Practical Invisibility in Digital Communication

نویسنده

  • Tuomas Aura
چکیده

This paper gives an overview of cryptographically strong mass application invisibility in digital communication. It summarizes principles and methodology, clariies terminology, and deenes some new concepts. A new algorithm for hiding bit selection in digital images is proposed and an experimental implementation of the algorithm is described. Finally, the paper closes with a discussion of the implications of the availability of invisible communication.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the margins: the invisibility of communications in geography

Though a few geographers have made communication the object of study, communication has been undertheorized by Anglo-American geographers. When considered, communication has often been conflated with transportation, or been subject to quantification at the expense of sustained analysis of its implications for people and places. The increasingly central sociospatial concerns raised by new digita...

متن کامل

Practical, Real-Time, and Robust Watermarking on the Spatial Domain for High-Definition Video Contents

Commercial markets employ digital right management (DRM) systems to protect valuable high-definition (HD) quality videos. DRM system uses watermarking to provide copyright protection and ownership authentication of multimedia contents. We propose a real-time video watermarking scheme for HD video in the uncompressed domain. Especially, our approach is in aspect of practical perspectives to sati...

متن کامل

On the Practical Aspects of Joint Passive Phase Conjugation and Equalization Underwater Communication Systems

Underwater acoustic communication systems suffer from the channel impairments which results in time spreading of the transmitted signal. In underwater environment, multiple replicas of the transmitted signal are received at the receiver through different paths, which causes significant Inter-Symbol Interference (ISI). Decision Feedback Equalizers (DFE) was utilized to overcome this type of inte...

متن کامل

Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt"

Signcryption simultaneously offers authentication through unforgeability and confidentiality through indistinguishability against chosen ciphertext attacks by combining the functionality of digital signatures and public-key encryption into a single operation. Libert and Quisquater (PKC 2004) extended this set of basic requirements with the notions of ciphertext anonymity (or key privacy) and ke...

متن کامل

Spread Spectrum Image Watermarking for Secured Multimedia Data Communication

Digital watermarking is a way to provide the facility of secure multimedia data communication besides its copyright protection approach. The Spread Spectrum modulation principle is widely used in digital watermarking to satisfy the robustness of multimedia signals against various signal-processing operations. Several SS watermarking algorithms have been proposed for multimedia signals but very ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996