A step towards practical steganography systems

3Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

There has been many hidden communication techniques proposed in the last few years. The focus was given to steganography to build such techniques. Utilizing stego-key(s) to hide secret messages into images strengthen the security of these techniques. However, adopting one of the available key-agreement protocols, to distribute stego-key(s) between the communicating parties, will destroy the infrastructure of the entire communication. The reason is that, these protocols perform their transactions on sight, while the desirable communications need to be completely hidden. In this paper, a key-generation unit is proposed to be added to the steganography general model. This unit utilizes a new key-agreement protocol, stego-KA, to help support the entire class of hidden communication techniques to exchange the sego-key(s) covertly. The proposed stego-KA protocol is based on Diffie-Hellman key establishment protocol and has significant advantages that support hidden communications. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Ouda, A. H., & El-Sakka, M. R. (2005). A step towards practical steganography systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3656 LNCS, pp. 1158–1166). https://doi.org/10.1007/11559573_140

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free