Distributed Steganography
@article{Liao2011DistributedS, title={Distributed Steganography}, author={X. Liao and Q. Wen and Sha Shi}, journal={2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing}, year={2011}, pages={153-156} }
In this paper, we address the issue of "distributed steganography" known as many cooperative computations with distributed parties in the covert communication. We present a model of distributed steganography, and give some properties. For the reader's convenience, we consider a scenario in which two senders have their own private data, and wish to carry out a steganographic technique on the union of their private inputs, without revealing any information. The recipient only acquire the union of… CONTINUE READING
5 Citations
A Novel Technique for Secure Data Transmission using Distributed Steganography and Cryptographic Techniques
- Computer Science
- 2015
Distributed Steganography Using Five Pixel Pair Differencing and Modulus Function
- Computer Science
- ICCSCI
- 2017
- 6
References
SHOWING 1-10 OF 13 REFERENCES
Multi-party covert communication with steganography and quantum secret sharing
- Computer Science
- J. Syst. Softw.
- 2010
- 30
- PDF
Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters
- Computer Science
- IEEE Trans. Computers
- 2004
- 59
- PDF
A Survey on Image Steganography and Steganalysis
- Computer Science
- J. Inf. Hiding Multim. Signal Process.
- 2011
- 350
- PDF
Privacy-preserving cooperative scientific computations
- Computer Science
- Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001.
- 2001
- 184
- PDF
Metadata-based image watermarking for copyright protection
- Computer Science
- Simul. Model. Pract. Theory
- 2010
- 100