用户名: 密码: 验证码:
A Game-Theoretic Approach to Content-Adaptive Steganography
详细信息    查看全文
  • 作者:Pascal Sch?ttle (18)
    Rainer B?hme (18)
  • 关键词:Content ; Adaptive Steganography ; Game Theory ; Security
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2013
  • 出版时间:2013
  • 年:2013
  • 卷:7692
  • 期:1
  • 页码:142-159
  • 全文大小:312KB
  • 参考文献:1. Bensoussan, A., Kantarcioglu, M., Hoe, S.: A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model. In: Alpcan, T., Buttyán, L., Baras, J. (eds.) GameSec 2010. LNCS, vol.?6442, pp. 135-48. Springer, Heidelberg (2010) CrossRef
    2. B?hme, R.: An Epistemological Approach to Steganography. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol.?5806, pp. 15-0. Springer, Heidelberg (2009) CrossRef
    3. B?hme, R.: Advanced Statistical Steganalysis. Springer, Berlin (2010) CrossRef
    4. B?hme, R., Westfeld, A.: Exploiting Preserved Statistics for Steganalysis. In: Fridrich, J. (ed.) IH 2004. LNCS, vol.?3200, pp. 82-6. Springer, Heidelberg (2004) CrossRef
    5. Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.?1525, pp. 306-18. Springer, Heidelberg (1998) CrossRef
    6. Cayre, F., Bas, P.: Kerckhoffs–based embedding security classes for WOA data hiding. IEEE Transactions on Information Forensics and Security?3(1), 1-5 (2008) CrossRef
    7. Ettinger, J.M.: Steganalysis and Game Equilibria. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.?1525, pp. 319-28. Springer, Heidelberg (1998) CrossRef
    8. Filler, T., Ker, A.D., Fridrich, J.: The square root law of steganographic capacity for Markov covers. SPIE, vol.?7254, p. 725408 (2009)
    9. Franz, E.: Steganography Preserving Statistical Properties. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.?2578, pp. 278-94. Springer, Heidelberg (2003) CrossRef
    10. Fridrich, J.: Minimizing the embedding impact in steganography. In: Voloshynovskiy, S. (ed.) MM&Sec 2006: Proceedings of the 8th Workshop on Multimedia and Security, pp. 2-0. ACM (2006)
    11. Fridrich, J.: Steganography in Digital Media: Principles, Algorithms, and Applications, 1st edn. Cambridge University Press, New York (2009)
    12. Fridrich, J., Kodovsky, J., Holub, V., Goljan, M.: Steganalysis of Content-Adaptive Steganography in Spatial Domain. In: Filler, T., Pevny, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol.?6958, pp. 102-17. Springer, Heidelberg (2011) CrossRef
    13. Fridrich, J., Du, R.: Secure Steganographic Methods for Palette Images. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.?1768, pp. 47-0. Springer, Heidelberg (2000) CrossRef
    14. Johnson, B., Grossklags, J., Christin, N., Chuang, J.: Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol.?6345, pp. 588-06. Springer, Heidelberg (2010) CrossRef
    15. Katzenbeisser, S., Petitcolas, F.: Defining security in steganographic systems. SPIE, vol.?4675, pp. 50-6 (2002)
    16. Ker, A.: Batch steganography and the threshold game. SPIE, vol.?6505, p. 650504 (2007)
    17. Ker, A.: Estimating Steganographic Fisher Information in Real Images. In: Katzenbeisser, S., Sadeghi, A.-R. (eds.) IH 2009. LNCS, vol.?5806, pp. 73-8. Springer, Heidelberg (2009) CrossRef
    18. Ker, A.: The Square Root Law in Stegosystems with Imperfect Information. In: B?hme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol.?6387, pp. 145-60. Springer, Heidelberg (2010) CrossRef
    19. Ker, A., B?hme, R.: Revisiting weighted stego-image steganalysis. SPIE, vol.?6819, p. 681905 (2008)
    20. Kerckhoffs, A.: La cryptographie militaire. Journal des Sciences Militaires IX(1), 5-8 (1883)
    21. Luo, W., Huang, F., Huang, J.: Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensics and Security?5(2), 201-14 (2010) CrossRef
    22. Nash, J.: Non-cooperative games. The Annals of Mathematics?54(2), 286-95 (1951) CrossRef
    23. Pevny, T., Filler, T., Bas, P.: Using High-Dimensional Image Models to Perform Highly Undetectable Steganography. In: B?hme, R., Fong, P.W.L., Safavi-Naini, R. (eds.) IH 2010. LNCS, vol.?6387, pp. 161-77. Springer, Heidelberg (2010) CrossRef
    24. Wang, Y., Moulin, P.: Perfectly secure steganography: Capacity, error exponents, and code constructions. IEEE Transactions on Information Theory?54(6), 2706-722 (2008) CrossRef
    25. Wu, H.C., Wu, N.I., Tsai, C.S., Hwang, M.S.: Image steganographic scheme based on pixel-value differencing and LSB replacement methods. In: IEE Proceedings -Vision, Image and Signal Processing, vol.?152(5), pp. 611-15 (2005)
    26. Yang, C.H., Weng, C.Y., Wang, S.J., Sun, H.M.: Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Transactions on Information Forensics and Security?3(3), 488-97 (2008) CrossRef
  • 作者单位:Pascal Sch?ttle (18)
    Rainer B?hme (18)

    18. Department of Information Systems, University of Münster, Germany
  • ISSN:1611-3349
文摘
Content-adaptive embedding is widely believed to improve steganographic security over uniform random embedding. However, such security claims are often based on empirical results using steganalysis methods not designed to detect adaptive embedding. We propose a framework for content-adaptive embedding in the case of imperfect steganography. It formally defines heterogeneity within the cover as a necessary condition for adaptive embedding. We devise a game-theoretic model for the whole process including cover generation, adaptive embedding, and a detector which anticipates the adaptivity. Our solution exhibits a unique equilibrium in mixed strategies. Its location depends on the level of heterogeneity of the cover source, but never coincides with na?ve adaptive embedding. The model makes several simplifying assumptions, including independent cover symbols and the steganalyst’s ability to recover the adaptivity criterion perfectly.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700