Bitspotting: Detecting Optimal Adaptive Steganography
We analyze a two-player zero-sum game between a steganographer, Alice, and a steganalyst, Eve. In this game, Alice wants to hide a secret message of length \(k\) in a binary sequence, and Eve wants to detect whether a secret message is present. The individual positions of all binary sequences are independently distributed, but have different levels of predictability. Using knowledge of this distribution, Alice randomizes over all possible size-\(k\) subsets of embedding positions. Eve uses an optimal (possibly randomized) decision rule that considers all positions, and incorporates knowledge of both the sequence distribution and Alice’s embedding strategy.
Our model extends prior work by removing restrictions on Eve’s detection power. The earlier work determined where Alice should hide the bits when Eve can only look in one position. Here, we expand Eve’s capacity to spot these bits by allowing her to consider all positions. We give defining formulas for each player’s best response strategy and minimax strategy; and we present additional structural constraints on the game’s equilibria. For the special case of length-two binary sequences, we compute explicit equilibria and provide numerical illustrations.
KeywordsGame theory Content-adaptive steganography Security
- 6.Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. In: SPIE, vol. 5306, pp. 23–34 (2004)Google Scholar
- 7.Fridrich, J., Kodovskỳ, J.: Multivariate Gaussian model for designing additive distortion for steganography. In: ICASSP. IEEE (2013)Google Scholar
- 9.Ker, A.D.: Batch steganography and the threshold game. In: SPIE, vol. 6505, pp. 650–504 (2007)Google Scholar
- 14.Schöttle, P., Laszka, A., Johnson, B., Grossklags, J., Böhme, R.: A game-theoretic analysis of content-adaptive steganography with independent embedding. In: EUSIPCO. IEEE (2013)Google Scholar