DocumentCode
2324940
Title
Distributed Steganography
Author
Liao, Xin ; Wen, Qiao-yan ; Shi, Sha
Author_Institution
State Key Lab. of Networking & Switching Technol., Beijing Univ. of Posts & Telecommun., Beijing, China
fYear
2011
fDate
14-16 Oct. 2011
Firstpage
153
Lastpage
156
Abstract
In this paper, we address the issue of "distributed steganography" known as many cooperative computations with distributed parties in the covert communication. We present a model of distributed steganography, and give some properties. For the reader\´s convenience, we consider a scenario in which two senders have their own private data, and wish to carry out a steganographic technique on the union of their private inputs, without revealing any information. The recipient only acquire the union of their inputs. Moreover, they wish to avoid adversaries\´ attention to the covert communication. We propose a practical scheme to achieve two-party distributed steganography, combining with two different mechanisms: wet paper coding and secure multi-party computation. Detailed correctness, security analysis, and generalization of the scheme are also provided.
Keywords
steganography; cooperative computation; distributed steganography; secure multiparty computation; security analysis; wet paper coding; Cryptography; Educational institutions; Encoding; Matrices; Protocols; Vectors; Distributed steganography; covert matrix-vector product; secure multi-party computation; wet paper coding;
fLanguage
English
Publisher
ieee
Conference_Titel
Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2011 Seventh International Conference on
Conference_Location
Dalian
Print_ISBN
978-1-4577-1397-2
Type
conf
DOI
10.1109/IIHMSP.2011.20
Filename
6079557
Link To Document