메뉴 건너뛰기




Volumn 58, Issue 5, 2009, Pages 662-676

Provably secure steganography

Author keywords

Covert channels; Provable security; Steganography

Indexed keywords

CHANNEL DISTRIBUTIONS; COMPUTATIONALLY EFFICIENT; COVERT CHANNELS; HIDDEN MESSAGES; INDEXED FAMILIES; INDISTINGUISHABILITY; MUTUAL INFORMATIONS; ONE-WAY FUNCTIONS; PROVABLE SECURITY; PROVABLY SECURE; PUBLIC COMMUNICATIONS; SECRET MESSAGES; SECURE STEGANOGRAPHY; STEGANOGRAPHIC SECURITIES; STEGANOGRAPHY; WORST CASE;

EID: 65149095168     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2008.199     Document Type: Article
Times cited : (64)

References (29)
  • 1
    • 0015672289 scopus 로고
    • A Note on the Confinement Problem
    • B.W. Lampson, "A Note on the Confinement Problem," Comm. ACM, vol. 16, no. 10, pp. 613-615, 1973.
    • (1973) Comm. ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 4
    • 3042817554 scopus 로고
    • Steganography in Digital Images,
    • PhD dissertation, Cambridge Univ, Selwyn College, May
    • G. Jagpal, "Steganography in Digital Images," PhD dissertation, Cambridge Univ., Selwyn College, May 1995.
    • (1995)
    • Jagpal, G.1
  • 6
    • 0000370347 scopus 로고
    • Video-Steganography: How to Secretly Embed a Signature in a Picture
    • K. Matsui and K. Tanaka, "Video-Steganography: How to Secretly Embed a Signature in a Picture," Proc. IMA IP Workshop, 1994.
    • (1994) Proc. IMA IP Workshop
    • Matsui, K.1    Tanaka, K.2
  • 10
    • 0029394108 scopus 로고
    • Electronic Marking and Identification Techniques to Discourage Document Copying
    • J. Brassil, S.H. Low, N.F. Maxemchuk, and L. O'Gorman, "Electronic Marking and Identification Techniques to Discourage Document Copying," IEEE J. Selected Areas in Comm., vol. 13, no. 8, pp. 1495-1504, 1995.
    • (1995) IEEE J. Selected Areas in Comm , vol.13 , Issue.8 , pp. 1495-1504
    • Brassil, J.1    Low, S.H.2    Maxemchuk, N.F.3    O'Gorman, L.4
  • 11
    • 0001217738 scopus 로고
    • The Prisoners' Problem and the Subliminal Channel
    • 83, pp
    • G.J. Simmons, "The Prisoners' Problem and the Subliminal Channel," Proc. Int'l Cryptology Conf. (CRYPTO '83), pp. 51-67, 1983.
    • (1983) Proc. Int'l Cryptology Conf. (CRYPTO , pp. 51-67
    • Simmons, G.J.1
  • 15
    • 0002561772 scopus 로고    scopus 로고
    • An Information-Theoretic Approach to Steganography and Watermarking
    • 99, A. Pfitzmann, ed, pp
    • T. Mittelholzer, "An Information-Theoretic Approach to Steganography and Watermarking," Proc. Third Int'l Workshop Information Hiding (IH '99), A. Pfitzmann, ed., pp. 1-16, 1999.
    • (1999) Proc. Third Int'l Workshop Information Hiding (IH , pp. 1-16
    • Mittelholzer, T.1
  • 18
    • 3042519430 scopus 로고    scopus 로고
    • An Information-Theoretic Model for Steganography
    • C. Cachin, "An Information-Theoretic Model for Steganography," Information and Computation, vol. 192, no. 1, pp. 41-56, 2004.
    • (2004) Information and Computation , vol.192 , Issue.1 , pp. 41-56
    • Cachin, C.1
  • 20
    • 24144472815 scopus 로고    scopus 로고
    • Toward a Theory of Steganography,
    • PhD dissertation, Technical Report CMU-CS-04-157, Carnegie Mellon Univ, Pittsburgh, Aug
    • N. Hopper, "Toward a Theory of Steganography," PhD dissertation, Technical Report CMU-CS-04-157, Carnegie Mellon Univ., Pittsburgh, Aug. 2004.
    • (2004)
    • Hopper, N.1
  • 21
    • 33745868393 scopus 로고    scopus 로고
    • Simple Stateless Steganography
    • Cryptology ePrint Archive, Report 2003/093
    • L. Reyzin and S. Russell, "Simple Stateless Steganography," Cryptology ePrint Archive, Report 2003/093, http://eprint.iacr.org/, 2003.
    • (2003)
    • Reyzin, L.1    Russell, S.2
  • 23
    • 45249089627 scopus 로고    scopus 로고
    • Efficient Public Key Steganography Secure against Adaptively Chosen Stegotext Attacks
    • Cryptology ePrint Archive, Report 2003/244
    • T.V. Le and K. Kurosawa, "Efficient Public Key Steganography Secure against Adaptively Chosen Stegotext Attacks," Cryptology ePrint Archive, Report 2003/244, http://eprint.iacr.org/, 2003.
    • (2003)
    • Le, T.V.1    Kurosawa, K.2
  • 26
    • 0022793132 scopus 로고
    • How to Construct Random Functions
    • O. Goldreich, S. Goldwasser, and S. Micali, "How to Construct Random Functions," J. ACM, vol. 33, no. 4, pp. 792-807, 1986.
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 27
    • 0345253860 scopus 로고    scopus 로고
    • A Pseudorandom Generator from Any One-Way Function
    • J. Haåstad, R. Impagliazzo, L.A. Levin, and M. Luby, "A Pseudorandom Generator from Any One-Way Function," SIAM J. Computing, vol. 28, no. 4, pp. 1364-1396, 1999.
    • (1999) SIAM J. Computing , vol.28 , Issue.4 , pp. 1364-1396
    • Haåstad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.