Information-Theoretic Analysis for the Difficulty of Extracting Hidden Information

被引:5
|
作者
ZHANG Wei-ming 1
2.State Key Laboratory of Information Security
机构
关键词
information hiding; steganography; extracting attack; difficulty of extraction; unicity distance;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
The difficulty of extracting hidden information, which is essentially a kind of secrecy, is analyzed by information-theoretic method. The relations between key rate, message rate, hiding capacity and difficulty of extraction are studied in the terms of unicity distance of stego-key, and the theoretic conclusion is used to analyze the actual extracting attack on Least Significant Bit(LSB) steganographic algorithms.
引用
收藏
页码:315 / 318
页数:4
相关论文
共 46 条
  • [1] Information-theoretic analysis of information hiding
    Moulin, P
    O'Sullivan, JA
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (03) : 563 - 593
  • [2] An information-theoretic model for steganography
    Cachin, C
    INFORMATION AND COMPUTATION, 2004, 192 (01) : 41 - 56
  • [3] Information-theoretic bounds for steganography in visual multimedia
    El-Arsh, Hassan Y.
    Abdelaziz, Amr
    Elliethy, Ahmed
    Aly, H. A.
    Gulliver, T. Aaron
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 89
  • [4] DNA-Chip-Based Information Hiding Scheme Achieving Information-Theoretic Security
    Fang, Xiwen
    Lai, Xuejia
    JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE, 2015, 12 (07) : 1402 - 1407
  • [5] INFORMATION-THEORETIC DATA-HIDING: RECENT ACHIEVEMENTS AND OPEN PROBLEMS
    Voloshynovskiy, Sviatoslav
    Deguillaumet, Frederic
    Koval, Oleksiy
    Pun, Thierry
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2005, 5 (01) : 5 - 35
  • [6] Research on the extracting and restoring technology of hidden information in network datastream
    Chen Fei
    Zhou Qingzhong
    Zhao Chunjiang
    Ren Jingan
    Zhou Qingzhong
    Zhao Chunjiang
    Ren Jingan
    WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING, VOL 1 AND 2, 2006, : 141 - +
  • [7] Research on information hiding theoretic model
    Ge, Xiuhui
    Tian, Hao
    ICEMI 2007: PROCEEDINGS OF 2007 8TH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL II, 2007, : 227 - 232
  • [8] Information-theoretic data-hiding for public network security, services control and secure communications
    Voloshynovskiy, S
    Deguillaume, F
    Koval, O
    Pun, T
    TELSIKS 2003: 6TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICE, VOLS 1 AND 2, PROCEEDINGS OF PAPERS, 2003, : 3 - 17
  • [9] Synthesis and Analysis of Steganography Hidden Information by Tomographic Methods
    Zakasovskaya, E.
    Gorenko, N.
    Sinenko, P.
    2017 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING, APPLICATIONS AND MANUFACTURING (ICIEAM), 2017,
  • [10] Detection of hidden information in webpage
    Huang, Huajun
    Sun, Xingming
    Li, Zishuai
    Sun, Guang
    FOURTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 4, PROCEEDINGS, 2007, : 317 - 320