Information Hiding with Data Diffusion using Convolutional Encoding for Super-encryption

The unification of data encryption with information hiding methods continues to receive significant attention because of the importance of protecting encrypted information by making it covert. This is because one of the principal limitations in any cryptographic system is that encrypted data flags the potential importance of the data (i.e. the plaintext information that has been encrypted) possibly leading to the launch of an attack which may or may not be successful. Information hiding overcomes this limitation by making the data (which may be the plaintext or the encrypted plaintext) imperceptible, the security of the hidden information being compromised if and only if its existence is detected.

[1]  Tanja Lange,et al.  Post-quantum cryptography , 2008, Nature.

[2]  G. Siegel,et al.  Analytic methods of probability theory , 1985 .

[3]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[4]  Sergei Bezobrazov,et al.  Cryptography using evolutionary computing , 2013 .

[5]  Paul Tobin,et al.  Cryptography using artificial intelligence , 2015, 2015 International Joint Conference on Neural Networks (IJCNN).

[6]  L. Goddard Information Theory , 1962, Nature.

[7]  Jonathan Blackledge Information hiding using stochastic diffusion for the covert transmission of encrypted images , 2010 .

[8]  David J. C. MacKay,et al.  Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.

[10]  P. Tobin,et al.  Chaos-based cryptography for cloud computing , 2016, 2016 27th Irish Signals and Systems Conference (ISSC).

[11]  Jonathan Blackledge,et al.  A Hardware One-Time Pad Prototype Generator for Localising Cloud Security , 2017 .

[12]  Jonathan M. Blackledge,et al.  Image Authentication Using Stochastic Diffusion , 2013, 2013 UKSim 15th International Conference on Computer Modelling and Simulation.

[13]  A. Kolmogoroff Über die analytischen Methoden in der Wahrscheinlichkeitsrechnung , 1931 .

[14]  김인택 [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .

[15]  Jonathan Blackledge,et al.  Resilient Digital Image Watermarking for Document Authentication , 2014 .

[16]  J. Blackledge,et al.  Steganography Using Stochastic Diffusion for the Covert Communication of Digital Images , 2011 .

[17]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[18]  Albert Einstein,et al.  On the Motion of Small Particles Suspended in Liquids at Rest Required by the Molecular-Kinetic Theory of Heat ∗ , 2004 .

[19]  Lee Tobin,et al.  On the Development of a One-Time Pad Generator for Personalising Cloud Security , 2017 .

[20]  William Feller,et al.  On Boundaries and Lateral Conditions for the Kolmogorov Differential Equations , 1957 .

[21]  Jonathan Blackledge,et al.  Application of Artificial Intelligence for Detecting Computing Derived Viruses , 2017 .

[22]  Chet Hosmer,et al.  Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols , 2012 .

[23]  Jonathan Blackledge,et al.  Information hiding by stochastic diffusion and its application to printed document authentication , 2009 .

[24]  Centro internazionale per la ricerca matematica,et al.  Analytic solutions of partial differential equations , 1981 .

[25]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[26]  Luis Navarro,et al.  Gibbs, Einstein and the Foundations of Statistical Mechanics , 1998 .