A Video Steganography Scheme Based on Post-Quantum Cryptography

被引:2
|
作者
Huang, Yiming [1 ]
Lei, Zhongkui [2 ]
Song, Zhufu [3 ]
Guo, Yueru [1 ]
Li, Yihang [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Elect & Informat Engn, Nanjing, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Minist Ind & Informat Technol, Key Lab Adv Technol Medium & Small UAV, Nanjing, Peoples R China
[3] Chongqing Univ Posts & Telecommun, Chongqing, Peoples R China
关键词
video; steganography; post-quantum cryptography; R-LWE encryption;
D O I
10.1109/ICICSE52190.2021.9404087
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents a novel video steganography scheme based Post-Quantum Cryptography encryption. The Post-Quantum Cryptography has an extraordinary security character which is going to become the mainstream encryption algorithm for next generation. Meanwhile, the video encoding bit-stream has a few available information redundant that could hide extra messages with small alterations. The proposed scheme combined merits above, it aims at practical engineering applications like UAV video detection, emergence image communication, etc. We made an example experiment with consideration of the information security and the image adaptation. The sample results show that it has excellent visual invisibility and huge messages inserting capacity as expected. And it is an innovative exploration in steganography and cryptography as well.
引用
收藏
页码:83 / 87
页数:5
相关论文
共 50 条
  • [1] Post-Quantum Crystography: A Combination of Post-Quantum Cryptography and Steganography
    Gabriel, A. J.
    Alese, B. K.
    Adetunmbi, A. O.
    Adewale, O. S.
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 449 - +
  • [2] A post-quantum signcryption scheme using isogeny based cryptography
    Dey, Kunal
    Debnath, Sumit Kumar
    Stanica, Pantelimon
    Srivastava, Vikas
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 69
  • [3] Post-Quantum Cryptography
    Monroe, Don
    COMMUNICATIONS OF THE ACM, 2023, 66 (02) : 15 - 17
  • [4] Post-quantum cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    NATURE, 2017, 549 (7671) : 188 - 194
  • [5] Post-quantum cryptography
    Daniel J. Bernstein
    Tanja Lange
    Nature, 2017, 549 : 188 - 194
  • [6] Homomorphic Encryption Based on Post-Quantum Cryptography
    Chen, Abel C. H.
    2023 IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLIED NETWORK TECHNOLOGIES, ICMLANT, 2023, : 56 - 60
  • [7] TPM-Based Post-Quantum Cryptography
    Paul, Sebastian
    Schick, Felix
    Seedorf, Jan
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [8] Applications of Post-Quantum Cryptography
    Bagirovs, Emils
    Provodin, Grigory
    Sipola, Tuomo
    Hautamaki, Jari
    PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY, ECCWS 2024, 2024, 23 : 49 - 57
  • [9] Network coding-based post-quantum cryptography
    Cohen A.
    D’Oliveira R.G.L.
    Salamatian S.
    Médard M.
    IEEE Journal on Selected Areas in Information Theory, 2021, 2 (01): : 49 - 64
  • [10] Post-quantum Cryptography: Code-Based Signatures
    Cayrel, Pierre-Louis
    Meziani, Mohammed
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2010, 6059 : 82 - 99