Provably Secure Steganography with Imperfect Sampling.
Anna LysyanskayaMira MeyerovichPublished in: Public Key Cryptography (2006)
Keyphrases
- provably secure
- key management
- standard model
- security model
- public key
- blind signature scheme
- signature scheme
- partially blind signature scheme
- hash functions
- blind signature
- threshold signature scheme
- bilinear pairings
- resource constrained
- encryption scheme
- similarity measure
- data hiding
- software architecture
- peer to peer
- digital images
- wireless sensor networks
- high dimensional