Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions

作者: Ying Wang , Pierre Moulin

DOI: 10.1109/TIT.2008.921684

关键词:

摘要: An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding message into covertext, resulting stegotext required have exactly same probability distribution as covertext. Then no statistical test can reliably detect presence hidden message. We refer such schemes perfectly secure. A few been proposed recent literature, but they vanishing rate. prove that communication performance potentially be vastly improved; specifically, our basic setup assumes independent and identically distributed (i.i.d.) we construct secure codes from public watermarking using binning methods randomized permutations code. The permutation a secret key shared between encoder decoder. derive (positive) capacity random-coding exponents for systems. error provide estimates code length achieve target low probability. In some applications, may disrupted by an active warden, modeled here compound discrete memoryless channel (DMC). transmitter warden are distortion constraints. address potential loss due perfect-security requirement. This obtained under weaker order-1 requirement would just require matching first-order marginals covertext distributions. Furthermore, occurs if uniform metric cyclically symmetric; then achieved linear codes. Our framework also useful developing computationally near-optimal performance.

参考文章(39)
Pierre Moulin, Ying Wang, New results on steganographic capacity ,(2004)
P. Moulin, A. Briassouli, A stochastic QIM algorithm for robust, undetectable image watermarking international conference on image processing. ,vol. 2, pp. 1173- 1176 ,(2004) , 10.1109/ICIP.2004.1419513
Gustavus J. Simmons, The Prisoners’ Problem and the Subliminal Channel international cryptology conference. pp. 51- 67 ,(1984) , 10.1007/978-1-4684-4730-9_5
Jessica Fridrich, Miroslav Goljan, Practical steganalysis of digital images: state of the art electronic imaging. ,vol. 4675, pp. 1- 13 ,(2002) , 10.1117/12.465263
Miroslav Goljan, Jessica Fridrich, Taras Holotyak, New blind steganalysis and its implications conference on security steganography and watermarking of multimedia contents. ,vol. 6072, pp. 607201- ,(2006) , 10.1117/12.643254
A. Somekh-Baruch, N. Merhav, On the error exponent and capacity games of private watermarking systems IEEE Transactions on Information Theory. ,vol. 49, pp. 537- 562 ,(2003) , 10.1109/TIT.2002.808132
K. Sullivan, K. Solanki, B. S. Manjunath, U. Madhow, S. Chandrasekaran, Determining Achievable Rates for Secure, Zero Divergence, Steganography international conference on image processing. pp. 121- 124 ,(2006) , 10.1109/ICIP.2006.312387
Ying Wang, Pierre Moulin, Steganalysis of block-structured stegotext conference on security steganography and watermarking of multimedia contents. ,vol. 5306, pp. 477- 488 ,(2004) , 10.1117/12.527745