Cryptologia
WSC '94 Proceedings of the 26th conference on Winter simulation
Secure computing: threats and safeguards
Secure computing: threats and safeguards
Manufacturing cheap, resilient, and stealthy opaque constructs
POPL '98 Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Simulation Modeling and Analysis
Simulation Modeling and Analysis
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition)
Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition)
An Overview of Tes Processes and Modeling Methodology
Performance Evaluation of Computer and Communication Systems, Joint Tutorial Papers of Performance '93 and Sigmetrics '93
Hiding Data in the OSI Network Model
Proceedings of the First International Workshop on Information Hiding
Feature-based classification of time-series data
Information processing and technology
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
We present a technique for hiding information in stochastic settings via data-synthesizing schemes based on transform-expand-sample (Tes) processes. The technique is applicable whenever data generated by an application or process is sufficiently complex to exhibit random but structured behavior (such as in collective data transforms), and data trajectories have viable alternatives that are unverifiable or simply hard to verify. In such cases, a synthesizing procedure generates novel data that either actually replaces, or is generated instead of, application or process data. When information can be hidden in such data at levels higher than typical levels of noise, message-neutralizing attacks will fail; and if synthetic data, stego data and application/process data cannot be distinguished, secure stego transmissions can be launched. An information-theoretic model shows that such hiding techniques are arbitrarily secure. We present some experimental results.