Side Attacks on Stegosystems Executing Message Encryption Previous to Embedding.
Valery I. KorzhikCuong NguyenIvan FedyaninGuillermo Morales-LunaPublished in: J. Inf. Hiding Multim. Signal Process. (2020)
Keyphrases
- information hiding
- secret message
- watermarking algorithm
- watermarking technique
- watermarking scheme
- image authentication
- stream cipher
- cryptographic protocols
- digital signature
- data hiding
- cryptographic algorithms
- blind watermarking
- security protocols
- advanced encryption standard
- countermeasures
- security properties
- watermark embedding
- block cipher
- encryption scheme
- jpeg compression
- digital image watermarking scheme
- secret key
- digital watermarking
- communication channels
- key management
- image watermarking
- watermarked image
- encryption algorithms
- program chairs
- image encryption
- jpeg images
- copyright protection
- security mechanisms
- wavelet domain
- signal processing
- data embedding
- ciphertext
- security analysis
- digital content