메뉴 건너뛰기




Volumn 6, Issue 3, 2004, Pages 501-509

A steganographic scheme for secure communications based on the chaos and Euler theorem

Author keywords

Asymmetric orbit; Covert communication; Dynamic system; Man in the middle attack; Steganography

Indexed keywords

CHAOS THEORY; DATA TRANSFER; DIGITAL WATERMARKING; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; INFORMATION ANALYSIS; MATHEMATICAL MODELS; ROBUSTNESS (CONTROL SYSTEMS);

EID: 2642515522     PISSN: 15209210     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMM.2004.827493     Document Type: Article
Times cited : (64)

References (21)
  • 2
    • 0017930809 scopus 로고
    • A method for obtaining digital signature and public-key cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signature and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 6
    • 0000370347 scopus 로고
    • Video-steganography: How to secretly embed a signature in a picture
    • K. Matsui and K. Tanaka, "Video-steganography: How to secretly embed a signature in a picture," in Proc. IMA Intellectual Property Project, vol. 1, 1994, pp. 187-205.
    • (1994) Proc. IMA Intellectual Property Project , vol.1 , pp. 187-205
    • Matsui, K.1    Tanaka, K.2
  • 10
    • 0034140535 scopus 로고    scopus 로고
    • Fault resilient and compression tolerant digital signature for image authentication
    • Feb.
    • D.-C. Lou and J.-L. Liu, "Fault resilient and compression tolerant digital signature for image authentication," IEEE Trans. Consumer Electron., vol. 46, pp. 31-39, Feb. 2000.
    • (2000) IEEE Trans. Consumer Electron. , vol.46 , pp. 31-39
    • Lou, D.-C.1    Liu, J.-L.2
  • 11
    • 0035421311 scopus 로고    scopus 로고
    • Adaptive digital watermarking using fuzzy clustering technique
    • Aug.
    • D.-C. Lou and T.-L. Yin, "Adaptive digital watermarking using fuzzy clustering technique," IEICE Trans. Fund. Electron., Commun., Comput. Sci., vol. E84-A, no. 8, pp. 2052-2060, Aug. 2001.
    • (2001) IEICE Trans. Fund. Electron., Commun., Comput. Sci. , vol.E84-A , Issue.8 , pp. 2052-2060
    • Lou, D.-C.1    Yin, T.-L.2
  • 13
    • 0001217738 scopus 로고
    • The prisoners' problem and the subliminal channels
    • Santa Barbara, CA
    • G. J. Simmons, "The prisoners' problem and the subliminal channels," in Proc. Annu. Int. Cryptology Conf., Santa Barbara, CA, 1984, pp. 51-67.
    • (1984) Proc. Annu. Int. Cryptology Conf. , pp. 51-67
    • Simmons, G.J.1
  • 15
    • 0000657882 scopus 로고
    • Period of a discrete cat mapping
    • Aug.-Sept.
    • F. J. Dyson and H. Falk, "Period of a discrete cat mapping," Amer. Math. Mon., vol. 99, pp. 603-624, Aug.-Sept. 1992.
    • (1992) Amer. Math. Mon. , vol.99 , pp. 603-624
    • Dyson, F.J.1    Falk, H.2
  • 17
    • 0009237032 scopus 로고
    • On the signature reblocking problem in public-key cryptosystem
    • L. M. Konfelder, "On the signature reblocking problem in public-key cryptosystem," Commun. ACM, vol. 21, no. 2, p. 179, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 179
    • Konfelder, L.M.1
  • 19
    • 84904224992 scopus 로고    scopus 로고
    • Steganalysis of images created using current steganography software
    • Apr.
    • N. Johnson and S. Jajodia, "Steganalysis of images created using current steganography software," in Proc. Second Workshop on Information Hiding, Apr. 1998, pp. 273-289.
    • (1998) Proc. Second Workshop on Information Hiding , pp. 273-289
    • Johnson, N.1    Jajodia, S.2
  • 21
    • 0030143030 scopus 로고    scopus 로고
    • Fast exponentiation method obtained by folding the exponent in half
    • May
    • D.-C. Lou and C.-C. Chang, "Fast exponentiation method obtained by folding the exponent in half," Electron. Lett., vol. 32, no. 11, pp. 984-985, May 1996.
    • (1996) Electron. Lett. , vol.32 , Issue.11 , pp. 984-985
    • Lou, D.-C.1    Chang, C.-C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.