Practical Invisibility in Digital Communication
نویسنده
چکیده
This paper gives an overview of cryptographically strong mass application invisibility in digital communication. It summarizes principles and methodology, clariies terminology, and deenes some new concepts. A new algorithm for hiding bit selection in digital images is proposed and an experimental implementation of the algorithm is described. Finally, the paper closes with a discussion of the implications of the availability of invisible communication.
منابع مشابه
On the margins: the invisibility of communications in geography
Though a few geographers have made communication the object of study, communication has been undertheorized by Anglo-American geographers. When considered, communication has often been conflated with transportation, or been subject to quantification at the expense of sustained analysis of its implications for people and places. The increasingly central sociospatial concerns raised by new digita...
متن کاملPractical, Real-Time, and Robust Watermarking on the Spatial Domain for High-Definition Video Contents
Commercial markets employ digital right management (DRM) systems to protect valuable high-definition (HD) quality videos. DRM system uses watermarking to provide copyright protection and ownership authentication of multimedia contents. We propose a real-time video watermarking scheme for HD video in the uncompressed domain. Especially, our approach is in aspect of practical perspectives to sati...
متن کاملOn the Practical Aspects of Joint Passive Phase Conjugation and Equalization Underwater Communication Systems
Underwater acoustic communication systems suffer from the channel impairments which results in time spreading of the transmitted signal. In underwater environment, multiple replicas of the transmitted signal are received at the receiver through different paths, which causes significant Inter-Symbol Interference (ISI). Decision Feedback Equalizers (DFE) was utilized to overcome this type of inte...
متن کاملRelations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt"
Signcryption simultaneously offers authentication through unforgeability and confidentiality through indistinguishability against chosen ciphertext attacks by combining the functionality of digital signatures and public-key encryption into a single operation. Libert and Quisquater (PKC 2004) extended this set of basic requirements with the notions of ciphertext anonymity (or key privacy) and ke...
متن کاملSpread Spectrum Image Watermarking for Secured Multimedia Data Communication
Digital watermarking is a way to provide the facility of secure multimedia data communication besides its copyright protection approach. The Spread Spectrum modulation principle is widely used in digital watermarking to satisfy the robustness of multimedia signals against various signal-processing operations. Several SS watermarking algorithms have been proposed for multimedia signals but very ...
متن کامل