TY - JOUR
T1 - On security notions for steganalysis
AU - Chang, Kisik
AU - Deng, Robert H.
AU - Feng, Bao
AU - Lee, Sangjin
AU - Kim, Hyungjun
AU - Lim, Jongin
N1 - Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.
PY - 2005
Y1 - 2005
N2 - There have been some achievements in steganalysis recently. Many people have been making strides in steganalysis. They have approached steganalysis from different angles; from information theory to complexity theory. Anderson gave a possibility that there is a provable secure steganographic system, but there had not been complexity theoretical approaches for years. In 2002, Katzenbeisser and Petitcolas defined the conditional security of steganography and gave a possibility for a practical, provable secure steganography for the first time, and Hopper et al. introduced a provable secure steganographic algorithm in the sense of complexity theory. Chang et al. also tried to define the complexity theoretical security and showed a practical, provable secure algorithm. Chang et al. presented chose-input attack model in a view of pseudoprocessingness for a steganographic system. In this paper, we try to improve this notion in detail. So we define chosen-cover attack model and chosen-message attack model. Moreover, we present the relation between them.
AB - There have been some achievements in steganalysis recently. Many people have been making strides in steganalysis. They have approached steganalysis from different angles; from information theory to complexity theory. Anderson gave a possibility that there is a provable secure steganographic system, but there had not been complexity theoretical approaches for years. In 2002, Katzenbeisser and Petitcolas defined the conditional security of steganography and gave a possibility for a practical, provable secure steganography for the first time, and Hopper et al. introduced a provable secure steganographic algorithm in the sense of complexity theory. Chang et al. also tried to define the complexity theoretical security and showed a practical, provable secure algorithm. Chang et al. presented chose-input attack model in a view of pseudoprocessingness for a steganographic system. In this paper, we try to improve this notion in detail. So we define chosen-cover attack model and chosen-message attack model. Moreover, we present the relation between them.
KW - Pseudoprocessingness
KW - Steganalysis
KW - Steganography
UR - http://www.scopus.com/inward/record.url?scp=24944554811&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=24944554811&partnerID=8YFLogxK
U2 - 10.1007/11496618_32
DO - 10.1007/11496618_32
M3 - Conference article
AN - SCOPUS:24944554811
SN - 0302-9743
VL - 3506
SP - 440
EP - 454
JO - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
JF - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
T2 - 7th International Conference on Information Security and Cryptology - ICISC 2004
Y2 - 2 December 2004 through 3 December 2004
ER -