Information-Theoretic Analysis for the Difficulty of Extracting Hidden Information

被引:5
作者
ZHANG Weiming LI Shiqu CAO Jia LIU Jiufen Department of Information ResearchInformation Engineering UniversityZhengzhou Henan ChinaState Key Laboratory of Information Security Graduate School of the Chinese Academy Sciences Beijing China [1 ,2 ,1 ,1 ,2 ,1 ,21 ,450002 ,2 ,100039 ]
机构
关键词
information hiding; steganography; extracting attack; difficulty of extraction; unicity distance;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
The difficulty of extracting hidden information, which is essentially a kind of secrecy, is analyzed by information-theoretic method. The relations between key rate, message rate, hiding capacity and difficulty of extraction are studied in the terms of unicity distance of stego-key, and the theoretic conclusion is used to analyze the actual extracting attack on Least Significant Bit(LSB) steganographic algorithms.
引用
收藏
页码:315 / 318
页数:4
相关论文
共 47 条
[21]   A simple method for detecting the possible changes of hidden information of watermarked image in an MMS message [J].
Shirali-Shahreza, Mohammad .
2008 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES, 2008, :14-17
[22]   Risk Evaluation and Detection of Information Hidden in Video Container Formats [J].
Ling, Baohong ;
Peng, Yinyin ;
Hu, Donghui .
2024 3RD INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND MEDIA COMPUTING, ICIPMC 2024, 2024, :177-184
[23]   A data structure for graph to facilitate hiding of information in a graph's segments - a graph theoretic approach to steganography [J].
Kumar, Vinay ;
Muttoo, Sunil Kumar .
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2009, 3 (03) :268-282
[24]   Hiding Information in Vector Layer While Extracting Layers from Raster Data [J].
Kumar, Vinay ;
Bansal, Abhishek ;
Muttoo, Sunil Kumar .
INFORMATION SECURITY JOURNAL, 2012, 21 (06) :317-327
[25]   Detection of Hidden Information in Webpage Based on Higher-Order Statistics [J].
Huang, Huajun ;
Tan, Junshan ;
Sun, Xingming ;
Liu, Lingxi .
DIGITAL WATERMARKING, 2009, 5450 :293-+
[26]   A Quality-Preserving Hidden Information Removal Approach for Digital Images [J].
Rezaei, Fahimeh ;
Hempel, Michael ;
Shrestha, Pradhumna Lal ;
Ma, Tao ;
Peng, Dongming ;
Sharif, Hamid .
2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
[27]   Steganalysis of information hidden in a webpage by changing the uppercase-lowercase of tag [J].
Huang, Hua-Jun ;
Gu, Jin-Jie .
Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (SUPPL. 2) :83-87
[28]   Performance analysis of information hiding [J].
Shimizu, S .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 :421-432
[29]   An Anti-Steganographic Approach for Removing Secret Information in Digital Audio Data hidden by Spread Spectrum Methods [J].
Rezaei, Fahimeh ;
Ma, Tao ;
Hempel, Michael ;
Peng, Dongming ;
Sharif, Hamid .
2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013,
[30]   PixelSteganalysis: Pixel-Wise Hidden Information Removal With Low Visual Degradation [J].
Jung, Dahuin ;
Bae, Ho ;
Choi, Hyun-Soo ;
Yoon, Sungroh .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (01) :331-342