Message passing using the cover text as secret key

Yu Chen Shu, Wen Liang Hwang, Dean Chou

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Conventional secret message passing methods embed a message in the cover-text, so the receiver must use stego-text to extract the message content. In contrast, this paper proposes a new paradigm in which the receiver does not necessarily require stego-text to retrieve the message content. Under the proposed approach, the sender can produce keys without modifying the cover-image, and the intended recipient can use the keys and an image that resembles like the cover-image to recover the message. The feature has the potential to generate many new secret message passing applications that would probably be impossible under the current widely used paradigm. The performance criteria of the new paradigm are presented. We propose a subspace approach to implement the paradigm, demonstrate that the criteria can be satisfied, and consider some interesting application scenarios.

Original languageEnglish
Title of host publicationProceedings - 2012 International Symposium on Biometrics and Security Technologies, ISBAST 2012
Pages102-107
Number of pages6
DOIs
Publication statusPublished - 2012 May 24
Event2012 International Symposium on Biometrics and Security Technologies, ISBAST 2012 - Taipei, Taiwan
Duration: 2012 Mar 262012 Mar 29

Publication series

NameProceedings - 2012 International Symposium on Biometrics and Security Technologies, ISBAST 2012

Other

Other2012 International Symposium on Biometrics and Security Technologies, ISBAST 2012
CountryTaiwan
CityTaipei
Period12-03-2612-03-29

All Science Journal Classification (ASJC) codes

  • Biotechnology
  • Computer Science Applications

Fingerprint Dive into the research topics of 'Message passing using the cover text as secret key'. Together they form a unique fingerprint.

Cite this