• DocumentCode
    2324940
  • Title

    Distributed Steganography

  • Author

    Liao, Xin ; Wen, Qiao-yan ; Shi, Sha

  • Author_Institution
    State Key Lab. of Networking & Switching Technol., Beijing Univ. of Posts & Telecommun., Beijing, China
  • fYear
    2011
  • fDate
    14-16 Oct. 2011
  • Firstpage
    153
  • Lastpage
    156
  • Abstract
    In this paper, we address the issue of "distributed steganography" known as many cooperative computations with distributed parties in the covert communication. We present a model of distributed steganography, and give some properties. For the reader\´s convenience, we consider a scenario in which two senders have their own private data, and wish to carry out a steganographic technique on the union of their private inputs, without revealing any information. The recipient only acquire the union of their inputs. Moreover, they wish to avoid adversaries\´ attention to the covert communication. We propose a practical scheme to achieve two-party distributed steganography, combining with two different mechanisms: wet paper coding and secure multi-party computation. Detailed correctness, security analysis, and generalization of the scheme are also provided.
  • Keywords
    steganography; cooperative computation; distributed steganography; secure multiparty computation; security analysis; wet paper coding; Cryptography; Educational institutions; Encoding; Matrices; Protocols; Vectors; Distributed steganography; covert matrix-vector product; secure multi-party computation; wet paper coding;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2011 Seventh International Conference on
  • Conference_Location
    Dalian
  • Print_ISBN
    978-1-4577-1397-2
  • Type

    conf

  • DOI
    10.1109/IIHMSP.2011.20
  • Filename
    6079557