军事学 >>> 军事学
搜索结果: 1-14 共查到军事学 Steganography相关记录14条 . 查询时间(0.125 秒)
While symmetric-key steganography is quite well understood both in the information-theoretic and in the computational setting, many fundamental questions about its public-key counterpart resist persis...
Steganography techniques     public channel  steganography technique       font style='font-size:12px;'> 2017/4/24
As cryptography is the standard way of ensuring privacy, integrity and confidentiality of a public channel, steganography steps in to provide even stronger assumptions. Thus, in the case of cryptology...
Visual Honey Encryption: Application to Steganography     Honey Encryption  Steganography       font style='font-size:12px;'> 2017/2/20
Honey encryption (HE) is a new technique to overcome the weakness of conventional password-based encryption (PBE). However, conventional honey encryption still has the limitation that it works only fo...
We describe a general technique to protect randomized algorithms against kleptographic attacks. We then apply the technique to construct the first IND-CPA secure public-key encryp- tion scheme in the ...
Broadcast Steganography     Steganography  Broadcast Encryption  Receiver Anonymity  Broadcast Steganography       font style='font-size:12px;'> 2013/4/18
We initiate the study of broadcast steganography (BS), an extension of steganography to the multi-recipient setting. BS enables a sender to communicate covertly with a dynamically designated set of re...
An Information-Theoretic Model for Steganography     Information-Theoretic Model  Steganography       font style='font-size:12px;'> 2009/4/17
An information-theoretic model for steganography with a passive adversary is proposed. The adversary’s task of distinguishing between an innocent cover message C and a modified message S containing ...
Provably Secure Steganography     Steganography  Cryptography  Provable Security       font style='font-size:12px;'> 2009/4/15
Informally, steganography is the process of sending a secret message from Alice to Bob in such a way that an eavesdropper (who listens to all communications) cannot even tell that a secret message is...
We define the notion of adative chosen stegotext security.We then construct efficient public key steganographic schemes secure against adaptively chosen stegotext attacks, without resort to any specia...
Public-Key Steganography     Steganography  Public-Key Cryptography  Provable Security       font style='font-size:12px;'> 2009/4/10
Informally, a public-key steganography protocol allows two parties, who have never met or exchanged a secret, to send hidden messages over a public channel so that an adversary cannot even detect th...
Public-Key Steganography with Active Attacks     Public-Key Steganography  Active Attacks       font style='font-size:12px;'> 2009/4/10
A complexity-theoretic model for public-key steganography with active attacks is introduced. The notion of steganographic security against adaptive chosen-covertext attacks (SS-CCA) and a relaxation ...
Efficient Provably Secure Public Key Steganography     foundation  steganography  public key       font style='font-size:12px;'> 2009/4/9
We construct efficient public key steganographic schemes, without resort to any special exis- tence assumption such as unbiased functions. This is the first time such a construction is obtained. Not ...
Simple Stateless Steganography     Simple Stateless Steganography  memoryless channels       font style='font-size:12px;'> 2009/4/9
Steganography is the science of hiding the very presence of a secret message within a public communication channel. In Crypto 2002, Hopper, Langford, and von Ahn proposed the first complexitytheoreti...
Upper and Lower Bounds on Black-Box Steganography     steganography  covert communication  rejection sampling       font style='font-size:12px;'> 2009/3/27
We study the limitations of steganography when the sender is not using any properties of the underlying channel beyond its entropy and the ability to sample from it. On the negative side, we show th...
Steganography with Imperfect Samplers     Keywords Steganography  information hiding  digital signature  Markov process       font style='font-size:12px;'> 2009/3/3
The goal of steganography is to pass secret messages by disguising them as innocent-looking covertexts.Real world stegosystems are often broken because they make invalid assumptions about the system’s...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...