Efficient computation on oblivious RAMs
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
The design and implementation of a log-structured file system
SOSP '91 Proceedings of the thirteenth ACM symposium on Operating systems principles
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
An optimally robust hybrid mix network
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Abuses in Cryptography and How to Fight Them
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Proceedings of the First International Workshop on Information Hiding
StegFS: A Steganographic File System for Linux
IH '99 Proceedings of the Third International Workshop on Information Hiding
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Steganalysis of JPEG Images: Breaking the F5 Algorithm
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Eliminating Steganography in Internet Traffic with Active Wardens
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Steganography Preserving Statistical Properties
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Mnemosyne: Peer-to-Peer Steganographic Storage
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Web tap: detecting covert web traffic
Proceedings of the 11th ACM conference on Computer and communications security
IP covert timing channels: design and detection
Proceedings of the 11th ACM conference on Computer and communications security
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
A web based covert file system
HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems
Covert messaging through TCP timestamps
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Improved detection of LSB steganography in grayscale images
IH'04 Proceedings of the 6th international conference on Information Hiding
Embedding covert channels into TCP/IP
IH'05 Proceedings of the 7th international conference on Information Hiding
Data hiding in image and video .I. Fundamental issues and solutions
IEEE Transactions on Image Processing
Video steganography for confidential documents: integrity, privacy and version control
Proceedings of the 26th annual ACM international conference on Design of communication
Moving steganography and steganalysis from the laboratory into the real world
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.00 |
In the conventional steganographic framework, a covert message is hidden within a larger, seemingly innocent message. We argue that this framework must be extended in order to adequately model the means and goals of modern collaborative systems. Whereas messages are static objects with a single creator, collaborative systems are dynamically changed by multiple entities according to rules and patterns specific to the given system. The primary contribution of this paper is to frame the general question: When can one steganographically embed collaborative system A into collaborative system B? As a case study, we develop a system for embedding a simple wiki into the Flickr photo sharing service. We develop techniques for steganographically embedding a collaborative system whose update rules are quite different than those of the host service.