Cryptography Using Steganography: New Algorithms and Applications

[1]  B. Hao,et al.  Elementary Symbolic Dynamics And Chaos In Dissipative Systems , 1989 .

[2]  Jorge A. González,et al.  Chaotic and stochastic functions , 2000 .

[3]  Ahmed H. Tewfik,et al.  Robust audio watermarking using perceptual masking , 1998, Signal Process..

[4]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures , 2000, Advances in Information Security.

[5]  Alessandra Lumini,et al.  A wavelet-based image watermarking scheme , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).

[6]  Facoltà Di Ingegneria AN FPGA IMPLEMENTATION OF A CHAOTIC ENCRYPTION ALGORITHM , 2000 .

[7]  Yôiti Suzuki,et al.  Time-spread echo method for digital audio watermarking , 2005, IEEE Transactions on Multimedia.

[8]  Xiaolu Li,et al.  A Novel Hidden Transmission of Biometric Images Based on Chaos and Image Content , 2009, 2009 First International Workshop on Education Technology and Computer Science.

[9]  Michael Herman,et al.  Silent warfare: understanding the world of intelligence , 1992 .

[10]  Eugene Lukacs,et al.  Applications of characteristic functions , 1964 .

[11]  W. J. Dowling,et al.  Watermarking digital images for copyright protection , 1996 .

[12]  Manuel Blum,et al.  How to Generate Cryptographically Strong Sequences of Pseudo Random Bits , 1982, FOCS.

[13]  Henry M. Gladney Safeguarding Digital Library Contents and Users , 2009 .

[14]  J. M. Blackledge,et al.  A fractal modulation technique for digital communications systems , 1998, IEEE Military Communications Conference. Proceedings. MILCOM 98 (Cat. No.98CH36201).

[15]  Jian Zhao,et al.  Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.

[16]  Eli Biham,et al.  Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91 , 1991, EUROCRYPT.

[17]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[18]  Jerome M. Shapiro,et al.  Embedded image coding using zerotrees of wavelet coefficients , 1993, IEEE Trans. Signal Process..

[19]  Bruce Schneier,et al.  Beyond fear - thinking sensibly about security in an uncertain world , 2003 .

[20]  Xiaomei Quan,et al.  Audio watermarking based on psychoacoustic model and adaptive wavelet packets , 2004, Proceedings 7th International Conference on Signal Processing, 2004. Proceedings. ICSP '04. 2004..

[21]  Xiangzhong Fang,et al.  Spread-Spectrum Audio Watermark Robust Against Pitch-Scale Modification , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[22]  B. S. Manjunath,et al.  Technique for image data hiding and reconstruction without host image , 1999, Electronic Imaging.

[23]  Antonio Ortega,et al.  High capacity audio data hiding for noisy channels , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[24]  R. Scheaffer,et al.  Mathematical Statistics with Applications. , 1992 .

[25]  Yin Xiong,et al.  Covert Communication Audio Watermarking Algorithm Based on LSB , 2006, 2006 International Conference on Communication Technology.

[26]  Birgit Pfitzmann,et al.  Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals , 1996, Information Hiding.

[27]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[28]  Akihiro Yamamoto,et al.  A Digital Watermark Technique Based on the Wavelet Transform and Its Robustness on Image Compression and Transformation , 1999 .

[29]  V. eIiAshchenko,et al.  Cryptography: An Introduction , 2002 .

[30]  Won Don Lee,et al.  An image watermarking scheme with hidden signatures , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[31]  Ioannis Pitas,et al.  Circularly symmetric watermark embedding in 2-D DFT domain , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[32]  Thierry Pun,et al.  Secure Copyright Protection Techniques for Digital Images , 1998, Information Hiding.

[33]  Mauro Barni,et al.  A DCT-domain system for robust image watermarking , 1998, Signal Process..

[34]  B. Jack Copeland,et al.  Colossus: The secrets of Bletchley Park's code-breaking computers , 2006 .

[35]  Mohan S. Kankanhalli,et al.  Content based watermarking of images , 1998, MULTIMEDIA '98.

[36]  Xiang-Gen Xia,et al.  A multiresolution watermark for digital images , 1997, Proceedings of International Conference on Image Processing.

[37]  Mauro Barni,et al.  DWT-based technique for spatio-frequency masking of digital signatures , 1999, Electronic Imaging.

[38]  Nasser Al-Ismaily Dynamic block encryption with self-authenticating key exchange , 2005 .

[39]  S. Mallat A wavelet tour of signal processing , 1998 .

[40]  W. Heitler The Principles of Quantum Mechanics , 1947, Nature.

[41]  Yuefen Chen,et al.  Double random scrambling algorithm based on subblocks for image hiding , 2010, 2010 International Conference on Computer and Communication Technologies in Agriculture Engineering.

[42]  Kineo Matsui,et al.  Embedding a seal into a picture under orthogonal wavelet transform , 1996, Proceedings of the Third IEEE International Conference on Multimedia Computing and Systems.

[43]  C H Oliveira,et al.  Cryptography with chaos using Chua's system , 2011 .

[44]  Min Wu,et al.  Rotation-, scale-, and translation-resilient public watermarking for images , 2000, Electronic Imaging.

[45]  Martin Turner,et al.  Fractal geometry in digital imaging , 1998 .

[46]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[47]  Julius O. Smith,et al.  Watermarking sinusoidal audio representations by quantization index modulation in multiple frequencies , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[48]  Johan Håstad,et al.  Pseudo-random generators under uniform assumptions , 1990, STOC '90.

[49]  Manuel Blum,et al.  A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..

[50]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[51]  Che-Wei Lee,et al.  A new steganographic method based on information sharing via PNG images , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).

[52]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[53]  Khaled W. Mahmoud Low-resolution watermarking for print security , 2004 .

[54]  W. R. Mann,et al.  Green's Functions; Introductory Theory with Applications , 1971 .

[55]  I Pitas,et al.  Image watermarking using block site selection and DCT domain constraints. , 1998, Optics express.

[56]  Simon Singh,et al.  The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography , 1999 .

[57]  Bo Tao,et al.  Adaptive watermarking in the DCT domain , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[58]  V. Lazarescu,et al.  New results using the audio watermarking based on wavelet transform , 2005, International Symposium on Signals, Circuits and Systems, 2005. ISSCS 2005..

[59]  Wladyslaw Kozaczuk,et al.  Enigma : how the German machine cipher was broken, and how it was read by the Allies in World War Two , 1984 .

[60]  M. D. MacLaren The Art of Computer Programming. Volume 2: Seminumerical Algorithms (Donald E. Knuth) , 1970 .

[61]  Thierry Pun,et al.  Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..

[62]  S. Gupta,et al.  Delta Function , 1964 .

[63]  L. M. Pecora,et al.  A CIRCUIT FOR STUDYING THE SYNCHRONIZATION OF CHAOTIC SYSTEMS , 1992 .

[64]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[65]  Ahmed H. Tewfik,et al.  Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).

[66]  Eli Biham,et al.  Differential Cryptanalysis of Feal and N-Hash , 1991, EUROCRYPT.

[67]  H. White Algorithmic complexity of points in dynamical systems , 1993, Ergodic Theory and Dynamical Systems.

[68]  Leonid A. Levin,et al.  Pseudo-random generation from one-way functions , 1989, STOC '89.

[69]  J. G. Bryan,et al.  Introduction to probability and random variables , 1961 .

[70]  Tambe,et al.  Driving systems with chaotic signals. , 1992, Physical review. A, Atomic, molecular, and optical physics.

[71]  A. Brudno Entropy and the complexity of the trajectories of a dynamical system , 1978 .

[72]  Xiang-Yang Wang,et al.  A Novel Synchronization Invariant Audio Watermarking Scheme Based on DWT and DCT , 2006, IEEE Transactions on Signal Processing.

[73]  Evangelos Kranakis Primality and cryptography , 1986, Wiley-Teubner series in computer science.

[74]  S. Katsura,et al.  Exactly solvable models showing chaotic behavior II , 1985 .

[75]  Adrian S. Lewis,et al.  Image compression using the 2-D wavelet transform , 1992, IEEE Trans. Image Process..

[76]  Terry Ritter The Efficient Generation of Cryptographic Confusion Sequences , 1991, Cryptologia.

[77]  Yu-Huang Chu,et al.  Dynamic data encryption system based on synchronised chaotic systems , 1999 .

[78]  M.I. Aziz,et al.  Introduction to Cryptography , 2002, 2005 International Conference on Microelectronics.

[79]  Robert J. Safranek,et al.  Signal compression based on models of human perception , 1993, Proc. IEEE.

[80]  Ja-Ling Wu,et al.  Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..

[81]  Eric A. Suess,et al.  Generating Random Numbers , 2010 .

[82]  M.E. Moghaddam,et al.  On-line signature verification using ANFIS , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.

[83]  Michael F. Shlesinger Perspectives in nonlinear dynamics : 28-30 May 1985 Naval Surface Weapons Center , 1986 .

[84]  John M. Carroll,et al.  Chaos in Cryptography: the Escape from the Strange Attractor , 1992, Cryptologia.

[85]  Rashiq Rafiq Marie Fractal-based models for Internet traffic and their application to secure data transmission , 2000 .

[86]  Zbigniew Kotulski,et al.  Discrete chaotic cryptography , 1997 .

[87]  William Stallings,et al.  Cryptography and network security , 1998 .

[88]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[89]  Oded Goldreich,et al.  Introduction to Complexity Theory Notes for a One{semester Course , 2022 .

[90]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[91]  Darko Kirovski,et al.  Spread-spectrum watermarking of audio signals , 2003, IEEE Trans. Signal Process..

[92]  Francis M. Boland,et al.  Phase watermarking of digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[93]  Yo-Sung Ho,et al.  Digital audio watermarking in the cepstrum domain , 2000, IEEE Trans. Consumer Electron..

[94]  Adnan M. Alattar Smart Images using Digimarc's watermarking technology , 2000, Electronic Imaging.

[95]  G. Hutchison,et al.  Electronic data interchange , 1987, IEEE Network.

[96]  Jinwoo Hong,et al.  New echo embedding technique for robust and imperceptible audio watermarking , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[97]  Deepa Kundur,et al.  Digital watermarking using multiresolution wavelet decomposition , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[98]  Leonid A. Levin,et al.  One way functions and pseudorandom generators , 1987, Comb..

[99]  John G. Proakis,et al.  Probability, random variables and stochastic processes , 1985, IEEE Trans. Acoust. Speech Signal Process..

[100]  Bruce Schneier,et al.  A SELF-STUDY COURSE IN BLOCK-CIPHER CRYPTANALYSIS , 2000, Cryptologia.

[101]  Sekharjit Datta,et al.  Print protection using high-frequency fractal noise , 2004, IS&T/SPIE Electronic Imaging.

[102]  Alastair Reed,et al.  Digital watermarking using improved human visual system model , 2001, IS&T/SPIE Electronic Imaging.

[103]  Erica Klarreich,et al.  Take a chance: Scientists put randomness to work , 2004 .

[104]  Deepa Kundur,et al.  A robust digital image watermarking method using wavelet-based fusion , 1997, Proceedings of International Conference on Image Processing.

[105]  John P Briggs Fractals, The Patterns of Chaos / Discovering A New Aesthetic of Art, Science, and Nature , 1992 .

[106]  Khaled W. Mahmoud,et al.  Printed Document Authentication using Texture Coding , 2009 .

[107]  Jiashu Zhang,et al.  Robust Audio Watermarking Scheme Based on Nonuniform Discrete Fourier Transform , 2006, 2006 IEEE International Conference on Engineering of Intelligent Systems.

[108]  Tapio Seppänen,et al.  Fusing digital audio watermarking and authentication in diverse signal domains , 2005, 2005 13th European Signal Processing Conference.

[109]  Leon O. Chua,et al.  Experimental Demonstration of Secure Communications via Chaotic Synchronization , 1992, Chua's Circuit.

[110]  E. G. Steward,et al.  Fourier Optics: An Introduction, Second Edition. , 1989 .

[111]  E. Alvarez,et al.  New approach to chaotic encryption , 1999 .

[112]  F. Vivaldi,et al.  An algorithmic view of pseudochaos , 1999 .

[113]  Daniel D. Wheeler,et al.  Problems with Chaotic Cryptosystems , 1989, Cryptologia.

[114]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[115]  J. Sethna Statistical Mechanics: Entropy, Order Parameters, and Complexity , 2021 .

[116]  R. F. Hoskins,et al.  Theories of Generalised Functions: Distributions, Ultradistributions and Other Generalised Functions , 2005 .

[117]  Phillip Rogaway,et al.  A Software-Optimized Encryption Algorithm , 1998, Journal of Cryptology.

[118]  Steven A. Tretter,et al.  Introduction to Discrete-Time Signal Processing , 1976 .