Chaotic iterations for steganography: Stego-security and topological-security

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

15 pages; 3 figures; SECRYPT 2011: International Conference on Security and Cryptography, Seville, Spain, 18-21 July

Scientific paper

In this paper is proposed a novel steganographic scheme based on chaotic iterations. This research work takes place into the information hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called "watermark-only attack". Additionally, we prove that this scheme presents topological properties so that it is one of the firsts able to face, at least partially, an adversary when considering the others categories of attacks defined in the literature.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Chaotic iterations for steganography: Stego-security and topological-security does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Chaotic iterations for steganography: Stego-security and topological-security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Chaotic iterations for steganography: Stego-security and topological-security will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-137257

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.