Distributed Steganography

  title={Distributed Steganography},
  author={Xin Liao and Qiaoyan Wen and Shanyu Shi},
  journal={2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing},
  • Xin Liao, Qiaoyan Wen, Shanyu Shi
  • Published 14 October 2011
  • Computer Science
  • 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing
In this paper, we address the issue of "distributed steganography" known as many cooperative computations with distributed parties in the covert communication. We present a model of distributed steganography, and give some properties. For the reader's convenience, we consider a scenario in which two senders have their own private data, and wish to carry out a steganographic technique on the union of their private inputs, without revealing any information. The recipient only acquire the union of… 

Figures from this paper

Distributed data hiding in multi-cloud storage environment

This work proposes a new steganography paradigm transparent to any attacker and resistant to the detection and the secret extraction, and the distribution of the secret in the multi-cloud storage environment allows us to hide the existence of the covert channel between the communicating parties.

A Steganographic Design Paradigm for General Steganographic Objectives

This project condensing existing work into a unifying design paradigm that admits provably secret public- and private-key constructions, and provides for a conceptual decoupling of channel considerations and steganographic goals, ultimately implying both universal constructions and constructions with channel-specific optimizations.

A Novel Technique for Secure Data Transmission using Distributed Steganography and Cryptographic Techniques

This paper is proposing a new technique for data security using distributed steganography and public key cryptography, used to hide secure data in carrier video, and Diffie Hellman key exchange algorithm is used to produce the keys used for encryption and embedding process.

StegFog: Distributed Steganography Applied to Cyber Resiliency in Multi Node Environments

The presented results show how system such as StegFog aligned with the cyberfog security concept could be considered as the protection measure for secure network communications.

A Note on the Problem of Semantic Interpretation Agreement in Steganographic Communications

  • B. Aziz
  • Computer Science
    J. Internet Serv. Inf. Secur.
  • 2021
It is argued here that there is a third fundamental dimension that characterises steganography, namely the ability of the three parties to interpret hidden content, and one solution based on the Diffie-Hellman key-agreement calculation that leads to interpretation agreement is offered.

Distributed data hiding in a single cloud storage environment

A single cloud storage environment is used to solve the problems of managing several credentials, monetary costs and data controls associated with multi-cloud storage environments and showed interesting results with simpler operations to be performed by the participants during the process.

A survey on trust management for Internet of Things



Multi-party covert communication with steganography and quantum secret sharing

Writing on wet paper

Heuristic arguments supported by tests using blind steganalysis indicate that the wet paper steganography provides improved steganographic security and is less vulnerable to steganalytic attacks compared with existing methods with shared selection channels.

Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters

This work proposes efficient and secure (string) oblivious transfer (OT/sup 1//sub n/) schemes for any n/spl ges/2 and presents a method of transforming any (single-database) PIR protocol into a symmetric PIR Protocol by slightly increasing the communication cost only.

Information hiding-a survey

An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.

Protocols for secure computations

  • A. Yao
  • Mathematics
    23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)
  • 1982
The author gives a precise formulation of this general problem and describes three ways of solving it by use of one-way functions, which have applications to secret voting, private querying of database, oblivious negotiation, playing mental poker, etc.

A study of several specific secure two-party computation problems

This dissertation studies several specific STC problems in the domains of scientific computation, statistical analysis, computational geometry and database query, and explores how domain specific knowledge can improve the efficiency of the solutions that are developed over the generic solutions that do not considerdomain specific knowledge.

A Survey on Image Steganography and Steganalysis

A survey on steganography and steganalysis for digital images, mainly covering the fundamental concepts, the progress of steganographic methods for images in spatial representation and in JPEG format, and the development of the corresponding steganalytic schemes.

Mnemosyne: Peer-to-Peer Steganographic Storage

Mnemosyne provides a high level of privacy and plausible deniability by using a large amount of shared distributed storage to hide data by using secure hashing, and loss codes used for resiliency.

Privacy-preserving cooperative scientific computations

  • Wenliang DuM. Atallah
  • Computer Science, Mathematics
    Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001.
  • 2001
This paper formally defines these specific privacy-preserving cooperative computation problems, and presents protocols to solve them.

Metadata-based image watermarking for copyright protection