-
Two high capacity text steganography schemes based on color coding
Abstract: Text steganography is a mechanism of hiding secret text message inside another text as a covering message. In this paper, we propose a text steganographic scheme based on color coding. This include two different methods: the first based on permutation, and the second based on numeration systems. Given a secret message and a cover text, the proposed schemes embed the secret message in the cover tex… ▽ More
Submitted 23 June, 2020; v1 submitted 2 April, 2020; originally announced April 2020.
Comments: 19 pages , 9 figures, 6 tables
MSC Class: E.3 ACM Class: D.4.6
-
arXiv:1108.1478 [pdf, ps, other]
Collision-resistant hash function based on composition of functions
Abstract: cryptographic hash function is a deterministic procedure that compresses an arbitrary block of numerical data and returns a fixed-size bit string. There exist many hash functions: MD5, HAVAL, SHA, ... It was reported that these hash functions are not longer secure. Our work is focused in the construction of a new hash function based on composition of functions. The construction used the NP-complet… ▽ More
Submitted 19 September, 2011; v1 submitted 6 August, 2011; originally announced August 2011.
Comments: 18 pages, 1 figure. The preliminary version of this paper was published in the Conference CARI'10, pages 141-148, Yamoussoukro, Ivory Coast. The preliminary version was also published in the arXiv August 6, 2011 under number arXiv:1108.1478v1. This version was submittted to the journal ARIMA (January 2011)
MSC Class: 11T71 ACM Class: D.4.6
Journal ref: ARIMA, Vol. 14 - pp. 167-183, 2011
-
Hash function based on arithmetic coding and public-key cryptography
Abstract: We propose a hash function based on arithmetic coding and public-key cryptography. The resistance of the hash function to second preimage attack, collision and differential cryptanalysis is based on the properties of arithmetic coding as a non-linear dynamical system. The resistance of the hash function to first preimage attack is based on the public-key cryptography. The new hash function uses th… ▽ More
Submitted 21 September, 2011; v1 submitted 5 December, 2010; originally announced December 2010.
Comments: This paper has been withdrawn by the authors due to the fact that the implementation of the ideas of the paper need a PKI