The Cut and Dominating Set Problem in A Steganographer Network

02/20/2018
by   Hanzhou Wu, et al.
0

A steganographer network corresponds to a graphic structure that the involved vertices (or called nodes) denote social entities such as the data encoders and data decoders, and the associated edges represent any real communicable channels or other social links that could be utilized for steganography. Unlike traditional steganographic algorithms, a steganographer network models steganographic communication by an abstract way such that the concerned underlying characteristics of steganography are quantized as analyzable parameters in the network. In this paper, we will analyze two problems in a steganographer network. The first problem is a passive attack to a steganographer network where a network monitor has collected a list of suspicious vertices corresponding to the data encoders or decoders. The network monitor expects to break (disconnect) the steganographic communication down between the suspicious vertices while keeping the cost as low as possible. The second one relates to determining a set of vertices corresponding to the data encoders (senders) such that all vertices can share a message by neighbors. We point that, the two problems are equivalent to the minimum cut problem and the minimum-weight dominating set problem.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/06/2019

On the vertices belonging to all, some, none minimum dominating set

We characterize the vertices belonging to all minimum dominating sets, t...
research
06/28/2022

On Relaxation of Dominant Sets

In a graph G = (V,E), a k-ruling set S is one in which all vertices V S ...
research
02/13/2018

Hardness Results and Approximation Algorithms for the Minimum Dominating Tree Problem

Given an undirected graph G = (V, E) and a weight function w:E →R, the M...
research
12/11/2017

A Simply Study to Steganography on Social Networks

Steganography aims to conceal the very fact that the communication takes...
research
12/11/2017

A Graph-theoretic Model to Steganography on Social Networks

Steganography aims to conceal the very fact that the communication takes...
research
03/06/2018

A PTAS for vertex guarding weakly-visible polygons - An extended abstract

In this extended abstract, we first present a PTAS for guarding the vert...

Please sign up or login with your details

Forgot password? Click here to reset