Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
On the limits of steganography
IEEE Journal on Selected Areas in Communications
An information-theoretic model for steganography
Information and Computation
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
Rational Secure Computation and Ideal Mechanism Design
FOCS '05 Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science
Recognition in software watermarking
Proceedings of the 4th ACM international workshop on Contents protection and security
Nonesuch: a mix network with sender unobservability
Proceedings of the 5th ACM workshop on Privacy in electronic society
Proceedings of the 9th workshop on Multimedia & security
Covert channels in privacy-preserving identification systems
Proceedings of the 14th ACM conference on Computer and communications security
A novel steganographic algorithm using animations as cover
Decision Support Systems
Practical Insecurity for Effective Steganalysis
Information Hiding
Digital Watermarking and Steganography
Digital Watermarking and Steganography
A new data hiding scheme for binary image authentication with small image distortion
Information Sciences: an International Journal
A computational model for watermark robustness
IH'06 Proceedings of the 8th international conference on Information hiding
Bandwidth optimal steganography secure against adaptive chosen stegotext attacks
IH'06 Proceedings of the 8th international conference on Information hiding
From weak to strong watermarking
TCC'07 Proceedings of the 4th conference on Theory of cryptography
CAPTCHA: using hard AI problems for security
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
An information-hiding model for secure communication
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
Space-efficient kleptography without random oracles
IH'07 Proceedings of the 9th international conference on Information hiding
The square root law in stegosystems with imperfect information
IH'10 Proceedings of the 12th international conference on Information hiding
Privad: practical privacy in online advertising
Proceedings of the 8th USENIX conference on Networked systems design and implementation
TAMC'11 Proceedings of the 8th annual conference on Theory and applications of models of computation
Robust copyright marking using Weibull distribution
Computers and Electrical Engineering
On steganographic chosen covertext security
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Syntax and semantics-preserving application-layer protocol steganography
IH'04 Proceedings of the 6th international conference on Information Hiding
Public-key steganography with active attacks
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Upper and lower bounds on black-box steganography
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
On security notions of steganographic systems
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Efficient steganography with provable security guarantees
IH'05 Proceedings of the 7th international conference on Information Hiding
On security notions for steganalysis
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Provably secure steganography with imperfect sampling
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Ciphertext-Auditable public key encryption
IWSEC'06 Proceedings of the 1st international conference on Security
Provably secure steganography and the complexity of sampling
ISAAC'06 Proceedings of the 17th international conference on Algorithms and Computation
Data forensics constructions from cryptographic hashing and coding
IWDW'11 Proceedings of the 10th international conference on Digital-Forensics and Watermarking
StegoTorus: a camouflage proxy for the Tor anonymity system
Proceedings of the 2012 ACM conference on Computer and communications security
SILENTKNOCK: practical, provably undetectable authentication
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Benchmarking for steganography by kernel fisher discriminant criterion
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
IH'12 Proceedings of the 14th international conference on Information Hiding
Moving steganography and steganalysis from the laboratory into the real world
Proceedings of the first ACM workshop on Information hiding and multimedia security
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Theoretical Computer Science
Hi-index | 0.00 |
Informally, steganography is the process of sending a secret message from Alice to Bob in such a way that an eavesdropper (who listens to all communications) cannot even tell that a secret message is being sent. In this work, we initiate the study of steganography from a complexity-theoretic point of view. We introduce definitions based on computational indistinguishability and we prove that the existence of one-way functions implies the existence of secure steganographic protocols.