Security levels in steganography -- insecurity does not imply detectability
From MaRDI portal
Publication:2401760
DOI10.1016/j.tcs.2017.06.007zbMath1372.68089OpenAlexW2692044285WikidataQ115036513 ScholiaQ115036513MaRDI QIDQ2401760
Maciej Liśkiewicz, Ulrich Wölfel, K. Ruediger Reischuk
Publication date: 5 September 2017
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2017.06.007
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Grey-box steganography
- An information-theoretic model for steganography
- Upper and lower bounds on black-box steganography
- How To Bootstrap Anonymous Communication
- Efficiency Improvements in Constructing Pseudorandom Generators from One-Way Functions
- On the round complexity of covert computation
- A Pseudorandom Generator from any One-way Function
- Provably Secure Steganography
- Advances in Cryptology - EUROCRYPT 2004
- On the Implementation of Huge Random Objects
- Broadcast Steganography
- Characterizing pseudoentropy and simplifying pseudorandom generator constructions
- Theory of Cryptography
- Automata, Languages and Programming
- Public Key Cryptography - PKC 2006
This page was built for publication: Security levels in steganography -- insecurity does not imply detectability