Information hiding: steganography and watermarking—attacks and countermeasures
Information hiding: steganography and watermarking—attacks and countermeasures
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Stretching the Limits of Steganography
Proceedings of the First International Workshop on Information Hiding
Attacks on Steganographic Systems
IH '99 Proceedings of the Third International Workshop on Information Hiding
On security notions for steganalysis
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Hi-index | 0.00 |
We define the notion of pseudoprocessingness to formulate chosen-input-attack, chosen-stego-attack, and key-recovery. We then construct a efficient, provable secure steganographic algorithm against chosen-input-attack and key-recovery. So far as we know, this is the first paper dealing with those security notions.