{"title":"A secure steganography scheme based on (N,t) threshold","authors":"K. Fan, W. Kou","doi":"10.1109/AINA.2004.1283861","DOIUrl":null,"url":null,"abstract":"To solve the problems due to the restriction of the handheld devices and the improperness of traditional steganography schemes in m-commerce applications, a secure steganography scheme based on (N,t) threshold is proposed and its security is analyzed. This scheme can significantly reduce the computing complexity and the requirements for the communication devices. It also improves the security. This scheme enables clients to securely conduct m-commerce transactions and carry out steganographic communication using their handheld devices. The proposed scheme can resist various attack methods.","PeriodicalId":186142,"journal":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINA.2004.1283861","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
To solve the problems due to the restriction of the handheld devices and the improperness of traditional steganography schemes in m-commerce applications, a secure steganography scheme based on (N,t) threshold is proposed and its security is analyzed. This scheme can significantly reduce the computing complexity and the requirements for the communication devices. It also improves the security. This scheme enables clients to securely conduct m-commerce transactions and carry out steganographic communication using their handheld devices. The proposed scheme can resist various attack methods.