Abstract
A theoretical model for steganography and digital watermarking is presented, which includes a stego encoder, a stego channel and a stego decoder. The first part states the basic steganographic and watermarking problems in terms of mutual information of the involved quantities such as the secret message, the stego message and the modified stego message. General lower bounds on the robustness-related mutual information are derived. In the second part, perfect steganography is considered and some new schemes are presented that achieve perfect secrecy and provide robustness against some attacks. In the last part, the robustness of some simplistic schemes is evaluated by tight lower bounds on the robustness-related mutual information. From these bounds, two criteria for robust embedding are derived.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Cachin, C.: An Information-Theoretic Model for Steganography. In: Proceeding of the Second Intern. Information Hiding Workshop, Portland, Oregon, USA, April 15 - 17 (1998)
Hernandez, J.R., Pérez-Gonzáles, F.: Throwing More Light on Image Watermarks. In: Proceeding of the Second Intern. Information Hiding Workshop, Portland, Oregon, USA, April 15 - 17 (1998)
Zöllner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the Security of Steganographic Systems. In: Proceeding of the Second Intern. Information Hiding Workshop, Portland, Oregon, USA, April 15 - 17 (1998)
Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for images, audio and video. In: IEEE Proc. Int. Conf. Image Processing, vol. 3, pp. 243–246 (1996)
Simmons, G.J.: The Prisoners’ Problem and the Subliminal Channel. In: Chaum, D. (ed.) Crypto 1983 Proc., pp. 51–67. Plenum Press, New York (1984)
Gallager, R.G.: Information Theory and Reliable Communication. Wiley & Sons, New York (1968)
Lin, S., Costello Jr., D.J.: Error Control Coding: Fundamentals and Applications. Prentice-Hall, New Jersey (1983)
Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley, Chichester (1991)
Shannon, C.: Communication Theory of Secrecy Systems. Bell System Technical Journal 28, 656–715 (1949)
Slepian, D.: Permutation Modulation. Proc. of the IEEE 53(3), 228–236 (1965)
Welch, L.R.: Lower Bounds on the Maximum Cross Correlation of Signals. IEEE Trans. on Information Th. IT-20, 397–399 (1974)
Podilchuk, C.I., Zeng, W.: Image-Adaptive Watermarking Using Visual Models. IEEE J. Selected Areas in Communications 16(4), 525–539 (1998)
Shiryayev, A.N.: Probability. In: GTM 1995. Springer, Heidelberg (1984)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mittelholzer, T. (2000). An Information-Theoretic Approach to Steganography and Watermarking. In: Pfitzmann, A. (eds) Information Hiding. IH 1999. Lecture Notes in Computer Science, vol 1768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10719724_1
Download citation
DOI: https://doi.org/10.1007/10719724_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67182-4
Online ISBN: 978-3-540-46514-0
eBook Packages: Springer Book Archive