PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Capacity and security for imperfect batch steganography

Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
PL
Możliwości i bezpieczeństwo niedoskonałej steganografii pakietowej
Języki publikacji
EN
Abstrakty
EN
Batch steganography aims to conquer the limitations of capacity and security of data hiding with a single cover, and it is to spread secret information among a large number of covers, having improved basic algorithm and strategies of stegosystem. The steganographic features of batch covers and single cover were compared to propose a theoretic model for batch steganography. According to Kullback-Leibler divergence of batch steganography, the relationship of imperfect steganographic capacity with a formalized number of batch covers and embedding strategies was put forward. The maximum payload of an imperfect batch steganographiy (IBS) was determined by the number of batch covers and the base cover set and proved by formulations, and compared with capacity of noisy channels. The results show that the model under constraints of IBS is feasible for batch steganography.The research results are helpful for stegosystem design and steganalysis.
PL
Artykuł analizuje możliwości steganografii – metody szyfrowania nie tylko treści, ale także ukrywania w ogóle faktu obecności przesyłu wiadomości.
Rocznik
Strony
324--327
Opis fizyczny
Bibliogr. 11 poz., schem., wykr.
Twórcy
autor
  • North University of China , School of Electronics and Computer, 030051, Taiyuan, China
autor
  • North University of China , School of Electronics and Computer, 030051, Taiyuan, China
autor
  • Taiyuan University of Technology
autor
  • North University of China
autor
  • North University of China(
Bibliografia
  • [1] Simmons G J. The prisoners' problem and the subliminal channel [C]//Proceeding IEEE Workshop Communications Security CRYPTO'83, Santa Barbara, CA, 1983:51-67.
  • [2] Fridrich J, Soukal D.Matrix embedding for large payload [J]. IEEE Transactions on Information Security and Forensics, 2006, 1(3):390-394.
  • [3] Fridrich J,A Westfeld.High capacity despite better steganalysis (F5-a steganographic algorithm) [C]// Information Hiding, 4th International Workshop, Springer Verlag, New York. 2001:289-302.
  • [4] Ker A D.A capacity result for batch steganography [J].Signal Processing Letter, 2007, 14(8):525-528.
  • [5] Fridrich J, Lisonek P, Soukal D.On steganographic embedding efficiency [C]// Information Hiding 8th Inter-national Workshop, Alexandria, VA, USA, 2008:282-296.
  • [6] Hedieh S, Mansour J.Secure steganography based on embedding capacity [J].International Journal of Information Security. 2009.8: 433-445.
  • [7] Ker A D.Perturbation hiding and the batch steganography problem [C] // IH2008,Santa, USA,2008:45-59.
  • [8] Pevny T, Fridrich J.Benchmarking for steganography[C] // Information Hiding 2008. Santa Barbara, CA USA, 2008: 251-267.
  • [9] Ramkumar M, Akansu A N.Capacity estimates for data hiding in compressed images [J].IEEE Transactions on Image Processing, 2001, 10(8):1252-1263.
  • [10] Cachin C.An Information-theoretic model for stegano-graphy[C]// Inform ation Hiding 2nd International Workshop. Portland, USA,1998(1525): 306-318.
  • [11] Filler T, Ker A D.The square root law of steganographic capacity for markov covers[C]//Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia. San Jose, CA: 2009:18-21.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-854e199d-b774-49bd-8ecc-b2471f4b1001
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.