On Security Notions for Steganalysis
There have been some achievements in steganalysis recently. Many people have been making strides in steganalysis. They have approached steganalysis from different angles; from information theory to complexity theory. Anderson gave a possibility that there is a provable secure steganographic system,...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2004
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/279 https://ink.library.smu.edu.sg/context/sis_research/article/1278/viewcontent/OnSecurityNotionsForSteganalysis_2005_av.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-1278 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-12782020-01-03T14:13:52Z On Security Notions for Steganalysis CHANG, Kisik DENG, Robert H. BAO, Feng LEE, Sangjin KIM, Hyungjun LIM, Jongin There have been some achievements in steganalysis recently. Many people have been making strides in steganalysis. They have approached steganalysis from different angles; from information theory to complexity theory. Anderson gave a possibility that there is a provable secure steganographic system, but there had not been complexity theoretical approaches for years. In 2002, Katzenbeisser and Petitcolas defined the conditional security of steganography and gave a possibility for a practical, provable secure steganography for the first time, and Hopper et al. introduced a provable secure steganographic algorithm in the sense of complexity theory. Chang et al. also tried to define the complexity theoretical security and showed a practical, provable secure algorithm. Chang et al. presented chose-input attack model in a view of pseudoprocessingness for a steganographic system. In this paper, we try to improve this notion in detail. So we define chosen-cover attack model and chosen-message attack model. Moreover, we present the relation between them. 2004-12-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/279 info:doi/10.1007/11496618_32 https://ink.library.smu.edu.sg/context/sis_research/article/1278/viewcontent/OnSecurityNotionsForSteganalysis_2005_av.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University steganography steganalysis pseudoprocessingness Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
steganography steganalysis pseudoprocessingness Information Security |
spellingShingle |
steganography steganalysis pseudoprocessingness Information Security CHANG, Kisik DENG, Robert H. BAO, Feng LEE, Sangjin KIM, Hyungjun LIM, Jongin On Security Notions for Steganalysis |
description |
There have been some achievements in steganalysis recently. Many people have been making strides in steganalysis. They have approached steganalysis from different angles; from information theory to complexity theory. Anderson gave a possibility that there is a provable secure steganographic system, but there had not been complexity theoretical approaches for years. In 2002, Katzenbeisser and Petitcolas defined the conditional security of steganography and gave a possibility for a practical, provable secure steganography for the first time, and Hopper et al. introduced a provable secure steganographic algorithm in the sense of complexity theory. Chang et al. also tried to define the complexity theoretical security and showed a practical, provable secure algorithm. Chang et al. presented chose-input attack model in a view of pseudoprocessingness for a steganographic system. In this paper, we try to improve this notion in detail. So we define chosen-cover attack model and chosen-message attack model. Moreover, we present the relation between them. |
format |
text |
author |
CHANG, Kisik DENG, Robert H. BAO, Feng LEE, Sangjin KIM, Hyungjun LIM, Jongin |
author_facet |
CHANG, Kisik DENG, Robert H. BAO, Feng LEE, Sangjin KIM, Hyungjun LIM, Jongin |
author_sort |
CHANG, Kisik |
title |
On Security Notions for Steganalysis |
title_short |
On Security Notions for Steganalysis |
title_full |
On Security Notions for Steganalysis |
title_fullStr |
On Security Notions for Steganalysis |
title_full_unstemmed |
On Security Notions for Steganalysis |
title_sort |
on security notions for steganalysis |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2004 |
url |
https://ink.library.smu.edu.sg/sis_research/279 https://ink.library.smu.edu.sg/context/sis_research/article/1278/viewcontent/OnSecurityNotionsForSteganalysis_2005_av.pdf |
_version_ |
1770570373201395712 |