.org
The encrypted image retrieval in cloud computing is a key technology to realize the massive
images of storage and management and images safety. In this paper, a novel feature …

Quantum Based Macorpgraphy System Implementations for Attacks in Data Maintenance

P Kumar, A Pathani, Z Alsalami, KK Dixit… - 2024 4th …, 2024 - ieeexplore.ieee.org
… Strong cloud security has been developed by proposing hybrid models that involve quantum
cryptography and steganography. A novel progressive QKDP model was developed to …