Steganography Secure against Cover-Stego-Attacks.
Elke FranzAndreas PfitzmannPublished in: Information Hiding (1999)
Keyphrases
- data hiding
- hidden information
- information hiding
- secret information
- information leakage
- watermarking technique
- secure routing
- jpeg images
- stream cipher
- cryptographic protocols
- security mechanisms
- security protocols
- cover image
- secret message
- chosen plaintext
- watermarking scheme
- digital watermark
- cryptographic algorithms
- block cipher
- security measures
- security issues
- spread spectrum
- countermeasures
- security flaws
- watermark embedding
- information security
- error correction
- watermarking algorithm
- watermarking method
- high capacity
- secret data
- advanced encryption standard
- data embedding
- unauthorized access
- embedded image
- copyright protection
- security requirements
- spatial domain
- reversible data hiding
- image authentication
- authentication protocol
- digital watermarking
- smart card
- authentication scheme
- transform domain
- wavelet domain
- secret image
- wireless sensor networks