DocumentCode :
2324940
Title :
Distributed Steganography
Author :
Liao, Xin ; Wen, Qiao-yan ; Shi, Sha
Author_Institution :
State Key Lab. of Networking & Switching Technol., Beijing Univ. of Posts & Telecommun., Beijing, China
fYear :
2011
fDate :
14-16 Oct. 2011
Firstpage :
153
Lastpage :
156
Abstract :
In this paper, we address the issue of "distributed steganography" known as many cooperative computations with distributed parties in the covert communication. We present a model of distributed steganography, and give some properties. For the reader\´s convenience, we consider a scenario in which two senders have their own private data, and wish to carry out a steganographic technique on the union of their private inputs, without revealing any information. The recipient only acquire the union of their inputs. Moreover, they wish to avoid adversaries\´ attention to the covert communication. We propose a practical scheme to achieve two-party distributed steganography, combining with two different mechanisms: wet paper coding and secure multi-party computation. Detailed correctness, security analysis, and generalization of the scheme are also provided.
Keywords :
steganography; cooperative computation; distributed steganography; secure multiparty computation; security analysis; wet paper coding; Cryptography; Educational institutions; Encoding; Matrices; Protocols; Vectors; Distributed steganography; covert matrix-vector product; secure multi-party computation; wet paper coding;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2011 Seventh International Conference on
Conference_Location :
Dalian
Print_ISBN :
978-1-4577-1397-2
Type :
conf
DOI :
10.1109/IIHMSP.2011.20
Filename :
6079557
Link To Document :
بازگشت