View : 576 Download: 0

Full metadata record

DC Field Value Language
dc.contributor.author채기준*
dc.contributor.author도인실*
dc.date.accessioned2016-08-29T12:08:46Z-
dc.date.available2016-08-29T12:08:46Z-
dc.date.issued2016*
dc.identifier.isbn9781509017249*
dc.identifier.issn1976-7684*
dc.identifier.otherOAK-18547*
dc.identifier.urihttps://dspace.ewha.ac.kr/handle/2015.oak/231533-
dc.description.abstractSteganography, a science of visual cryptography, was historically originated from the times of war when in one country a messenger's head would be shaved to write a secret message on it and hair grown again before he was sent to the other country carrying the message in his head as it was impossible to be revealed unless the head was shaved again on the other end. Luckily the Steganography used these days learnt a lot from this concept but made sure no one needed to shave their heads. Though Steganography is an old concept it is a powerful one and can be practiced where long classical secret keys need to be avoided and sense of simplicity while strong cryptography is vital. However one of the biggest challenges of Steganography and other Visual Cryptography techniques is that an attacker in the middle can hijack the image and forward a fake image. This again means that we need large classical keys or so to secure the channel. However large keys are no longer going to be suitable for future next generation networks as they require light weight key distribution systems which are also free from eavesdropping. Besides, in recent studies it is suggested that in near future quantum computers would be able to break classical cryptographic techniques such as RSA. With quantum computers, quantum cryptography also came into light and now seems to be promising based on its unique features that make it free from eavesdropping or any other third party intrusion in the key distribution system. Our paper proposes a technique where we show how an old technique such as Steganography can be promising when we combine it with the unique key distribution mechanism of Quantum Cryptography with some other additional security features. © 2016 IEEE.*
dc.description.sponsorshipKorean Institute of Information Scientists and Engineers (KIISE) Information Networking Society*
dc.languageEnglish*
dc.publisherIEEE Computer Society*
dc.subjectImage hijacking*
dc.subjectQuantum Cryptography*
dc.subjectSteganography*
dc.subjectVisual Cryptography*
dc.titleSecuring information flow in content delivery networks with visual and quantum cryptography*
dc.typeConference Paper*
dc.relation.volume2016-March*
dc.relation.indexSCOPUS*
dc.relation.startpage463*
dc.relation.lastpage468*
dc.relation.journaltitleInternational Conference on Information Networking*
dc.identifier.doi10.1109/ICOIN.2016.7427160*
dc.identifier.scopusid2-s2.0-84963973729*
dc.author.googleMowla N.I.*
dc.author.googleDoh I.*
dc.author.googleChae K.*
dc.contributor.scopusid채기준(7102584247)*
dc.contributor.scopusid도인실(14029666900;56765572600)*
dc.date.modifydate20240322133135*
Appears in Collections:
인공지능대학 > 컴퓨터공학과 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE