• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,132
Next 10 →

Locating Secret Messages in Images

by Ian Davidson, Goutam Paul , 2004
"... Steganography involves hiding messages in innocuous media such as images, while steganalysis is the field of detecting these secret messages. The ultimate goal of steganalysis is two-fold: making a binary classification of a file as stego-bearing or innocent, and secondly, locating the hidden messag ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Steganography involves hiding messages in innocuous media such as images, while steganalysis is the field of detecting these secret messages. The ultimate goal of steganalysis is two-fold: making a binary classification of a file as stego-bearing or innocent, and secondly, locating the hidden

Finding secret messages in DNA microdots

by Stephen A. Jarvis, Jason S. Mirsky, John F. Peden, Nigel J. Saunders
"... Motivation: A DNA microdot oers a novel way in which to communicate secret information. It is an extension of the more traditional microdot, a greatly reduced photograph of a secret document which replaced a full stop somewhere in an innocent-looking letter. The DNA microdot appears to be the secure ..."
Abstract - Add to MetaCart
to be the secure modern alternative, exploiting the complexity of DNA in which a coded secret message is hidden. An enemy can only unlock the secret information by rst knowing that an intercepted letter is impregnated with microdot DNA, and secondly by nding the message amongst a huge amount of background DNA used

Stochastic Approach to Secret Message Length . . .

by Taras Holotyak, Jessica Fridrich, David Soukal
"... In this paper, we propose a new method for estimation of the number of embedding changes for non-adaptive ±k embedding in images. By modeling the cover image and the stego noise as additive mixture of random processes, the stego message is estimated from the stego image using a denoising filter in t ..."
Abstract - Cited by 8 (1 self) - Add to MetaCart
In this paper, we propose a new method for estimation of the number of embedding changes for non-adaptive ±k embedding in images. By modeling the cover image and the stego noise as additive mixture of random processes, the stego message is estimated from the stego image using a denoising filter

Hiding Secret Messages in Huffman Trees

by Philip C Ritchey , Vernon J Rego - Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP , 2012
"... Abstract-A novel scheme for hiding information in Huffman trees is presented. Huffman trees are graphical representations of Huffman codes, which are optimal prefix-free codes generated by a simple algorithm given the distribution of the symbols. Huffman codes are used by MP3 and JPEG file formats ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract-A novel scheme for hiding information in Huffman trees is presented. Huffman trees are graphical representations of Huffman codes, which are optimal prefix-free codes generated by a simple algorithm given the distribution of the symbols. Huffman codes are used by MP3 and JPEG file formats for compressing audio and image files, but are also used for text documents and other digital media. The capacity, robustness and security of the information hiding scheme are analyzed and measured empirically. The results show that the scheme achieves a low capacity relative to the size of the coverobject and that the channel is not robust against an active adversary which knows about the channel. The security results show that an informed passive adversary's detection accuracy is greater than 90% if she has access to the symbol distribution and equivalent to pure guessing otherwise.

Advanced Steganography Algorithm using encrypted secret message

by Joyshree Nath, Asoke Nath - International Journal of Advanced ComputerScience and Application (IJACSA)Vol-2 No.3 , 1924
"... Abstract—In the present work the authors have introduced a new method for hiding any encrypted secret message inside a cover file. For encrypting secret message the authors have used new algorithm proposed by Nath et al(1). For hiding secret message we have used a method proposed by Nath et al (2). ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Abstract—In the present work the authors have introduced a new method for hiding any encrypted secret message inside a cover file. For encrypting secret message the authors have used new algorithm proposed by Nath et al(1). For hiding secret message we have used a method proposed by Nath et al (2

How to leak a secret

by Ronald L. Rivest, Adi Shamir, Yael Tauman - PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON THE THEORY AND APPLICATION OF CRYPTOLOGY AND INFORMATION SECURITY: ADVANCES IN CRYPTOLOGY , 2001
"... In this paper we formalize the notion of a ring signature, which makes it possible to specify a set of possible signers without revealing which member actually produced the signature. Unlike group signatures, ring signatures have no group managers, no setup procedures, no revocation procedures, and ..."
Abstract - Cited by 2580 (4 self) - Add to MetaCart
, and no coordination: any user can choose any set of possible signers that includes himself, and sign any message by using his secret key and the others ’ public keys, without getting their approval or assistance. Ring signatures provide an elegant way to leak authoritative secrets in an anonymous way, to sign casual

Secret Message and Encrypted Embedded Cover File

by Joyshree Nath, Saima Ghosh, Asoke Nath
"... In the present work the authors are proposing a new steganography method to hide any encrypted secret message in multiple steps. In step-1 the secret message is encrypted using TTJSA algorithm. In step-2 we embed this encrypted message inside one known image or audio file using 4-th bit from LSB su ..."
Abstract - Add to MetaCart
In the present work the authors are proposing a new steganography method to hide any encrypted secret message in multiple steps. In step-1 the secret message is encrypted using TTJSA algorithm. In step-2 we embed this encrypted message inside one known image or audio file using 4-th bit from LSB

Secret Message Sharing Using Online Social Media

by Jianxia Ning, Indrajeet Singh, Harsha V. Madhyastha
"... Abstract—Recently, there have been proposals to evade censors by using steganography to embed secret messages in images shared on public photo-sharing sites. However, establishing a covert channel in this manner is not straightforward. First, photo-sharing sites often process uploaded images, thus d ..."
Abstract - Add to MetaCart
Abstract—Recently, there have been proposals to evade censors by using steganography to embed secret messages in images shared on public photo-sharing sites. However, establishing a covert channel in this manner is not straightforward. First, photo-sharing sites often process uploaded images, thus

HMAC: Keyed-Hashing for Message Authentication

by H. Krawczyk, M. Bellare, R. Canetti , 1997
"... This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. Distribution of this memo is unlimited. This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative ..."
Abstract - Cited by 452 (4 self) - Add to MetaCart
This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. Distribution of this memo is unlimited. This document describes HMAC, a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any

1Secret-message capacity of a line network

by Athanasios Papadopoulos, Laszlo Czap, Christina Fragouli
"... We investigate the problem of information theoretically secure communication in a line network with erasure channels and state feedback. We consider a spectrum of cases for the private randomness that intermediate nodes can generate, ranging from having intermediate nodes generate unlimited private ..."
Abstract - Add to MetaCart
randomness, to having intermediate nodes generate no private randomness, and all cases in between. We characterize the secret message capacity when either only one of the channels is eavesdropped or all of the channels are eavesdropped, and we develop polynomial time algorithms that achieve these capacities
Next 10 →
Results 1 - 10 of 2,132
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University