2022
DOI: 10.18280/isi.270607
|View full text |Cite
|
Sign up to set email alerts
|

Brute Force Attack on Distributed data Hiding in the Multi-Cloud Storage Environment More Diminutive than the Exponential Computations

Abstract: Classical steganography is designed to hide data by cover media. Recent approaches fragmented the data and hide them in a distributed manner by embedding each fragmented data into a distinct cover media. This approach makes a secret message extremely difficult for an attacker to detect. However, cover media modification leaves fingerprints that could expose a secret channel to an attacker. To overcome the problem, a novel steganography concept designed by two technical contributions. I). cover media does not u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…The key agreement procedure is out of the scope of our work. The key consists of a set of information, i.e., a Cloud list and their credentials to access them, a Base value, a session key for permutation, and the number of files indexed in different lists for substitution, equation (1) shows the key and its information. .…”
Section: Product Cipher-based Distributed Steganographymentioning
confidence: 99%
See 3 more Smart Citations
“…The key agreement procedure is out of the scope of our work. The key consists of a set of information, i.e., a Cloud list and their credentials to access them, a Base value, a session key for permutation, and the number of files indexed in different lists for substitution, equation (1) shows the key and its information. .…”
Section: Product Cipher-based Distributed Steganographymentioning
confidence: 99%
“…. (1) where, Once the files are converted, the sender employs dynamic embedding strategies. These strategies involve utilizing both substitution and permutation operations to ensure that the converted files are embedded securely and discreetly across multiple cloud platforms.…”
Section: Product Cipher-based Distributed Steganographymentioning
confidence: 99%
See 2 more Smart Citations
“…Nevertheless, steganography offers a captivating approach by obfuscating hidden data and embedding confidential messages within innocuous cover messages guided by cryptographic keys. The essence of steganography lies in the formidable challenge it poses to unauthorized entities attempting to retrieve hidden messages without the proper key, adding an additional layer of security [1][2][3][4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%