Asymptotically optimal perfect steganographic systems
نویسندگان
چکیده
In 1998 C. Cachin proposed an information-theoretic approach to steganography. In particular, in the framework of this approach the so-called perfectly secure stegosystem was defined, where messages that carry and do not carry hidden information are statistically indistinguishable. There was also described a universal steganographic system, for which this property holds only asymptotically, as the message length grows, while encoding and decoding complexity increases exponentially. (By definition, a system is universal if it is also applicable in the case where probabilistic characteristics of messages used to transmit hidden information are not known completely.) In the present paper we propose a universal steganographic system where messages that carry and do not carry hidden information are statistically indistinguishable, while transmission rate of “hidden” information approaches the limit, the Shannon entropy of the source used to “embed” the hidden information. DOI: 10.1134/S0032946009020094
منابع مشابه
On Ryabko&Ryabko asymptotically optimal perfect steganographic scheme in a noisy channel
We consider a scenario when a perfect steganographic system of [1] is used for data transmission over a noisy channel. We shown that errors in the resulting channel form the insertion-deletion channel.
متن کاملOn The Limits Of Perfect Security For Steganographic System
Until now the discussion on perfect security for steganographic systems has remained confined within the realm of mathematicians and information theory experts whose concise and symbolic representation of their philosophies, postulates, and inference thereafter has made it hard for the naïve academics to have an insight of the concepts. This paper is an endeavor not only to appraise on the limi...
متن کاملConstructing Perfect Steganographic Systems
Article history: Received 11 September 2008 Revised 29 April 2011 Available online 22 July 2011
متن کاملProduct perfect Z2 Z4-linear codes in steganography
Product perfect codes have been proven to enhance the performance of the F5 steganographic method, whereas perfect Z2Z4-linear codes have been recently introduced as an efficient way to embed data, conforming to the ±1-steganography. In this paper, we present two steganographic methods. On the one hand, a generalization of product perfect codes is made. On the other hand, this generalization is...
متن کاملDe Dictionariis Dynamicis Pauco Spatio Utentibus (lat. On Dynamic Dictionaries Using Little Space)
We develop dynamic dictionaries on the word RAM that use asymptotically optimal space, up to constant factors, subject to insertions and deletions, and subject to supporting perfect-hashing queries and/or membership queries, each operation in constant time with high probability. When supporting only membership queries, we attain the optimal space bound of Θ(n lg u n ) bits, where n and u are th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Probl. Inf. Transm.
دوره 45 شماره
صفحات -
تاریخ انتشار 2009