Secure Steganography: Statistical Restoration of the Second Order Dependencies for Improved Security.
Anindya SarkarKaushal SolankiUpamanyu MadhowShivkumar ChandrasekaranBangalore S. ManjunathPublished in: ICASSP (2) (2007)
Keyphrases
- security issues
- security requirements
- information security
- security level
- security mechanisms
- security measures
- security analysis
- key management
- data encryption
- security protocols
- security properties
- cryptographic protocols
- electronic voting
- security management
- data security
- high security
- encryption scheme
- smart card
- image restoration
- authentication protocol
- security architecture
- authentication mechanism
- key agreement protocol
- public key encryption
- integrity verification
- security model
- sensitive data
- key exchange protocol
- security policies
- security patterns
- public key cryptosystem
- access control
- security services
- secret information
- digital signature scheme
- network security
- stream cipher
- previously mentioned
- key management scheme
- authentication scheme
- digital rights management
- diffie hellman
- trusted computing
- information hiding
- intrusion detection
- electronic payment
- private key
- key agreement
- hidden information
- key distribution
- factor authentication
- public key