Distributed Steganography

  title={Distributed Steganography},
  author={X. Liao and Q. Wen and Sha Shi},
  journal={2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing},
  • X. Liao, Q. Wen, Sha Shi
  • Published 2011
  • Computer Science
  • 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing
  • In this paper, we address the issue of "distributed steganography" known as many cooperative computations with distributed parties in the covert communication. We present a model of distributed steganography, and give some properties. For the reader's convenience, we consider a scenario in which two senders have their own private data, and wish to carry out a steganographic technique on the union of their private inputs, without revealing any information. The recipient only acquire the union of… CONTINUE READING
    5 Citations

    Figures and Topics from this paper

    Distributed data hiding in multi-cloud storage environment
    • PDF
    A Steganographic Design Paradigm for General Steganographic Objectives
    • PDF
    A survey on trust management for Internet of Things
    • 729
    • PDF


    Writing on wet paper
    • 196
    • PDF
    Efficient 1-Out-of-n Oblivious Transfer Schemes with Universally Usable Parameters
    • W. Tzeng
    • Computer Science
    • IEEE Trans. Computers
    • 2004
    • 59
    • PDF
    Information hiding-a survey
    • 2,596
    • PDF
    A Survey on Image Steganography and Steganalysis
    • 350
    • PDF
    Mnemosyne: Peer-to-Peer Steganographic Storage
    • 88
    • PDF
    Protocols for secure computations
    • A. Yao
    • Computer Science
    • FOCS 1982
    • 1982
    • 3,166
    Privacy-preserving cooperative scientific computations
    • W. Du, M. Atallah
    • Computer Science
    • Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001.
    • 2001
    • 184
    • PDF
    Metadata-based image watermarking for copyright protection
    • 100