Hard Communication Channels for Steganography
نویسندگان
چکیده
This paper considers steganography – the concept of hiding the presence of secret messages in legal communications – in the computational setting and its relation to cryptography. Very recently the first (non-polynomial time) steganographic protocol has been shown which, for any communication channel, is provably secure, reliable, and has nearly optimal bandwidth. The security is unconditional, i.e. it does not rely on any unproven complexity-theoretic assumption. This disproves the claim that the existence of one-way functions and access to a communication channel oracle are both necessary and sufficient conditions for the existence of secure steganography in the sense that secure and reliable steganography exists independently of the existence of one-way functions. In this paper, we prove that this equivalence also does not hold in the more realistic setting, where the stegosystem is polynomial time bounded. We prove this by constructing (a) a channel for which secure steganography exists if and only if one-way functions exist and (b) another channel such that secure steganography implies that no one-way functions exist. We therefore show that security-preserving reductions between cryptography and steganography need to be treated very carefully. 1998 ACM Subject Classification E.3 Data Encryption
منابع مشابه
Steganography harnesses VoIP networks
Covert channels may be dangerous to company networks as they can lead to the leakage of confidential information. However, it is hard to assess what bandwidth of a covert channel poses a serious threat. Generally, it depends on the security policy that is implemented by the organisation concerned. The ideal case will be to eliminate all possibilities of hidden communication, but practically it ...
متن کاملA Two-Threshold Guard Channel Scheme for Minimizing Blocking Probability in Communication Networks
In this paper, we consider the call admission problem in cellular network with two classes of voice users. In the first part of paper, we introduce a two-threshold guard channel policy and study its limiting behavior under the stationary traffic. Then we give an algorithm for finding the optimal number of guard channels. In the second part of this paper, we give an algorithm, which minimizes th...
متن کاملRunning head: STEGANOGRAPHY IN THAI TEXT
Steganography, or communication through covert channels, is desirable when the mere existence of an encrypted message might cause suspicion or provide useful information to eavesdroppers. Text is effective for steganography due to its ubiquity. However, text communication channels do not necessarily provide sufficient redundancy for covert communication. We propose a novel steganographic embedd...
متن کاملA Novel Text Steganography System in Cricket Match Scorecard
Steganography can be defined as a method of hiding data within a cover media so that other individuals fail to realize their existence. Image, audio and video are some popular media for steganography. But text is ideal for steganography due to its ubiquity and smaller size compared to these media. However, text communication channels do not necessarily provide sufficient redundancy for covert c...
متن کاملA Review on Covert Timing Channels & their Applications
Covert network timing channels control time between transmissions of packets in overt network communication and transmits hidden messages. This paper presents an overview of different concepts of covert timing channels such as types, features and properties. There is range of terms used for security of information such as encryption, covert channels, network steganography or information hiding ...
متن کامل