Results 281 to 290 of about 392,009 (311)
Some of the next articles are maybe not open access.
2007
In this paper we introduce a new tool that hides whether or not an "encryption" algorithm actually performs encryption or not. We call this a computational questionable encryption scheme and show how it can be used to devise mobile agents that conceal whether they encrypt or delete data prior to data transmission.
Adam Young, Moti Yung
openaire +1 more source
In this paper we introduce a new tool that hides whether or not an "encryption" algorithm actually performs encryption or not. We call this a computational questionable encryption scheme and show how it can be used to devise mobile agents that conceal whether they encrypt or delete data prior to data transmission.
Adam Young, Moti Yung
openaire +1 more source
Hiding Information in Image Mosaics
The Computer Journal, 2003Summary: Information hiding techniques allow a player to hide secret information in some innocent-looking document. In this paper we present a novel approach to information hiding. We investigate the possibility of embedding information using the intrinsic entropy of some classes of cover-documents. In particular we provide algorithms for embedding any
BLUNDO, Carlo, GALDI C.
openaire +4 more sources
Information hiding by coverings
Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674), 2004We propose a formal model for embedding information in black and white images and prove the equivalence between the existence of embedding schemes and covering codes. An asymptotically tight bound on the performance of embedding schemes is given. We construct efficient embedding schemes via known coverings.
F. Galand, G. Kabatiansky
openaire +1 more source
1996
This paper describes an architecture, Onion Routing, that limits a network's vulnerability to traffic analysis. The architecture provides anonymous socket connections by means of proxy servers. It provides real-time, bi-directional, anonymous communication for any protocol that can be adapted to use a proxy service.
David M. Goldschlag +2 more
openaire +1 more source
This paper describes an architecture, Onion Routing, that limits a network's vulnerability to traffic analysis. The architecture provides anonymous socket connections by means of proxy servers. It provides real-time, bi-directional, anonymous communication for any protocol that can be adapted to use a proxy service.
David M. Goldschlag +2 more
openaire +1 more source
Towards objectifying information hiding
2010 IEEE International Conference on Acoustics, Speech and Signal Processing, 2010In this paper, the concept of object-oriented embedding (OOE) is introduced into information hiding in general and particularly to steganography which is the science that involves undetectable communication of secret data in an appropriate multimedia carrier. The proposal takes advantage of computer vision to orient the embedding process. Although, any
Abbas Cheddad +3 more
openaire +1 more source
Information Hiding: Steganography
2016The sharing of digital media over the Internet has given rise to many issues concerning security and privacy of data. While encryption is used to secure the data, the appearance of encrypted images and video streams makes them vulnerable to attacks. This situation can be disastrous in cases where security and privacy are of utmost importance, such as ...
V. Thanikaiselvan +2 more
openaire +1 more source
Journal of Systems and Software, 1994
Abstract The most critical problem facing developers and maintainers of large software systems is overwhelming complexity. Abstraction, a powerful tool for dealing with complexity, limits details that must be considered to those that are most relevant.
Linda S. Rising, Frank W. Calliss
openaire +1 more source
Abstract The most critical problem facing developers and maintainers of large software systems is overwhelming complexity. Abstraction, a powerful tool for dealing with complexity, limits details that must be considered to those that are most relevant.
Linda S. Rising, Frank W. Calliss
openaire +1 more source
Reliable information bit hiding
IEEE Transactions on Circuits and Systems for Video Technology, 2002One of challenges encountered in information bit hiding is the reliability of information bit detection. This paper addresses the issue and presents an algorithm in the discrete cosing transform (DCT) domain with a communication theory approach. It embeds information bits (first) in the DC and (then in the) low-frequency AC coefficients. To extract the
null Jiwu Huang, null Yun Q. Shi
openaire +1 more source
Location based information hiding
2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring), 2016Information hiding is a discipline of information security which is broadly classified into two major areas viz. steganography and digital watermarking. This paper presents the theoretical foundations of a methodology to improve the security of an information hiding system for digital images that may be generalized to audio, video and other cover ...
Hartej Singh, Daljit Singh
openaire +1 more source

