Advertisement

On Security Notions of Steganographic Systems

  • Kisik Chang
  • Robert H. Deng
  • Bao Feng
  • Sangjin Lee
  • Hyungjun Kim
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3304)

Abstract

We define the notion of pseudoprocessingness to formulate chosen-input-attack, chosen-stego-attack, and key-recovery. We then construct a efficient, provable secure steganographic algorithm against chosen-input-attack and key-recovery. So far as we know, this is the first paper dealing with those security notions.

Keywords

Processing Function Encryption Algorithm Information Hiding Covert Channel Adversary Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Anderson, R.J.: Stretching the Limits of Steganography. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 39–48. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  2. 2.
    Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  3. 3.
    Craver, S.: On Public-Key Steganography in the presence of an Active Warden. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 255–368. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  4. 4.
    Goldwasser, G., Bellare, M.: Lecture Notes on Modern Cryptography (August 2001), Available at, http://www-cse.ucsd.edu/users/mihir/papers/gb.html
  5. 5.
    Hopper, N.J., Langford, J., von Ahn, L.: Provably Secure Steganography. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 77–92. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  6. 6.
    Johnson, N.F., Duric, Z., Jajodia, S.: Information Hiding: Steganography and Watermarking Attacks and Contermeasures. Kluwer Academic Publishers, Dordrecht (2001)CrossRefGoogle Scholar
  7. 7.
    Katzen Beisser, S., Petitcolas, F.A.P.: Information Hiding - techniques for steganography and digital watermarking. Artech House Books (1999)Google Scholar
  8. 8.
    Katzenbeisser, S., Petitcolas, F.A.P.: Defining Security in Steganographic Systems. In: Proceeding of the SPIE. Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 50–56 (2002)Google Scholar
  9. 9.
    Simmons, G.J.: The Prisoners’ Problem and the Subliminal Channe. In: Advances in Cryptology 1983, pp. 51–67. Plenum Press, New York (1984)CrossRefGoogle Scholar
  10. 10.
    Westfeld, A., Pfitzmann, A.: Attacks on Steganographic Systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  11. 11.
    Zöllner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the Security of Steganographic Systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 344–354. Springer, Heidelberg (1998)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Kisik Chang
    • 1
  • Robert H. Deng
    • 1
  • Bao Feng
    • 1
  • Sangjin Lee
    • 2
  • Hyungjun Kim
    • 2
  1. 1.InfoComm Service Division(ICSD)Institute for Infocomm Research(I2R)Singapore
  2. 2.Center for Information Security and Technologies(CIST), Graduate School of Information SecurityKorea UniversityRepublic of Korea

Personalised recommendations