期刊文献+

Information-Theoretic Analysis for the Difficulty of Extracting Hidden Information 被引量:5

Information-Theoretic Analysis for the Difficulty of Extracting Hidden Information
下载PDF
导出
摘要 The difficulty of extracting hidden information, which is essentially a kindof secrecy, is analyzed by information-theoretic method. The relations between key rate, messagerate, hiding capacity and difficulty of extraction are studied in the terms of unicity distance ofstego-key, and the theoretic conclusion is used to analyze the actual extracting attack on LeastSignificant Bit(LSB) steganographic algorithms. The difficulty of extracting hidden information, which is essentially a kindof secrecy, is analyzed by information-theoretic method. The relations between key rate, messagerate, hiding capacity and difficulty of extraction are studied in the terms of unicity distance ofstego-key, and the theoretic conclusion is used to analyze the actual extracting attack on LeastSignificant Bit(LSB) steganographic algorithms.
出处 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期315-318,共4页 武汉大学学报(自然科学英文版)
基金 SupportedbytheNationalNaturalScienceFundationofChina(60172067,60133020)
关键词 information hiding STEGANOGRAPHY extracting attack difficulty ofextraction unicity distance information hiding steganography extracting attack difficulty ofextraction unicity distance
  • 相关文献

参考文献2

  • 1R. Chandramouli.A mathematical framework for active steganalysis[J].Multimedia Systems.2003(3)
  • 2Chandramouli R.A Mathematical Framework for Active Steganalysis[].ACM Multimedia SystemsJournal Special Issue on Multimedia Watermarking.2003

同被引文献37

  • 1CACHIN C. An information-theoretic model for steganography[A]. Information Hiding 2nd International Workshop[C]. 1998. 306-318.
  • 2HOPPER N. Toward a Theory of Steganography[D]. Pittsburgh: Car- negie Mellon University 2004.
  • 3FRIDRICH J, GOLJAN M, SOUKAL D. Searching for the stego key[A]. Security, Steganography and Watermaking of Multimedia Contents[C]. 2004.70-82.
  • 4FRIDRICH J, GOLJAN M, SOUKAL D, et al. Forensic steganalysis: determining the stego key in spatial domain steganography[A]. Secu- rity, Steganography and Watermaking of Multimedia Contents[C]. 2005.631-642.
  • 5CRANDALL R. Some notes on steganography[EB/OL], http://os.inf. tudresden.de/, westfeld/crandall.pdf, 1998.
  • 6WESTFELD R. F5-A steganographic algorithm[A]. Information Hid- ing 4th International Workshop[C]. 2001. 289-302.
  • 7FRIDRICH J, GOLJAN M, LISONEK P, et al. Writing on wet paper[J]. IEEE Transactions on Signal Processing, 2005, 53(10):3923-3935.
  • 8FILLER T, JUDAS J, FRIDRICH J. Minimizing embedding impact in steganography using trellis-coded quantization[A]. Proceedings of SPIE Electronic/maging, Media Forensics and Security X/I[C]. 2010. 1-14.
  • 9SARKAR A, MADHOW U, MANJUNATH S. Matrix embedding with pseudorandom coefficient selection and error correction for ro- bust and secure steganography[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(2):225-239.
  • 10REGALIA A. Cryptographic secrecy of steganographic matrix embed- ding[J]. IEEE Transactions on Information Forensics Security, 2008, 3(4): 786-791.

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部