1,903 research outputs found
A Cryptographic Approach for Steganography
International audienceIn this research work, security concepts are formalized in steganography, and the common paradigms based on information theory are replaced by another ones inspired from cryptography, more practicable are closer than what is usually done in other cryptographic domains. These preliminaries lead to a first proof of a cryptographically secure information hidingscheme
Transparent authentication methodology in electronic education
In the context of on-line assessment in e-learning, a problem arises when a student taking an exam may wish to cheat by handing over personal credentials to someone else to take their place in an exam, Another problem is that there is no method for signing digital content as it is being produced in a computerized environment. Our proposed solution is to digitally sign the participantâs work by embedding voice samples in the transcript paper at regular intervals. In this investigation, we have demonstrated that a transparent stenographic methodology will provide an innovative and practical solution for achieving continuous authentication in an online educational environment by successful insertion and extraction of audio digital signatures
Multi-Level Steganography: Improving Hidden Communication in Networks
The paper presents Multi-Level Steganography (MLS), which defines a new
concept for hidden communication in telecommunication networks. In MLS, at
least two steganographic methods are utilised simultaneously, in such a way
that one method (called the upper-level) serves as a carrier for the second one
(called the lower-level). Such a relationship between two (or more) information
hiding solutions has several potential benefits. The most important is that the
lower-level method steganographic bandwidth can be utilised to make the
steganogram unreadable even after the detection of the upper-level method:
e.g., it can carry a cryptographic key that deciphers the steganogram carried
by the upper-level one. It can also be used to provide the steganogram with
integrity. Another important benefit is that the lower-layer method may be used
as a signalling channel in which to exchange information that affects the way
that the upper-level method functions, thus possibly making the steganographic
communication harder to detect. The prototype of MLS for IP networks was also
developed, and the experimental results are included in this paper.Comment: 18 pages, 13 figure
On the Gold Standard for Security of Universal Steganography
While symmetric-key steganography is quite well understood both in the
information-theoretic and in the computational setting, many fundamental
questions about its public-key counterpart resist persistent attempts to solve
them. The computational model for public-key steganography was proposed by von
Ahn and Hopper in EUROCRYPT 2004. At TCC 2005, Backes and Cachin gave the first
universal public-key stegosystem - i.e. one that works on all channels -
achieving security against replayable chosen-covertext attacks (SS-RCCA) and
asked whether security against non-replayable chosen-covertext attacks (SS-CCA)
is achievable. Later, Hopper (ICALP 2005) provided such a stegosystem for every
efficiently sampleable channel, but did not achieve universality. He posed the
question whether universality and SS-CCA-security can be achieved
simultaneously. No progress on this question has been achieved since more than
a decade. In our work we solve Hopper's problem in a somehow complete manner:
As our main positive result we design an SS-CCA-secure stegosystem that works
for every memoryless channel. On the other hand, we prove that this result is
the best possible in the context of universal steganography. We provide a
family of 0-memoryless channels - where the already sent documents have only
marginal influence on the current distribution - and prove that no
SS-CCA-secure steganography for this family exists in the standard
non-look-ahead model.Comment: EUROCRYPT 2018, llncs styl
- âŠ