Advertisement

Modeling the Security of Steganographic Systems

  • J. Zöllner
  • H. Federrath
  • H. Klimant
  • A. Pfitzmann
  • R. Piotraschke
  • A. Westfeld
  • G. Wicke
  • G. Wolf
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1525)

Abstract

We present a model of steganographic systems which allows to evaluate their security. We especially want to establish an analogy to the known-plaintext-attack which is commonly used to rate cryptographic systems. This model’s main statement is that the embedding operation of a steganographic system should work indeterministic from the attacker’s point of view. This is proved by means of information theory.

Key words

Security and modeling of steganography entropy indeterminism secret communication hidden communication 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    B. Schneier, Applied Cryptography, 2nd ed. New York: John Wiley & Sons, 1996, p. 9.zbMATHGoogle Scholar
  2. 2.
    B. Pfitzmann, ‘Information Hiding Terminology’. In R. Anderson, Information Hiding: first international workshop, Proceedings (Lecture notes in computer science; Vol. 1147), Berlin: Springer, 1996.Google Scholar
  3. 3.
    J. Zöllner, H. Federrath, A. Pfitzmann, A. Westfeld, G. Wicke, G. Wolf, “über die Modellierung steganographischer Systeme”. In G. Müller, K. Rannenberg, M. ReitenspieΒ, H. Stiegler, VerlÄΒliche IT-Systeme. Zwischen Key-Escrow und elektronischem Geld, Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig/Wiesbaden, 1997, pp. 211–223.Google Scholar
  4. 4.
    H. limant, R. Piotraschke, “Informationstheoretische Bewertung steganographischer Konzelationssysteme”. In G. Müller, K. Rannenberg, M. ReitenspieΒ, H. Stiegler: VerlÄΒliche IT-Systeme. Zwischen Key-Escrow und elektronischem Geld, Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig/Wiesbaden, 1997, pp. 225–232.Google Scholar
  5. 5.
    R. Anderson, F. Petitcolas, “On the limits of steganography”. To be published in IEEE Journal on Selected Areas in Communications, Special Issue on copyright and privacy protection. Available at: http://www.cl.cam.ac.uk/ftp/users/rja14/steganjsac2.ps.gz
  6. 6.
    C. Cachin, “An Information-Theoretic Model for Steganography”. In Information Hiding: second international workshop, Preproceedings; 15–17 April 1998; Portland, Oregon.Google Scholar
  7. 7.
    R. G. Gallagher, Information Theory and Reliable Communication. John Wiley & Sons, 1968.Google Scholar
  8. 8.
    A. Westfeld, G. Wolf, “Steganography in a Video Conferencing System”. In Information Hiding: second international workshop, Preproceedings; 15–17 April 1998; Portland, Oregon.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • J. Zöllner
    • 1
    • 2
  • H. Federrath
    • 1
    • 3
  • H. Klimant
    • 1
    • 3
  • A. Pfitzmann
    • 1
    • 3
  • R. Piotraschke
    • 1
    • 3
  • A. Westfeld
    • 1
    • 3
  • G. Wicke
    • 1
    • 3
  • G. Wolf
    • 1
    • 3
  1. 1.Dresden University of TechnologyDresdenGermany
  2. 2.Institute for Operating Systems, Databases and Computer NetworksGermany
  3. 3.Institute for Theoretical Computer ScienceGermany

Personalised recommendations