Securing Information Flow in Content Delivery Networks with Visual and Quantum Cryptography

被引:0
|
作者
Mowla, Nishat I. [1 ]
Doh, Inshil [1 ]
Chae, KiJoon [1 ]
机构
[1] Ewha Womans Univ, Dept Comp Sci & Engn, Seoul, South Korea
关键词
Steganography; Visual Cryptography; Quantum Cryptography; Image hijacking;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Steganography, a science of visual cryptography, was historically originated from the times of war when in one country a messenger's head would be shaved to write a secret message on it and hair grown again before he was sent to the other country carrying the message in his head as it was impossible to be revealed unless the head was shaved again on the other end. Luckily the Steganography used these days learnt a lot from this concept but made sure no one needed to shave their heads. Though Steganography is an old concept it is a powerful one and can be practiced where long classical secret keys need to be avoided and sense of simplicity while strong cryptography is vital. However one of the biggest challenges of Steganography and other Visual Cryptography techniques is that an attacker in the middle can hijack the image and forward a fake image. This again means that we need large classical keys or so to secure the channel. However large keys are no longer going to be suitable for future next generation networks as they require light weight key distribution systems which are also free from eavesdropping. Besides, in recent studies it is suggested that in near future quantum computers would be able to break classical cryptographic techniques such as RSA. With quantum computers, quantum cryptography also came into light and now seems to be promising based on its unique features that make it free from eavesdropping or any other third party intrusion in the key distribution system. Our paper proposes a technique where we show how an old technique such as Steganography can be promising when we combine it with the unique key distribution mechanism of Quantum Cryptography with some other additional security features.
引用
收藏
页码:463 / 468
页数:6
相关论文
共 50 条
  • [1] Securing Networks using Quantum Cryptography
    Chaudhuri, Kostav
    Singh, Tanya
    2015 4TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2015,
  • [2] Securing information display by use of visual cryptography
    Yamamoto, H
    Hayasaki, Y
    Nishida, N
    OPTICS LETTERS, 2003, 28 (17) : 1564 - 1566
  • [3] Using Quantum Cryptography for securing Wireless LAN networks
    Falahati, A.
    Meshgi, Hadi
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 698 - 701
  • [4] Applicability of quantum cryptography for securing mobile communication networks
    Marhoefer, Michael
    Wimberger, Ilse
    Pnppe, Andreas
    LONG-TERM AND DYNAMICAL ASPECTS OF INFORMATION SECURITY: EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, 2007, : 97 - +
  • [5] CRYPTOGRAPHY IS KEY TO SECURING PROPRIETARY INFORMATION
    WATTS, A
    EDN, 1995, 40 (14) : 99 - 102
  • [6] Cryptography's role in securing information
    Lin, H
    COMMUNICATIONS OF THE ACM, 1996, 39 (08) : 130 - 130
  • [7] Securing Cloud Data using Visual Cryptography
    Brindha, K.
    Jeyanthi, N.
    INTERNATIONAL CONFERENCE ON INNOVATION INFORMATION IN COMPUTING TECHNOLOGIES, 2015, 2015,
  • [8] Information flow and quantum cryptography using statistical fluctuations
    Home, D
    Whitaker, MAB
    PHYSICAL REVIEW A, 2003, 67 (02):
  • [9] Securing Multiple Color Secrets Using Visual Cryptography
    Vincent, Jenila M.
    Helena, E. Angeline
    INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 806 - 812
  • [10] Timely and Secure: Realtime Challenges in Securing Realworld Content Delivery Networks
    Rassool, Reza
    SMPTE MOTION IMAGING JOURNAL, 2008, 117 (11-12): : 47 - 54