Steganography over Redundant Residue Number System Codes

Journal of Information Security and Applications - Tập 51 - Trang 102434 - 2020
Mohamed Amine Belhamra1, El Mamoun Souidi1
1Mohammed V University in Rabat, Faculty of Sciences, BP 1014 RP Rabat 10000, Morocco Laboratory of Mathematics, Computer Science, Applications and Information Security, Morocco

Tài liệu tham khảo

Antao, 2013, The CRNS framework and its application to programmable and reconfigurable cryptography, TACO, 9, 33:1, 10.1145/2400682.2400692 Asif, 2018, A fully RNS based ECC processor, Integration, 61, 138, 10.1016/j.vlsi.2017.11.010 Azizifard, 2014, Data steganography on VoIP through combination of residue number system and DNA sequences, Journal of Advances in Computer Research, 5, 7 Bajard, 2009, Selected RNS bases for modular multiplication, 25 Bajard, 2004, RNS bases and conversions, 5559, 60 Belhamra, 2018, A steganogaphic scheme for MAC-independent opportunistic routing and encoding (MORE) protocol, 254 Belhamra, 2019, Introduction to steganography in RRNS based communications, 21:1 Belhamra, 2019, Steganogaphy using Mac-independent opportunistic routing and encoding (MORE) protocol based communications, 1118, 66 Celesti, 2016, Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems, J Network and Computer Applications, 59, 208, 10.1016/j.jnca.2014.09.021 Chang, 2015, Residue number systems: A new paradigm to datapath optimization for low-power and high-performance digital signal processing applications, IEEE circuits and systems magazine, 15, 26, 10.1109/MCAS.2015.2484118 Chen, 2013, Energy-efficient digital signal processing via voltage-overscaling-based residue number system., IEEE Trans VLSI Syst, 21, 1322, 10.1109/TVLSI.2012.2205953 Chervyakov, 2019, AR-RRNS: configurable reliable distributed data storage systems for internet of things to ensure security, Future Generation Comp Syst, 92, 1080, 10.1016/j.future.2017.09.061 Etzel, 1980, Redundant residue number systems for error detection and correction in digital filters, IEEE Transactions on Acoustics, Speech, and Signal Processing, 28, 538, 10.1109/TASSP.1980.1163442 Goh, 2008, Multiple error detection and correction based on redundant residue number systems, IEEE Trans Communications, 56, 325, 10.1109/TCOMM.2008.050401 Grabski, 2013, Steganography in OFDM symbols of fast IEEE 802. 11n networks, 158 Haron, 2009, Using RRNS codes for cluster faults tolerance in hybrid memories, 85 Haron, 2011, Redundant residue number system code for fault-tolerant hybrid memories, J Emerg Technol Comput Syst, 7, 4:1, 10.1145/1899390.1899394 Jouhari, 2011, A new steganographic scheme based on first order reed muller codes - A new steganographic scheme, 351 Junior, 2011, Using the redundant residue number system to increase routing dependability on mobile ad hoc networks, Journal of Selected Areas in Telecommunications (JSAT), 4, 67 Justel, 1997, A multivariate kolmogorov-smirnov test of goodness of fit, Statistics & Probability Letters, 35, 251, 10.1016/S0167-7152(97)00020-5 Kaur, 2015, Countermeasures for covert channel-internal control protocols, 422 Keller, 2000, Adaptive redunant residue number system coded multicarrier modulation, IEEE Journal on Selected Areas in Communications, 18, 2292, 10.1109/49.895034 Krätzer, 2006, WLAN steganography: a first practical review, 17 Krishna, 1992, A coding theory approach to error control in redundant residue number systems. i. theory and single error correction, IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, 39, 8, 10.1109/82.204106 Mazurczyk, 2014, Using transcoding for hidden communication in IP telephony, Multimedia Tools Appl, 70, 2139, 10.1007/s11042-012-1224-8 Mohan, 2016, 10.1007/978-3-319-41385-3 Munuera, 2007, Steganography and error-correcting codes, Signal Processing, 87, 1528, 10.1016/j.sigpro.2006.12.008 Orton, 1992, New fault tolerant techniques for residue number systems, IEEE Trans Computers, 41, 1453, 10.1109/12.177315 Sousa, 2016, Combining residue arithmetic to design efficient cryptographic circuits and systems, IEEE Circuits and Systems Magazine, 16, 6, 10.1109/MCAS.2016.2614714 Sun, 1992, A coding theory approach to error control in redundant residue number systems. ii. multiple error detection and correction, IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, 39, 18, 10.1109/82.204107 Szczypiorski, 2003, Steganography in TCP/IP networks Szczypiorski, 2016, Steganography in IEEE 802. 11 OFDM symbols, Security and Communication Networks, 9, 118, 10.1002/sec.306 Tay, 2016, A non-iterative multiple residue digit error detection and correction algorithm in RRNS, IEEE Trans Computers, 65, 396, 10.1109/TC.2015.2435773 Tchernykh, 2018, AC-RRNS: anti-collusion secured data sharing scheme for cloud storage, Int J Approx Reasoning, 102, 60, 10.1016/j.ijar.2018.07.010 Vassalos, 2013, RNS assisted image filtering and edge detection, 1 Watson, 1966, Self-checked computation using residue arithmetic, Proceedings of the IEEE, 54, 1920, 10.1109/PROC.1966.5275 Westfeld, 2001, F5-A steganographic algorithm, 289 Xiao, 2016, New error control algorithms for residue number system codes, ETRI Journal, 38, 326, 10.4218/etrij.16.0115.0575 Ye, 2018, Resident: a reliable residue number system-based data transmission mechanism for wireless sensor networks, Wireless Networks, 24, 597, 10.1007/s11276-016-1357-1 Zheng, 2016, Parallel dna arithmetic operation with one error detection based on 3-moduli set, IEEE transactions on nanobioscience, 15, 499, 10.1109/TNB.2016.2574359 Zielińska, 2014, Trends in steganography, Commun ACM, 57, 86, 10.1145/2566590.2566610