One-time hash steganography

被引:0
|
作者
Shin, N [1 ]
机构
[1] Univ Tokyo, Dept Informat Sci, Tokyo, Japan
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we first generalize the steganography system model which Christian Cachin proposed, and specialize it to be suitable for computer oriented steganography systems. Based on this model, we introduce a new perfectly secure steganography scheme, one-time hash steganography, with which one can hide a secret bit into any cover-data that satisfies certain condition (partial recomputability). Finally we prove that there exists a perfectly secure steganography system with given cover-data source if and only if the cover-data source is partially recomputable to its sender.
引用
下载
收藏
页码:17 / 28
页数:12
相关论文
共 50 条
  • [41] On the efficiency of one-time digital signatures
    Bleichenbacher, Daniel
    Maurer, Ueli
    Lecture Notes in Computer Science, 1163
  • [42] One-time proxy signatures revisited
    Bicakci, Kemal
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (04) : 499 - 505
  • [43] On the (non)universality of the one-time pad
    Dodis, Y
    Spencer, J
    FOCS 2002: 43RD ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2002, : 376 - 385
  • [44] One-Time Traceable Ring Signatures
    Scafuro, Alessandra
    Zhang, Bihan
    COMPUTER SECURITY - ESORICS 2021, PT II, 2021, 12973 : 481 - 500
  • [45] One-Time Programs Made Practical
    Zhao, Lianying
    Choi, Joseph I.
    Demirag, Didem
    Butler, Kevin R. B.
    Mannan, Mohammad
    Ayday, Erman
    Clark, Jeremy
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2019, 2019, 11598 : 646 - 666
  • [46] Program obfuscation and one-time programs
    Goldwasser, Shafi
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 333 - 334
  • [47] Reflections of a one-time Maoist activist
    Banerjee, Sumanta
    DIALECTICAL ANTHROPOLOGY, 2009, 33 (3-4) : 253 - 269
  • [48] One-Time Programs with Limited Memory
    Durnoga, Konrad
    Dziembowski, Stefan
    Kazana, Tomasz
    Zajac, Michal
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 377 - 394
  • [49] Efficient one-time proxy signatures
    Mehta, M
    Harn, L
    IEE PROCEEDINGS-COMMUNICATIONS, 2005, 152 (02): : 129 - 133
  • [50] A new One-time Password Method
    Huang, Yun
    Huang, Zheng
    Zhao, Haoran
    Lai, Xuejia
    2013 INTERNATIONAL CONFERENCE ON ELECTRONIC ENGINEERING AND COMPUTER SCIENCE (EECS 2013), 2013, 4 : 32 - 37