Detection- and Information-theoretic Analysis of Steganography and Fingerprinting
نویسندگان
چکیده
The proliferation of multimedia and the advent of the Internet and other public networks have created many new applications of information hiding in multimedia security and forensics. This dissertation focuses on two of these application scenarios: steganography (and its counter problem, steganalysis), and fingerprinting. First, from a detection-theoretic perspective, we quantify the detectability of commonly used information-hiding techniques such as spread spectrum and distortion-compensated quantization index modulation, and also the detectability of block-based steganography. We devise a practical steganalysis method that exploits the peculiar block structure of block-DCT image steganography. To cope with the twin difficulties of unknown image statistics and unknown steganographic codes, we explore image steganalysis based on supervised learning and build an optimized classifier that outperforms previously proposed image steganalysis methods. Then, from an information-theoretic perspective, we derive the capacity and random-coding error exponent of perfectly secure steganography and public fingerprinting. For both games, a randomized stacked-binning scheme and a matched maximum penalized mutual information decoder are used to achieve capacity and to realize a random-coding error exponent that is strictly positive at all rates below capacity.
منابع مشابه
Detection of perturbed quantization (PQ) steganography based on empirical matrix
Perturbed Quantization (PQ) steganography scheme is almost undetectable with the current steganalysis methods. We present a new steganalysis method for detection of this data hiding algorithm. We show that the PQ method distorts the dependencies of DCT coefficient values; especially changes much lower than significant bit planes. For steganalysis of PQ, we propose features extraction from the e...
متن کاملSteganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images
In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...
متن کاملError-Correcting Codes for a Steganography Application
Steganography is the process of inserting hidden messages in an unrelated transmission. An algorithm for steganography that uses an error-correcting code to embed messages in a carrier sequence is studied. A distortion limit theorem from information-theoretic analysis is given, and optimal code parameters are discussed.
متن کاملA Computational Model for Watermark Robustness
Multimedia security schemes often combine cryptographic schemes with information hiding techniques such as steganography or watermarking. Example applications are dispute resolving, proof of ownership, (asymmetric/anonymous) fingerprinting and zero-knowledge watermark detection. The need for formal security definitions of watermarking schemes is manifold, whereby the core need is to provide sui...
متن کاملSteganography And Digital Watermarking
Introduction Steganography is derived from the Greek for covered writing and essentially means " to hide in plain sight ". As defined by Cachin [1] steganography is the art and science of communicating in such a way that the presence of a message cannot be detected. Simple steganographic techniques have been in use for hundreds of years, but with the increasing use of files in an electronic for...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006