DeepAI AI Chat
Log In Sign Up

The Realizations of Steganography in Encrypted Domain

by   Yan Ke, et al.

With the popularization and application of privacy protection technologies in cloud service and social network, ciphertext has been gradually becoming a common platform for public to exchange data. Under the cover of such a plat-form, we propose steganography in encrypted domain (SIED) in this paper to re-alize a novel method to realize secret communication Based on Simmons' model of prisoners' problems, we discuss the application scenarios of SIED. According to the different accesses to the encryption key and decryption key for secret mes-sage sender or receiver, the application modes of SIED are classified into four modes. To analyze the security requirments of SIED, four levels of steganalysis attacks are introduced based on the prior knowledge about the steganography system that the attacker is assumed to obtain in advance. Four levels of security standards of SIED are defined correspondingly. Based on the existing reversible data hiding techniques, we give four schemes of SIED as practical instances with different security levels. By analyzing the embedding and extraction characteris-tics of each instance, their SIED modes, application frameworks and security lev-els are discussed in detail.


Secure Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing

Reversible data hiding in encrypted images (RDH-EI) has attracted increa...

Steganography Security: Principle and Practice

This paper focuses on several theoretical issues and principles in stega...

A Reversible Data hiding Scheme in Encrypted Domain for Secret Image Sharing based on Chinese Remainder Theorem

Reversible data hiding in encrypted domain (RDH-ED) schemes based on sym...

Reversible Data Hiding in Encrypted Text Using Paillier Cryptosystem

Reversible Data Hiding in Encrypted Domain (RDHED) is an innovative meth...

Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data hiding in Encrypted Domain

This paper proposes a fully homomorphic encryption encapsulated differen...

Reversible Data hiding in Encrypted Domain with Public Key Embedding Mechanism

Considering the prospects of public key embedding (PKE) mechanism in act...

Provenance-based Classification Policy based on Encrypted Search

As an important type of cloud data, digital provenance is arousing incre...