Communication and Secrecy: Issues in Digital Stenography

نویسندگان

  • Christopher Jaynes
  • Susan Landau
چکیده

We present the issues involved in information obfuscation both for the embedding of information within digital signals and the detection of the hidden information. More standard cryptographic techniques acheive security through an encoding so that an evesdropper is unable to understand the signal. Obfuscation, preceded by an encoding, provides a method for the embedding of information within other signals so that an evesdropper is unable to detect the original information. A framework, based on information theory, is presented that ensures embedded signals are undetectable under a set of conditions called the Grammatic Invariance Principle. An algorithm for embedding information within digital images (a technique often referred to as stenography) is developed under the framework and results are presented.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparison of Digital Watermarking with Other Techniques of Data Hiding

Digital watermarking is not a new name in the tech neology world but there are different techniques in data hiding which are similar to watermarking. In this paper we compare digital watermarking with other techniques of data hiding. Stenography, Fingerprinting, cryptography and Digital signature techniques are compared with watermarking. We need water marking for digital data security .It prov...

متن کامل

The Impact of Digital Government on Whistleblowing and Whistle-blower Protection: Explanatory Study

This paper focuses on the contribution of digital government (DGOV) to Whistleblowing (WB). While considerable efforts have been devoted to DGOV and WB separately, research work at the intersection of these two domains is very scarce; hence and a systematic DGOV for WB (DGOV4WB) research framework has yet to emerge. This paper aims to identify the potential issues in whistleblowing and explore ...

متن کامل

Achievable Secrecy Rate Regions of State Dependent Causal Cognitive Interference Channel

In this paper, the secrecy problem in the state dependent causal cognitive interference channel is studied. The channel state is non-causally known at the cognitive encoder. The message of the cognitive encoder must be kept secret from the primary receiver. We use a coding scheme which is a combination of compress-and-forward strategy with Marton coding, Gel’fand-Pinsker coding and Wyner’s wire...

متن کامل

Secrecy of Communications in Data Transmission by Impulses with Unknown Moments of Appearance and Disappearance

We carried out a comparative analysis of the algorithms for detecting a rectangular impulse against Gaussian white noise under either authorized or unauthorized access to the transmitted data. We presupposed that for data transmission the binary communication system is used and that the useful information in the data is whether the signal is present or absent. The case is that unauthorized acce...

متن کامل

On The Secrecy of the Cognitive Interference Channel with Channel State

In this paper the secrecy problem in the cognitive state-dependent interference channel is considered. In this scenario we have a primary and a cognitive transmitter-receiver pairs. The cognitive transmitter has the message of the primary sender as side information. In addition, the state of the channel is known at the cognitive encoder. Hence, the cognitive encoder uses this side information t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996