On Security Notions for Steganalysis

There have been some achievements in steganalysis recently. Many people have been making strides in steganalysis. They have approached steganalysis from different angles; from information theory to complexity theory. Anderson gave a possibility that there is a provable secure steganographic system,...

Full description

Saved in:
Bibliographic Details
Main Authors: CHANG, Kisik, DENG, Robert H., BAO, Feng, LEE, Sangjin, KIM, Hyungjun, LIM, Jongin
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2004
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/279
https://ink.library.smu.edu.sg/context/sis_research/article/1278/viewcontent/OnSecurityNotionsForSteganalysis_2005_av.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-1278
record_format dspace
spelling sg-smu-ink.sis_research-12782020-01-03T14:13:52Z On Security Notions for Steganalysis CHANG, Kisik DENG, Robert H. BAO, Feng LEE, Sangjin KIM, Hyungjun LIM, Jongin There have been some achievements in steganalysis recently. Many people have been making strides in steganalysis. They have approached steganalysis from different angles; from information theory to complexity theory. Anderson gave a possibility that there is a provable secure steganographic system, but there had not been complexity theoretical approaches for years. In 2002, Katzenbeisser and Petitcolas defined the conditional security of steganography and gave a possibility for a practical, provable secure steganography for the first time, and Hopper et al. introduced a provable secure steganographic algorithm in the sense of complexity theory. Chang et al. also tried to define the complexity theoretical security and showed a practical, provable secure algorithm. Chang et al. presented chose-input attack model in a view of pseudoprocessingness for a steganographic system. In this paper, we try to improve this notion in detail. So we define chosen-cover attack model and chosen-message attack model. Moreover, we present the relation between them. 2004-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/279 info:doi/10.1007/11496618_32 https://ink.library.smu.edu.sg/context/sis_research/article/1278/viewcontent/OnSecurityNotionsForSteganalysis_2005_av.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University steganography steganalysis pseudoprocessingness Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic steganography
steganalysis
pseudoprocessingness
Information Security
spellingShingle steganography
steganalysis
pseudoprocessingness
Information Security
CHANG, Kisik
DENG, Robert H.
BAO, Feng
LEE, Sangjin
KIM, Hyungjun
LIM, Jongin
On Security Notions for Steganalysis
description There have been some achievements in steganalysis recently. Many people have been making strides in steganalysis. They have approached steganalysis from different angles; from information theory to complexity theory. Anderson gave a possibility that there is a provable secure steganographic system, but there had not been complexity theoretical approaches for years. In 2002, Katzenbeisser and Petitcolas defined the conditional security of steganography and gave a possibility for a practical, provable secure steganography for the first time, and Hopper et al. introduced a provable secure steganographic algorithm in the sense of complexity theory. Chang et al. also tried to define the complexity theoretical security and showed a practical, provable secure algorithm. Chang et al. presented chose-input attack model in a view of pseudoprocessingness for a steganographic system. In this paper, we try to improve this notion in detail. So we define chosen-cover attack model and chosen-message attack model. Moreover, we present the relation between them.
format text
author CHANG, Kisik
DENG, Robert H.
BAO, Feng
LEE, Sangjin
KIM, Hyungjun
LIM, Jongin
author_facet CHANG, Kisik
DENG, Robert H.
BAO, Feng
LEE, Sangjin
KIM, Hyungjun
LIM, Jongin
author_sort CHANG, Kisik
title On Security Notions for Steganalysis
title_short On Security Notions for Steganalysis
title_full On Security Notions for Steganalysis
title_fullStr On Security Notions for Steganalysis
title_full_unstemmed On Security Notions for Steganalysis
title_sort on security notions for steganalysis
publisher Institutional Knowledge at Singapore Management University
publishDate 2004
url https://ink.library.smu.edu.sg/sis_research/279
https://ink.library.smu.edu.sg/context/sis_research/article/1278/viewcontent/OnSecurityNotionsForSteganalysis_2005_av.pdf
_version_ 1770570373201395712