منابع مشابه
Particle Swarm Optimization Algorithm Based Methodology for Breaking the Chi-Square Attack in Steganalytic Systems
Steganalytic techniques are used to detect whether an image contains a hidden message. By analyzing different image features between stego-images (the image within which information is hidden) and cover-images (the Image in which information is to be hidden), a steganalytic system is able to detect stego-images. In this paper, we present a new method in LSB embedding by avoiding the change of s...
متن کاملSquare Attack against Reduced Variants of Rijndael
1 INTRODUCTION The cipher Rijndael is one of the finalists of the Advanced Encryption Standard selection process. The only described attack on this cipher is the Square attack which was already described by the designers and which is applicable to Rijndael reduced to 4, 5, and 6 rounds. Rijndael is a block cipher. The length of the block and the length of the key can be specified to be 128, 192...
متن کاملA New Class of Private Chi-Square Tests
In this paper, we develop new test statistics for private hypothesis testing. These statistics are designed specifically so that their asymptotic distributions, after accounting for noise added for privacy concerns, match the asymptotics of the classical (nonprivate) chi-square tests for testing if the multinomial data parameters lie in lower dimensional manifolds (examples include goodness of ...
متن کاملA New Attack against Khazad
Khazad is a new block cipher initially proposed as a candidate to the NESSIE project. Its design is very similar to Rijndael, although it is a 64-bit block cipher. In this paper, we propose a new attack that can be seen as an extension of the Square attack. It takes advantage of redundancies between the round key derivation and the round function, and also exploits some algebraic observations o...
متن کاملChi-square lower bounds
The information inequality has been shown to be an effective tool for providing lower bounds for the minimax risk. Bounds based on the chisquare distance can sometimes offer a considerable improvement especially when applied iteratively. This paper compares these two methods in four examples including the bounded normal mean problem as well as obervations from a Poisson distribution.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Research Journal of Information Technology
سال: 2013
ISSN: 1815-7432
DOI: 10.3923/rjit.2013.363.372