Information-Theoretic Analysis for the Difficulty of Extracting Hidden Information

被引:5
作者
ZHANG Weiming LI Shiqu CAO Jia LIU Jiufen Department of Information ResearchInformation Engineering UniversityZhengzhou Henan ChinaState Key Laboratory of Information Security Graduate School of the Chinese Academy Sciences Beijing China [1 ,2 ,1 ,1 ,2 ,1 ,21 ,450002 ,2 ,100039 ]
机构
关键词
information hiding; steganography; extracting attack; difficulty of extraction; unicity distance;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
The difficulty of extracting hidden information, which is essentially a kind of secrecy, is analyzed by information-theoretic method. The relations between key rate, message rate, hiding capacity and difficulty of extraction are studied in the terms of unicity distance of stego-key, and the theoretic conclusion is used to analyze the actual extracting attack on Least Significant Bit(LSB) steganographic algorithms.
引用
收藏
页码:315 / 318
页数:4
相关论文
共 48 条
[41]   CHARACTERISTIC ANALYSIS OF CARRIER BASED ON THE FILTERING AND A MULTI-WAVELET METHOD FOR THE INFORMATION HIDING [J].
Ren, Shuai ;
Zhang, Tao ;
Shi, Fangxia .
DISCRETE AND CONTINUOUS DYNAMICAL SYSTEMS-SERIES S, 2015, 8 (06) :1291-1299
[42]   A Novel Information Hiding Algorithm Based on Grey Relational Analysis for H.264/AVC [J].
Zhang, Yingnan ;
Zhang, Minqing ;
Wang, Jingjing ;
Niu, Ke .
2015 International Conference on Intelligent Networking and Collaborative Systems IEEE INCoS 2015, 2015, :365-369
[43]   Information hiding scheme for 3D models based on skeleton and inscribed sphere analysis [J].
Zhang, Tao ;
Mu, Dejun ;
Ren, Shuai ;
Ju, Yongfeng ;
Ling, Yao .
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2014, 41 (02) :185-190
[44]   Framework for Hiding Information in Audio Sub-signals by Using Singular Spectrum Analysis with Psychoacoustic Model [J].
Burimas, Ratthamontree ;
Kumpuak, Tidanat ;
Intarauksorn, Mongkonchai ;
Galajit, Kasorn ;
Aimmanee, Pakinee ;
Karnjana, Jessada .
ICGSP '19 - PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON GRAPHICS AND SIGNAL PROCESSING, 2019, :67-74
[45]   Study of high performance information hiding scheme based on CL multi-wavelet and annulus sector analysis [J].
Ren, Shuai ;
Zhang, Tao .
International Journal of Digital Content Technology and its Applications, 2012, 6 (04) :58-68
[46]   A Multi-carrier Information Hiding Algorithm Based on Dual 3D Model Spectrum Analysis [J].
Ren, Shuai ;
Ma, Liming ;
Feng, Qiuyu .
DIGITAL FORENSICS AND CYBER CRIME, PT 1, ICDF2C 2023, 2024, 570 :117-131
[47]   Security analysis and improvement on a double-random phase-encoding technique based information hiding method [J].
Sang, Jun ;
Xiang, Hong ;
Fu, Li ;
Sang, Nong .
OPTICS COMMUNICATIONS, 2009, 282 (12) :2307-2317
[48]   Review On Quick Response Codes In The Field Of Information Security (Analysis Of Various Imperceptibility Characteristics On Grayscale And Binary QR code) [J].
Ramya, V. ;
Gopinath, G. .
2014 INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING AND TECHNOLOGY (ICAET), 2014,