Sciweavers

1875 search results - page 2 / 375
» Modeling the Security of Steganographic Systems
Sort
View
IH
1998
Springer
13 years 10 months ago
Steganography in a Video Conferencing System
We describe a steganographic system which embeds secret messages into a video stream. We examine the signal path which typically includes discrete cosine transformation (DCT) based...
Andreas Westfeld, Gritta Wolf
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
13 years 11 months ago
Public-Key Steganography with Active Attacks
A complexity-theoretic model for public-key steganography with active attacks is introduced. The notion of steganographic security against adaptive chosen-covertext attacks (SS-CC...
Michael Backes, Christian Cachin
CSREASAM
2006
13 years 7 months ago
Case Study: An Implementation of a Secure Steganographic System
- In this paper, we present the development of a Windows-based application implemented on the Microsoft .NET platform as a framework to allow a user to first compress and encrypt a...
Xuan-Hien Dang, Krishna C. S. Kota
CSREASAM
2006
13 years 7 months ago
A New Robust and Secure Steganographic System for Greyscale Images
: The research work in this paper shows that the currently available stenographic methods might be quite easily detected by using sufficiently careful analysis of the transmitted d...
Hesham Elzouka
CORR
2006
Springer
88views Education» more  CORR 2006»
13 years 6 months ago
Provably Secure Universal Steganographic Systems
Boris Ryabko, Daniil Ryabko