Advertisement

Steganalysis and Game Equilibria

  • J. Mark Ettinger
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1525)

Abstract

Steganography is the study of methods of concealing data in the noise of another data set. Steganalysis is the field of discovering hidden data and disrupting covert channels. We introduce a two-player, zero-sum, matrix game for the purpose of modeling the contest between a data-hider and a data-attacker. We then solve the game for equilibria, demonstrating that the form of the solution depends on whether the permitted distortion is less than or greater than d c, the critical distortion. This critical point is a simple function of several parameters which define the game. We then solve two example cases to demonstrate the ideas presented in the general solution. The value of the game is the amount of information that may be reliably stored in the data set.

Keywords

Steganalysis Cryptanalysis Equilibria Shannon Entropy Binary Symmetric Channel Active Warden Attack 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ross Anderson editor. Information Hiding. First International Workshop. Cambridge, U.K., May/June, 1996. Proceedings. Lecture Notes In Computer Science Series Number 1174. Springer-Verlag, 1996.Google Scholar
  2. 2.
    W. Bender, D. Gruhl, N. Morimoto, A. Lu. “Techniques For Data Hiding.” IBM Systems Journal Vol. 35, 1996, pp. 313–336.CrossRefGoogle Scholar
  3. 3.
    I. Cox, J. Kilian, Tom Leighton, Talal Shamoon. “A Secure, Robust Watermark for Multimedia” in [1].Google Scholar
  4. 4.
    Robert J. McEliece. The Theory of Information and Coding. Addison-Wesley, 1977.Google Scholar
  5. 5.
    Guillermo Owen. Game Theory. Academic Press, 1995.Google Scholar
  6. 6.
    Joseph A. O’Sullivan, Pierre Moulin, J. Mark Ettinger. Information Theoretic Analysis of Steganography. 1998 IEEE International Symposium on Information Theory.Google Scholar
  7. 7.
    M. Sandford, J. Bradley, T. Handel. “The Data Embedding Method.” Los Alamos Technical Report 9LA-95-2246UR.Google Scholar
  8. 8.
    J. Von Neumann and O. Morgenstern. The Theory of Games and Economic Behavior. Princeton University Press, 1944, 1947.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • J. Mark Ettinger
    • 1
  1. 1.Los Alamos National LaboratoryLos Alamos

Personalised recommendations