Paper
29 April 2002 Defining security in steganographic systems
Author Affiliations +
Proceedings Volume 4675, Security and Watermarking of Multimedia Contents IV; (2002) https://doi.org/10.1117/12.465313
Event: Electronic Imaging, 2002, San Jose, California, United States
Abstract
Intuitively, the security of a steganographic communication between two principals lies in the inability of an eavesdropper to distinguish cover-objects from stego-objects, that is objects which contain secret messages. A system should be already considered insecure, if an eavesdropper can suspect the presence of secret communication. Several definitions of steganographic security were proposed in the literature. However, they all consider only perfectly secure steganographic systems, where even a computationally unbounded observer cannot detect the presence of a secret message exchange. Second, it might be difficult to construct secure schemes usable in practice following these definitions. Third, they all require the knowledge of the probability distribution of normal covers; although it might be possible in certain cases to compute this probability, it will in general be infeasible to obtain. In this paper, we propose a novel approach for defining security in steganographic systems. This definition relies on a probabilistic game between the attacker and a judge. Given the ability to observe the normal communication process and the steganographic system, the attacker has to decide whether a specific object (given to him by a judge) is in fact a plain cover or a stego-object. We discuss the applicability of this new definition and pose the open problem of constructing provably secure steganographic systems.
© (2002) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Stefan Katzenbeisser and Fabien A. P. Petitcolas "Defining security in steganographic systems", Proc. SPIE 4675, Security and Watermarking of Multimedia Contents IV, (29 April 2002); https://doi.org/10.1117/12.465313
Lens.org Logo
CITATIONS
Cited by 66 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Telecommunications

Cryptography

Systems modeling

Computing systems

Computer simulations

Data modeling

RELATED CONTENT

Assessing candidates for model abstraction
Proceedings of SPIE (June 23 2000)
Mobile code security
Proceedings of SPIE (November 08 2001)
Synchronizing Large Systolic Arrays
Proceedings of SPIE (December 28 1982)

Back to Top