Sciweavers

91 search results - page 2 / 19
» New approaches to encryption and steganography for digital v...
Sort
View
ESORICS
2004
Springer
13 years 10 months ago
A Public-Key Encryption Scheme with Pseudo-random Ciphertexts
This work presents a practical public-key encryption scheme that offers security under adaptive chosen-ciphertext attack (CCA) and has pseudo-random ciphertexts, i.e. ciphertexts ...
Bodo Möller
IH
1999
Springer
13 years 9 months ago
Developments in Steganography
Abstract. This paper presents two main results. The first is a new approach to steganography in which data is encoded in correlations among the pixels in an image. Almost all prev...
Joshua R. Smith, Chris Dodge
ICDS
2010
IEEE
13 years 11 months ago
e-Fraud Prevention Based on the Self-Authentication of e-Documents
—We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bi...
J. M. Blackledge, E. Coyle
MMSEC
2004
ACM
137views Multimedia» more  MMSEC 2004»
13 years 10 months ago
Perturbed quantization steganography with wet paper codes
In this paper, we introduce a new approach to passive-warden steganography in which the sender embeds the secret message into a certain subset of the cover object without having t...
Jessica J. Fridrich, Miroslav Goljan, David Soukal
CORR
2010
Springer
95views Education» more  CORR 2010»
13 years 4 months ago
M-Banking Security - a futuristic improved security approach
In last few decades large technology development raised various new needs. Financial sector has also no exception. People are approaching all over the world to fulfill there dream...
Geeta S. Navale, Swati S. Joshi, Aaradhana A. Desh...