A Cryptographic Approach for Steganography.
Jacques M. BahiChristophe GuyeuxPierre-Cyrille HéamPublished in: CoRR (2017)
Keyphrases
- smart card
- information hiding
- information security
- hidden information
- high capacity
- key management
- data embedding
- data hiding
- secret information
- jpeg images
- spread spectrum
- random number generator
- hash functions
- security protocols
- cryptographic protocols
- information systems
- security properties
- encryption scheme
- cover image
- reversible data hiding
- neural network
- reed solomon codes