Robust Syndrome-Trellis Codes for Fault-Tolerant Steganography

Author(s):  
Bingwen Feng ◽  
Zhiquan Liu ◽  
Xiaotian Wu ◽  
Yuchun Lin
IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Kaiyu Ying ◽  
Rangding Wang ◽  
Li Dong ◽  
Diqun Yan

2018 ◽  
Vol 7 (4) ◽  
pp. 2338
Author(s):  
B. NagaSaiLakshmi ◽  
RajaSekhar. T

Present day electronic circuits are generally affected by the delicate mistakes. To maintain the reliability of the complex systems few techniques have been proposed. For few applications, an algorithmic - based fault tolerance (ABFT) system has attempt to abuse the algorithmic properties to identify and adjust mistakes. One example FFT used. There are various protection schemes to identify and adjust errors in FFTs. It is normal to discover various blocks are working in parallel. Recently; a new method is exploiting to implement a blame tolerance in parallel. In this work, same method is first applicable to parallel FFT and then secured methods are merged that the use of error correction codes (ECCs) and parseval checks are used to detect and correct a single bit fault. Trellis code is applied to parallel FFTs to protect the errors which are used to detect and correct a multibit faults are proposed and evaluated. The 4-point FFT is protected with the input32-bit length .Simulation and Synthesis report for FFT using ECC,SOS,ECC-SOS,Trellis codes are obtained in Xilinx software14.2v.Area,power,delay is analyzed in cadence using 90nm & 180nmTechnology. 


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Hansong Du ◽  
Jiufen Liu ◽  
Yuguo Tian ◽  
Xiangyang Luo

Compared with traditional steganography, adaptive steganography based on STC (Syndrome-Trellis Codes) has extremely high antidetection ability and has been a mainstream and hot research direction in the field of information hiding over the past decades. However, it is noted, in specific scenarios, that a small number of methods can extract data from STC-based adaptive steganography, indicating security risks related to such algorithms. In this manuscript, the cryptographic secrecy of this kind of steganography is analyzed, on condition of two common attacks: stego-only attack and known-cover attack, respectively, from three perspectives: steganographic key equivocation, message equivocation, and unicity distance of the steganographic key. Focusing on the special layout characteristics of the parity-check matrix of STC, under the two attack conditions, the theoretical boundaries of the steganographic key equivocation function, the message equivocation function, and the unicity distance of the steganographic key are separately obtained, showing the impact of the three elements: the submatrix size, the randomness of the data, and the cover object on the cryptographic secrecy of the STC-based adaptive steganography, resulting in a theoretical reference to accurately judge the cryptographic secrecy of such steganography and design more secure steganography methods.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 61754-61766
Author(s):  
Xueyuan Zhang ◽  
Rangding Wang ◽  
Diqun Yan ◽  
Li Dong ◽  
Yuzhen Lin

Sign in / Sign up

Export Citation Format

Share Document