A Step Towards Practical Steganography Systems

作者: Abdelkader H. Ouda , Mahmoud R. El-Sakka

DOI: 10.1007/11559573_140

关键词: Information hidingDiffie–Hellman problemSteganographyPublic-key cryptographyProtocol (object-oriented programming)Steganography toolsComputer scienceKey exchangeComputer securityElliptic curve

摘要: There has been many hidden communication techniques proposed in the last few years. The focus was given to steganography build such techniques. Utilizing stego-key(s) hide secret messages into images strengthen security of these However, adopting one available key-agreement protocols, distribute between communicating parties, will destroy infrastructure entire communication. reason is that, protocols perform their transactions on sight, while desirable communications need be completely hidden. In this paper, a key-generation unit added general model. This utilizes new protocol, stego-KA, help support class exchange sego-key(s) covertly. stego-KA protocol based Diffie-Hellman key establishment and significant advantages that communications.

参考文章(24)
Yun Q. Shi, George F. Elmasry, 2-D Interleaving for Enhancing the Robustness of Watermark Signals Embedded in Still Images. international conference on multimedia and expo. pp. 731- 734 ,(2000)
Hongmei Liu, Jiufen Liu, Jiwu Huang, Daren Huang, Y.Q. Shi, A robust DWT-based blind data hiding algorithm international symposium on circuits and systems. ,vol. 2, pp. 672- 675 ,(2002) , 10.1109/ISCAS.2002.1011442
Simon Blake-Wilson, Don Johnson, Alfred Menezes, Key Agreement Protocols and Their Security Analysis Lecture Notes in Computer Science. pp. 30- 45 ,(1997) , 10.1007/BFB0024447
Alfred J Menezes, Paul C van Oorschot, Scott A Vanstone, Handbook of Applied Cryptography ,(1996)
Toby Sharp, An Implementation of Key-Based Digital Signal Steganography information hiding. ,vol. 2137, pp. 13- 26 ,(2001) , 10.1007/3-540-45496-9_2
Gustavus J. Simmons, The Prisoners’ Problem and the Subliminal Channel international cryptology conference. pp. 51- 67 ,(1984) , 10.1007/978-1-4684-4730-9_5
Laurie Law, Alfred Menezes, Minghua Qu, Jerry Solinas, Scott Vanstone, An Efficient Protocol for Authenticated Key Agreement Designs, Codes and Cryptography. ,vol. 28, pp. 119- 134 ,(2003) , 10.1023/A:1022595222606
Gang Pan, Zhaohui Wu, Yunhe Pan, A data hiding method for few-color images IEEE International Conference on Acoustics Speech and Signal Processing. ,vol. 4, pp. 3469- 3472 ,(2002) , 10.1109/ICASSP.2002.5745401