Skip to main content

Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks

  • Conference paper
Book cover Information Hiding (IH 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4437))

Included in the following conference series:

Abstract

We provide construction of steganographic schemes secure against adaptive chosen stegotext attacks. Our constructions achieve embedding rate equals to the Shannon entropy bound on steganographic channel capacity. Further the covertext distribution can be given as either an integrable probability function or as a random covertext sampler. We also introduce steganographic codes that are of interests in constructing other steganographic protocols such as steganographic secret sharing or steganographic distributed computations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE Journal of Selected Areas in Communications 16(4), 474–481 (1998)

    Article  Google Scholar 

  2. Backes, M., Cachin, C.: Public key steganography with active attacks. Technical report, IACR ePrint Archive 2003/231 (2003)

    Google Scholar 

  3. Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  4. Craver, S.: On public-key steganography in the presence of an active warden. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 14–17. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  5. Csiszar.: The method of types. IEEETIT: IEEE Transactions on Information Theory, 44 (1998)

    Google Scholar 

  6. Csiszar, I., Korner, J.: Information theory: Coding Theory for Discrete Memoryless Systems. Academic Press, NewYork (1981)

    MATH  Google Scholar 

  7. Gurther, G.: A universal algorithm for homophonic coding. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, Springer, Heidelberg (1988)

    Google Scholar 

  8. Hopper, N., Langford, J., von Ahn, L.: Provably secure steganography. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  9. Hopper, N., von Ahn, L.: Public key steganography. In: Crypto 2003 (submitted)

    Google Scholar 

  10. Katzenbeisser, S., Petitcolas, F.: On defining security in steganographic systems (2002)

    Google Scholar 

  11. Mittelholzer. An information-theoretic approach to steganography and watermarking. In A. Pfitzmann, editor, Proceedings of Third International Workshop on Information Hiding, volume 1768 of LNCS. Springer-Verlag, September 1998.

    Chapter  Google Scholar 

  12. Moulin, P., O’Sullivan, J.: Information-theoretic analysis of information hiding (1999)

    Google Scholar 

  13. Reyzin, L., Russell, S.: More efficient provably secure steganography. Technical report, IACR ePrint Archive 2003/093 (2003)

    Google Scholar 

  14. Simmons, G.J.: The prisoner’s problem and the subliminal channel. In: Chaum, D. (ed.) Advances in Cryptology: Proceedings of Crypto 1983, New York, USA, pp. 51–70. Plenum Publishing, New York, USA (1984)

    Google Scholar 

  15. von Ahn, L., Hopper, N.: Public key steganography. In: Eurocrypt 2004 (submitted)

    Google Scholar 

  16. Zollner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the security of steganographic systems. In: Information Hiding, pp. 344–354 (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jan L. Camenisch Christian S. Collberg Neil F. Johnson Phil Sallee

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Van Le, T., Kurosawa, K. (2007). Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds) Information Hiding. IH 2006. Lecture Notes in Computer Science, vol 4437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74124-4_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74124-4_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74123-7

  • Online ISBN: 978-3-540-74124-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics