Provably Secure Steganography
#1

Steganography is the problem of hiding secret messages in innocent-looking public communication so that the presence of the secret messages cannot be detected. This paper introduces a cryptographic formalization of steganographic security in terms of computational indistinguishability from a channel, an indexed family of probability distributions on cover messages. We use cryptographic and complexity-theoretic proof techniques to show that the existence of one-way functions and the ability to sample from the channel are necessary conditions for secure Steganography. We then construct a steganographic protocol, based on rejection sampling from the channel that is provably secure and has nearly optimal bandwidth under these conditions. This is the first known example of a general provably secure steganographic protocol. We also give the first formalization of robust Steganography, where an adversary attempts to remove any hidden messages without unduly disrupting the cover channel. We give a necessary condition on the amount of disruption the adversary is allowed in terms of a worst case measure of mutual information. We give a construction that is provably secure and computationally efficient and has nearly optimal bandwidth, assuming repeatable access to the channel distribution.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: seminar report for provably secure in on demand source routing in mobile ad hoc networks, uml diagrams for provably secure three party authenticated quantum key destribution protocols, provably secure steganography matlab coding, a most secure steganography design,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 921 14-02-2017, 03:49 PM
Last Post: jaseela123d
  Steganography implemented in Java science projects buddy 14 12,214 24-05-2016, 10:15 AM
Last Post: dhanabhagya
  steganography full report project report tiger 31 34,061 07-07-2015, 02:57 PM
Last Post: seminar report asees
  Fault Secure Encoder and Decoder For NanoMemory Applications computer girl 2 2,937 25-02-2015, 07:17 AM
Last Post: Guest
  Secure Multipart File Transfer projectsofme 4 3,776 07-03-2013, 05:16 PM
Last Post: Guest
  IMPLEMENTATION OF IMAGE STEGANOGRAPHY USING LSB TECHINQUE seminar presentation 6 5,842 04-02-2013, 04:49 PM
Last Post: seminar details
  Audio Steganography project topics 3 6,578 10-11-2012, 11:58 AM
Last Post: seminar details
  Steganography in IPv6 computer science topics 1 1,849 10-11-2012, 11:58 AM
Last Post: seminar details
  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing seminar class 1 1,977 29-10-2012, 05:31 PM
Last Post: seminar details
  IMAGE COMPRESSION AND STEGANOGRAPHY IN ADVANCED JPEG STANDARD seminar class 1 2,574 24-10-2012, 12:52 PM
Last Post: seminar details

Forum Jump: