336 research outputs found

    Subliminal channels in post-quantum digital signature schemes

    Get PDF
    We analyze the digital signatures schemes submitted to NIST\u27s Post-Quantum Cryptography Standardization Project in search for subliminal channels

    Communicating Through Subliminal-Free Signatures

    Get PDF
    By exploiting the inherent randomness used by certain digital signature protocols, subliminal channels can subvert these protocols without degrading their security. Due to their nature, these channels cannot be easily detected by an outside observer. Therefore, they pose a severe challenge for protocol designers. More precisely, designers consider certain assumptions implicitly, but in reality these assumptions turn out to be false or cannot be enforced or verified. In this paper we exemplify exactly such a situation by presenting several subliminal channels with a small capacity in Zhang et al. and Dong et al.\u27s subliminal-free signature protocols

    Modelling Cryptographic Attacks by Powerful Adversaries

    Get PDF

    Data hiding in multimedia - theory and applications

    Get PDF
    Multimedia data hiding or steganography is a means of communication using subliminal channels. The resource for the subliminal communication scheme is the distortion of the original content that can be tolerated. This thesis addresses two main issues of steganographic communication schemes: 1. How does one maximize the distortion introduced without affecting fidelity of the content? 2. How does one efficiently utilize the resource (the distortion introduced) for communicating as many bits of information as possible? In other words, what is a good signaling strategy for the subliminal communication scheme? Close to optimal solutions for both issues are analyzed. Many techniques for the issue for maximizing the resource, viz, the distortion introduced imperceptibly in images and video frames, are proposed. Different signaling strategies for steganographic communication are explored, and a novel signaling technique employing a floating signal constellation is proposed. Algorithms for optimal choices of the parameters of the signaling technique are presented. Other application specific issues like the type of robustness needed are taken into consideration along with the established theoretical background to design optimal data hiding schemes. In particular, two very important applications of data hiding are addressed - data hiding for multimedia content delivery, and data hiding for watermarking (for proving ownership). A robust watermarking protocol for unambiguous resolution of ownership is proposed

    Resting state glutamate predicts elevated pre-stimulus alpha during self-relatedness: A combined EEG-MRS study on 'rest-self' overlap.

    Get PDF
    Recent studies have demonstrated neural overlap between resting state activity and self-referential processing. This “rest-self” overlap occurs especially in anterior cortical midline structures like the perigenual anterior cingulate cortex (PACC). However, the exact neurotemporal and biochemical mechanisms remain to be identified. Therefore, we conducted a combined electroencephalography (EEG)-magnetic resonance spectroscopy (MRS) study. EEG focused on pre-stimulus (e.g., prior to stimulus presentation or perception) power changes to assess the degree to which those changes can predict subjects’ perception (and judgment) of subsequent stimuli as high or low self-related. MRS measured resting state concentration of glutamate, focusing on PACC. High pre-stimulus (e.g., prior to stimulus presentation or perception) alpha power significantly correlated with both perception of stimuli judged to be highly self-related and with resting state glutamate concentrations in the PACC. In sum, our results show (i) pre-stimulus (e.g., prior to stimulus presentation or perception) alpha power and resting state glutamate concentration to mediate rest-self overlap that (ii) dispose or incline subjects to assign high degrees of self-relatedness to perceptual stimuli
    corecore