Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/646767.704303guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Provably Secure Steganography

Published: 18 August 2002 Publication History

Abstract

Informally, steganography is the process of sending a secret message from Alice to Bob in such a way that an eavesdropper (who listens to all communications) cannot even tell that a secret message is being sent. In this work, we initiate the study of steganography from a complexity-theoretic point of view. We introduce definitions based on computational indistinguishability and we prove that the existence of one-way functions implies the existence of secure steganographic protocols.

References

[1]
Ross J. Anderson and Fabien A. P. Petitcolas. On The Limits of Steganography . IEEE Journal of Selected Areas in Communications, 16(4). May 1998.
[2]
Mihir Bellare and Chanathip Namprempre. Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm . In: Advances in Cryptology - Asiacrypt '00 . December 2000.

Cited By

View all
  • (2024)Leveraging Generative Models for Covert Messaging: Challenges and Tradeoffs for "Dead-Drop" DeploymentsProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653264(67-78)Online publication date: 19-Jun-2024
  • (2017)Security levels in steganography Insecurity does not imply detectabilityTheoretical Computer Science10.1016/j.tcs.2017.06.007692:C(25-45)Online publication date: 5-Sep-2017
  • (2016)Provable Secure Universal Steganography of Optimal RateProceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security10.1145/2909827.2930796(81-92)Online publication date: 20-Jun-2016
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
CRYPTO '02: Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
August 2002
628 pages
ISBN:354044050X

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 18 August 2002

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Leveraging Generative Models for Covert Messaging: Challenges and Tradeoffs for "Dead-Drop" DeploymentsProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653264(67-78)Online publication date: 19-Jun-2024
  • (2017)Security levels in steganography Insecurity does not imply detectabilityTheoretical Computer Science10.1016/j.tcs.2017.06.007692:C(25-45)Online publication date: 5-Sep-2017
  • (2016)Provable Secure Universal Steganography of Optimal RateProceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security10.1145/2909827.2930796(81-92)Online publication date: 20-Jun-2016
  • (2016)How To Bootstrap Anonymous CommunicationProceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science10.1145/2840728.2840743(333-344)Online publication date: 14-Jan-2016
  • (2016)CliptographyProceedings, Part II, of the 22nd International Conference on Advances in Cryptology --- ASIACRYPT 2016 - Volume 1003210.1007/978-3-662-53890-6_2(34-64)Online publication date: 4-Dec-2016
  • (2016)Access Control EncryptionProceedings, Part II, of the 14th International Conference on Theory of Cryptography - Volume 998610.1007/978-3-662-53644-5_21(547-576)Online publication date: 31-Oct-2016
  • (2014)Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functionsInformation Sciences: an International Journal10.1016/j.ins.2014.06.024283(94-106)Online publication date: 1-Nov-2014
  • (2014)Practical Covert AuthenticationProceedings of the 17th International Conference on Public-Key Cryptography --- PKC 2014 - Volume 838310.1007/978-3-642-54631-0_35(611-629)Online publication date: 26-Mar-2014
  • (2013)Pseudorandom signaturesProceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security10.1145/2484313.2484325(107-118)Online publication date: 8-May-2013
  • (2013)Moving steganography and steganalysis from the laboratory into the real worldProceedings of the first ACM workshop on Information hiding and multimedia security10.1145/2482513.2482965(45-58)Online publication date: 17-Jun-2013
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media