A Simple Mobile Plausibly Deniable System Using Image Steganography and Secure Hardware
Abstract
References
Index Terms
- A Simple Mobile Plausibly Deniable System Using Image Steganography and Secure Hardware
Recommendations
FSPDE: A Full Stack Plausibly Deniable Encryption System for Mobile Devices
CODASPY '24: Proceedings of the Fourteenth ACM Conference on Data and Application Security and PrivacyIn today's digital landscape, the ubiquity of mobile devices underscores the urgent need for stringent security protocols in both data transmission and storage. Plausibly deniable encryption (PDE) stands out as a pivotal solution, particularly in ...
Deniable encryptions secure against adaptive chosen ciphertext attack
ISPEC'12: Proceedings of the 8th international conference on Information Security Practice and ExperienceThe deniable encryption is a type of encryption which can hide the true message while revealing a fake one. Even if the sender or the receiver is coerced to show the plaintext and the used random numbers in encryption, a deniable encryption scheme ...
User-friendly deniable storage for mobile devices
Mobile devices are prevalently used to process sensitive data, but traditional encryption may not work when an adversary is able to coerce the device owners to disclose the encryption keys. Plausibly Deniable Encryption (PDE) is thus designed to protect ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/996918fc-08b8-428e-a2c7-3124b8bb6e52/3643650.cover.jpg)
- Program Chairs:
- Maanak Gupta,
- Mahmoud Abdelsalam,
- Mir Pritom,
- Feras Awaysheh
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 8Total Downloads
- Downloads (Last 12 months)8
- Downloads (Last 6 weeks)8
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in