Title :
Network Based Public Key Method for Steganography
Author :
Bandyopadhyay, Samir Kumar ; Kim, Tai-Hoon ; Parui, Sarthak
Author_Institution :
Dept. of Comput. Sci. & Eng., Univ. of Calcutta, Kolkata, India
Abstract :
Steganography (a rough Greek translation of the term Steganography is secret writing) has been used in various forms for 2500 years. It has found use in variously in military, diplomatic, personal and intellectual property applications. Briefly stated, steganography is the term applied to any number of processes that will hide a message within an object, where the hidden message will not be apparent to an observer. The original steganographic applications used "null ciphers", or clear text. A null cipher conveys that the message has not been encrypted in any way, whether it is using basic character shifting, substitution or advanced modern day encryption algorithm. So, the message is often in plain view but for a reason can either not be detected as being present or cannot be seen once detected. As is common with cryptography, steganography has its roots in military and government applications and has advanced in ingenuity and complexity. In this paper, Network Based Public Key Method for Steganography is proposed under RSA cryptographic assumptions.
Keywords :
image processing; public key cryptography; steganography; RSA cryptographic assumption; character shifting; encryption algorithm; hidden message; network based public key method; null ciphers; steganographic applications; steganography; Multimedia communication; Multimedia computing; Ubiquitous computing; Data; Encryption; Hiding; Security; image;
Conference_Titel :
Ubiquitous Computing and Multimedia Applications (UCMA), 2011 International Conference on
Conference_Location :
Daejeon
Print_ISBN :
978-1-4577-0571-7
DOI :
10.1109/UCMA.2011.19