One-time hash steganography

被引:0
|
作者
Shin, N [1 ]
机构
[1] Univ Tokyo, Dept Informat Sci, Tokyo, Japan
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we first generalize the steganography system model which Christian Cachin proposed, and specialize it to be suitable for computer oriented steganography systems. Based on this model, we introduce a new perfectly secure steganography scheme, one-time hash steganography, with which one can hide a secret bit into any cover-data that satisfies certain condition (partial recomputability). Finally we prove that there exists a perfectly secure steganography system with given cover-data source if and only if the cover-data source is partially recomputable to its sender.
引用
下载
收藏
页码:17 / 28
页数:12
相关论文
共 50 条
  • [1] One-Time Signatures and Chameleon Hash Functions
    Mohassel, Payman
    SELECTED AREAS IN CRYPTOGRAPHY, 2011, 6544 : 302 - 319
  • [2] One-Time Password Authentication with Infinite Hash Chains
    Chefranov, Alexander G.
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS, AUTOMATION AND INDUSTRIAL ELECTRONICS, 2008, : 283 - 286
  • [3] One-Time Password System with Infinite Nested Hash Chains
    Eldefrawy, Mohamed Hamdy
    Khan, Muhammad Khurram
    Alghathbar, Khaled
    SECURITY TECHNOLOGY, DISASTER RECOVERY AND BUSINESS CONTINUITY, 2010, 122 : 161 - 170
  • [4] Covert Channels in One-Time Passwords Based on Hash Chains
    Keller, Jorg
    Wendzel, Steffen
    EUROPEAN INTERDISCIPLINARY CYBERSECURITY - EICC 2020, 2020,
  • [5] One-Time Chameleon Hash Function and Its Application in Redactable Blockchain
    Gao W.
    Chen L.
    Tang C.
    Zhang G.
    Li F.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2310 - 2318
  • [6] A countermeasure of fake root key installation using one-time hash chain
    Lee, Younggyo
    Ahm, Jeonghee
    Kim, Seungjoo
    Won, Dongho
    AGENT AND MULTI-AGENT SYSTEMS: TECHNOLOGIES AND APPLICATIONS, PROCEEDINGS, 2007, 4496 : 1007 - +
  • [7] Implementation of one-time editable blockchain chameleon hash function construction scheme
    Qiao, Yixuan
    Zheng, Minghui
    Yang, Jingyi
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 851 - 856
  • [8] On one-time cookies protocol based on one-time password
    Junhui He
    Dezhi Han
    Kuan-Ching Li
    Soft Computing, 2020, 24 : 5657 - 5670
  • [9] Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups
    Pan, Ping
    Wang, Licheng
    Yang, Yixian
    Gan, Yuanju
    Wang, Lihua
    Xu, Chengqian
    FUNDAMENTA INFORMATICAE, 2013, 126 (01) : 103 - 119
  • [10] On one-time cookies protocol based on one-time password
    He, Junhui
    Han, Dezhi
    Li, Kuan-Ching
    SOFT COMPUTING, 2020, 24 (08) : 5657 - 5670