Grey-box steganography

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Grey-Box Steganography

In steganography secret messages are encoded into unsuspicious covertexts such that an adversary cannot distinguish the resulting stegotexts from original covertexts. To accomplish their respective tasks, encoder and adversary need information about the covertext distribution. In previous analyses, the knowledge about the covertext channel was highly unbalanced: while the adversary had full kno...

متن کامل

Grey-Box Checking

There are many cases where we want to verify a system that does not have a usable formal model: the model may be missing, out of date, or simply too big to be used. A possible method is to analyze the system while learning the model (black box checking). However, learning may be an expensive task, thus it needs to be guided, e.g., using the checked property or an inaccurate model (adaptive mode...

متن کامل

Black-Box Testing of Grey-Box Behavior

A key aspect of the Object-Oriented (OO) approach is that a designer can enrich an OO system by providing suitable (re-)definitions for some of the methods of the given system. Application frameworks provide good examples of such enrichment. An OO framework typically provides a number of template methods that implement specific patterns of calls to hook methods. An application developer can cus...

متن کامل

Meta-Programming Grey-Box Connectors

In the recent past, architectural languages have begun to introduce so-called connec-tors. Connectors separate communication code from the application-speciic components so that it can be easily exchanged. Unfortunately, however, communication code is usually deeply woven into the components and often has to be replaced when the component is reused in a diierent context. In this paper we show t...

متن کامل

White-Box Cryptography: Don't Forget About Grey Box Attacks

Despite the fact that all current scientific white-box approaches of standardized cryptographic primitives have been publicly broken, these attacks require knowledge of the internal data representation used by the implementation. In practice, the level of implementation knowledge required is only attainable through significant reverse engineering efforts. In this paper we describe new approache...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Theoretical Computer Science

سال: 2013

ISSN: 0304-3975

DOI: 10.1016/j.tcs.2012.03.037