Sciweavers

8 search results - page 1 / 2
» Public-Key Steganography
Sort
View
EUROCRYPT
2004
Springer
13 years 10 months ago
Public-Key Steganography
Informally, a public-key steganography protocol allows two parties, who have never met or exchanged a secret, to send hidden messages over a public channel so that an adversary can...
Luis von Ahn, Nicholas J. Hopper
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
13 years 10 months ago
Public-Key Steganography with Active Attacks
A complexity-theoretic model for public-key steganography with active attacks is introduced. The notion of steganographic security against adaptive chosen-covertext attacks (SS-CC...
Michael Backes, Christian Cachin
ESORICS
2004
Springer
13 years 10 months ago
A Public-Key Encryption Scheme with Pseudo-random Ciphertexts
This work presents a practical public-key encryption scheme that offers security under adaptive chosen-ciphertext attack (CCA) and has pseudo-random ciphertexts, i.e. ciphertexts ...
Bodo Möller
IH
1999
Springer
13 years 9 months ago
Developments in Steganography
Abstract. This paper presents two main results. The first is a new approach to steganography in which data is encoded in correlations among the pixels in an image. Almost all prev...
Joshua R. Smith, Chris Dodge