Sciweavers

2474 search results - page 3 / 495
» Attacks on Steganographic Systems
Sort
View
65
Voted
IJNSEC
2007
121views more  IJNSEC 2007»
14 years 9 months ago
Data Hiding in a Kind of PDF Texts for Secret Communication
In this paper, we present a novel steganographic technique for hiding data in a kind of PDF texts. We first point out the secret channels in a kind of PDF English texts, which ar...
Shangping Zhong, Xueqi Cheng, Tierui Chen
ICITA
2005
IEEE
15 years 3 months ago
Visual Steganalysis of LSB-Encoded Natural Images
Contemporary steganographic systems encode hidden messages inside the least significant bit layers of colour natural images. The presence of these messages is difficult to detect ...
Paul Andrew Watters, Frances Martin, H. Steffen St...
67
Voted
IH
1998
Springer
15 years 1 months ago
An Information-Theoretic Model for Steganography
An information-theoretic model for steganography with passive adversaries is proposed. The adversary's task of distinguishing between an innocent cover message C and a modi e...
Christian Cachin
ICALP
2005
Springer
15 years 3 months ago
On Steganographic Chosen Covertext Security
At TCC 2005, Backes and Cachin proposed a new and very strong notion of security for public key steganography: secrecy against adaptive chosen covertext attack (SS-CCA); and posed ...
Nicholas Hopper
CORR
2007
Springer
117views Education» more  CORR 2007»
14 years 9 months ago
Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions
An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext,...
Ying Wang, Pierre Moulin