Login / Signup
Identity-based steganography and its applications to censorship resistance.
Tim Ruffing
Jonas Schneider
Aniket Kate
Published in:
CCS (2013)
Keyphrases
</>
information hiding
signature scheme
data hiding
key management
secret information
authentication and key agreement
encryption scheme
key distribution
data embedding
spread spectrum
signcryption scheme
high capacity
data sets
information security
secret message
reed solomon codes
jpeg images
neural network