Fingerprinted secret sharing steganography for robustness against image cropping attacks
Steganography is the art and science of hiding information. In this paper we propose a conceptual framework for Fingerprinted Secret Sharing Steganography. We offer a technique to break the main secret into multiple parts and hide them individually in a cover medium. We use a novel technique to com...
| Main Authors: | Potdar, Vidyasagar, Han, Song, Chang, Elizabeth |
|---|---|
| Format: | Conference Paper |
| Published: |
IEEE
2005
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/36595 |
Similar Items
e-Forensics steganography systems for secret information retrieval
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Dictionary module and UDC: Two new approaches to enhance embedding capacity of a steganographic channel
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
Tamper detection for ubiquitous RFID-enabled supply chain
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Bandwidth allocation in high speed networks with multiple nested charge classes
by: Khalil, Ibrahim, et al.
by: Khalil, Ibrahim, et al.
Mathematical Aspects of Word Embeddings
by: Carrington, Rachel
Published: (2021)
by: Carrington, Rachel
Published: (2021)
Researching the transparency of personal data sharing: designing a concert receipt
by: Styliari, Tatiana C., et al.
Published: (2016)
by: Styliari, Tatiana C., et al.
Published: (2016)
Data Communication Network and its Delay Effect on the Dynamic Operation of Distributed Generation Units in a Microgrid
by: Setiawan, M., et al.
Published: (2014)
by: Setiawan, M., et al.
Published: (2014)
ZigBee-based communication system for data transfer within future microgrids
by: Setiawan, M., et al.
Published: (2015)
by: Setiawan, M., et al.
Published: (2015)
Different Power Sharing Techniques for Converter-Interfaced DERs in an Autonomous Microgrid
by: Hosseini Mehr, T., et al.
Published: (2014)
by: Hosseini Mehr, T., et al.
Published: (2014)
The effects of cannabinoids on insulin secretion
by: Anderson, Richard L.
Published: (2011)
by: Anderson, Richard L.
Published: (2011)
Sharp-Edges Steganography in Arabic Characters for Information Hiding
by: Roslan, Nuur Alifah
Published: (2011)
by: Roslan, Nuur Alifah
Published: (2011)
Analysis of string matching compression algorithms
by: Nadarajan, Krishnaveny, et al.
Published: (2008)
by: Nadarajan, Krishnaveny, et al.
Published: (2008)
A Comparative Study on Compression of Different Image File Formats
by: Ooi, Poh San
Published: (1999)
by: Ooi, Poh San
Published: (1999)
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
by: Teoh, Chin Chuang
Published: (2005)
by: Teoh, Chin Chuang
Published: (2005)
The practical politics of sharing personal data
by: Tolmie, Peter, et al.
Published: (2017)
by: Tolmie, Peter, et al.
Published: (2017)
Model guided algorithm for mining unordered embedded subtrees
by: Hadzic, Fedja, et al.
Published: (2010)
by: Hadzic, Fedja, et al.
Published: (2010)
A Note on Collaborating Adversaries in the Srinathan-Kumar-Rangan Transmission Protocol
by: Moss, Ben
Published: (2003)
by: Moss, Ben
Published: (2003)
On robust methodologies for managing public health care systems
by: Nimmagadda, Shastri, et al.
Published: (2014)
by: Nimmagadda, Shastri, et al.
Published: (2014)
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
by: Pradhan, Biswajeet
Published: (2006)
by: Pradhan, Biswajeet
Published: (2006)
A conceptual framework for privacy policy negotiation in web services
by: Wu, Chen, et al.
Published: (2006)
by: Wu, Chen, et al.
Published: (2006)
Dynamic colour text steganography model using rgb coding and character spacing to improve capacity, invisibility and security
by: Thabit, Reema Ahmed Abdalla
Published: (2022)
by: Thabit, Reema Ahmed Abdalla
Published: (2022)
Spread Spectrum Based High Embedding Capacity Watermarking Method for Audio Signals
by: Xiang, Y., et al.
Published: (2015)
by: Xiang, Y., et al.
Published: (2015)
Multimodal fingerprint and face biometrics with fragile watermarking and convolutional neural network
by: Najih, Abdulmawla
Published: (2020)
by: Najih, Abdulmawla
Published: (2020)
(Dys)Regulation of Insulin Secretion by Macronutrients
by: Newsholme, Philip, et al.
Published: (2015)
by: Newsholme, Philip, et al.
Published: (2015)
Efficient and secured compression and steganography technique in wireless sensor network
by: Tuama, Ammar Yaseen
Published: (2016)
by: Tuama, Ammar Yaseen
Published: (2016)
Investigating the mechanisms of secretion of the moonlighting proteins Enolase and Fructose-1, 6-Bisphosphate Aldolase in Neisseria meningitidis
by: Atwah, Banan
Published: (2019)
by: Atwah, Banan
Published: (2019)
SmiDCA: Smishing attack detection for mobile computing on smishing dataset
by: Hasan, Dahah Ahmed Haidarah
Published: (2019)
by: Hasan, Dahah Ahmed Haidarah
Published: (2019)
The PREDICTS database: a global database of how local terrestrial biodiversity responds to human impacts
by: Hudson, L., et al.
Published: (2014)
by: Hudson, L., et al.
Published: (2014)
Unsupervised modeling of multiple data sources : a latent shared subspace approach
by: Gupta, Sunil Kumar
Published: (2011)
by: Gupta, Sunil Kumar
Published: (2011)
Generalized hash-binary-tree based self-healing key distribution with implicit authentication
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
A framework of authentication and authorization for e-health services
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Robust spatial diagnostic method and parameter estimation for spatial big data regression model
by: Ali, Mohammed Baba
Published: (2022)
by: Ali, Mohammed Baba
Published: (2022)
Demographic Crisis: Challenges for Retirement Schemes in Hong Kong
by: HO, K.Y.
Published: (2005)
by: HO, K.Y.
Published: (2005)
The type III secretion system and its role in the multicellular behaviour of Yersinia species
by: Barratt, Natalie Alice
Published: (2018)
by: Barratt, Natalie Alice
Published: (2018)
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019)
by: Abd Majid, Noorhafezan
Published: (2019)
Recovering and restoring tampered RFID data using steganographic principles
by: Mohan, M., et al.
Published: (2006)
by: Mohan, M., et al.
Published: (2006)
Low power text compression using Huffman coding with power management controller
by: Mohammed, Maan Hameed
Published: (2016)
by: Mohammed, Maan Hameed
Published: (2016)
IMB3-Miner: Mining induced/embedded subtrees by constraining the level of embedding
by: Tan, H., et al.
Published: (2006)
by: Tan, H., et al.
Published: (2006)
Data warehouse structuring methodologies for efficient mining of Western Australian petroleum data sources
by: Nimmagadda, Shastri, et al.
Published: (2005)
by: Nimmagadda, Shastri, et al.
Published: (2005)
Similar Items
-
e-Forensics steganography systems for secret information retrieval
by: Potdar, Vidyasagar, et al.
Published: (2005) -
Dictionary module and UDC: Two new approaches to enhance embedding capacity of a steganographic channel
by: Potdar, Vidyasagar, et al.
Published: (2005) -
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006) -
Tamper detection for ubiquitous RFID-enabled supply chain
by: Potdar, Vidyasagar, et al.
Published: (2005) -
Bandwidth allocation in high speed networks with multiple nested charge classes
by: Khalil, Ibrahim, et al.