The Realizations of Steganography in Encrypted Domain

03/13/2023
by   Yan Ke, et al.
0

With the popularization and application of privacy protection technologies in cloud service and social network, ciphertext has been gradually becoming a common platform for public to exchange data. Under the cover of such a plat-form, we propose steganography in encrypted domain (SIED) in this paper to re-alize a novel method to realize secret communication Based on Simmons' model of prisoners' problems, we discuss the application scenarios of SIED. According to the different accesses to the encryption key and decryption key for secret mes-sage sender or receiver, the application modes of SIED are classified into four modes. To analyze the security requirments of SIED, four levels of steganalysis attacks are introduced based on the prior knowledge about the steganography system that the attacker is assumed to obtain in advance. Four levels of security standards of SIED are defined correspondingly. Based on the existing reversible data hiding techniques, we give four schemes of SIED as practical instances with different security levels. By analyzing the embedding and extraction characteris-tics of each instance, their SIED modes, application frameworks and security lev-els are discussed in detail.

READ FULL TEXT
research
06/27/2021

Secure Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing

Reversible data hiding in encrypted images (RDH-EI) has attracted increa...
research
06/10/2018

Steganography Security: Principle and Practice

This paper focuses on several theoretical issues and principles in stega...
research
09/25/2020

A Reversible Data hiding Scheme in Encrypted Domain for Secret Image Sharing based on Chinese Remainder Theorem

Reversible data hiding in encrypted domain (RDH-ED) schemes based on sym...
research
09/23/2022

Reversible Data Hiding in Encrypted Text Using Paillier Cryptosystem

Reversible Data Hiding in Encrypted Domain (RDHED) is an innovative meth...
research
04/29/2019

Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data hiding in Encrypted Domain

This paper proposes a fully homomorphic encryption encapsulated differen...
research
08/20/2022

Reversible Data hiding in Encrypted Domain with Public Key Embedding Mechanism

Considering the prospects of public key embedding (PKE) mechanism in act...
research
01/07/2020

Provenance-based Classification Policy based on Encrypted Search

As an important type of cloud data, digital provenance is arousing incre...

Please sign up or login with your details

Forgot password? Click here to reset