Skip to main content

An Information-Theoretic Model for Steganography

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1525))

Abstract

An information-theoretic model for steganography with passive adversaries is proposed. The adversary’s task of distinguishing between an innocent cover message C and a modified message S containing a secret part is interpreted as a hypothesis testing problem. The security of a steganographic system is quantified in terms of the relative entropy (or discrimination) between P C and P S. Several secure steganographic schemes are presented in this model; one of them is a universal information hiding scheme based on universal data compression techniques that requires no knowledge of the covertext statistics.

Research supported by the Swiss National Science Foundation (SNF).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Anderson, ed., Information Hiding, vol. 1174 of Lecture Notes in Computer Science, Springer, 1996.

    Google Scholar 

  2. R. J. Anderson and F. A. Petitcolas, “On the limits of steganography,” IEEE Journal on Selected Areas in Communications, vol. 16, May 1998.

    Google Scholar 

  3. T. C. Bell, J. G. Cleary, and I. H. Witten, Text Compression. Prentice Hall, 1990.

    Google Scholar 

  4. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, no. 3 & 4, 1996.

    Google Scholar 

  5. J. O. Berger, Statistical Decision Theory and Bayesian Analysis. Springer, 2. ed., 1985.

    Google Scholar 

  6. R. E. Blahut, Principles and Practice of Information Theory. Reading: Addison-Wesley, 1987.

    MATH  Google Scholar 

  7. T. M. Cover and J. A. Thomas, Elements of Information Theory. Wiley, 1991.

    Google Scholar 

  8. I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “A secure, robust watermark for multimedia,” in Information Hiding (R. Anderson, ed.), vol. 1174 of Lecture Notes in Computer Science, Springer, 1996.

    Chapter  Google Scholar 

  9. P. Elias, “Interval and recency rank source coding: two on-line adaptive variablelength schemes,” IEEE Transactions on Information Theory, vol. 33, pp. 3–10, Jan. 1987.

    Google Scholar 

  10. M. Ettinger, “Steganalysis and game equilibria,” in Proc. 2nd Workshop on Information Hiding (D. Aucsmith, ed.), Lecture Notes in Computer Science, Springer-Verlag, 1998.

    Google Scholar 

  11. J. L. Massey, “Contemporary cryptography: An introduction,” in Contemporary Cryptology: The Science of Information Integrity (G. J. Simmons, ed.), ch. 1, pp. 1–39, IEEE Press, 1991.

    Google Scholar 

  12. U. M. Maurer, “A unified and generalized treatment of authentication theory,” in Proc. 13th Annual Symposium on Theoretical Aspects of Computer Science (STACS) (C. Puech and R. Reischuk, eds.), vol. 1046 of Lecture Notes in Computer Science, pp. 190–198, Springer, 1996.

    Google Scholar 

  13. M. Naor, A. Fiat, and B. Chor, “Tracing traitors,” in Advances in Cryptology: CRYPTO’ 94 (Y. G. Desmedt, ed.), vol. 839 of Lecture Notes in Computer Science, 1994.

    Google Scholar 

  14. M. Naor and A. Shamir, “Visual cryptography,” in Advances in Cryptology: EUROCRYPT’ 94 (A. De Santis, ed.), vol. 950 of Lecture Notes in Computer Science, pp. 1–12, Springer, 1995.

    Chapter  Google Scholar 

  15. B. Pfitzmann, “Information hiding terminology,” in Information Hiding (R. Anderson, ed.), vol. 1174 of Lecture Notes in Computer Science, Springer, 1996.

    Chapter  Google Scholar 

  16. B. Pfitzmann and M. Schunter, “Asymmetric fingerprinting,” in Advances in Cryptology: EUROCRYPT’ 96 (U. Maurer, ed.), vol. 1233 of Lecture Notes in Computer Science, Springer, 1996.

    Google Scholar 

  17. B. Pfitzmann and M. Waidner, “Anonymous fingerprinting,” in Advances in Cryptology: EUROCRYPT’ 97 (W. Fumy, ed.), vol. 1070 of Lecture Notes in Computer Science, Springer, 1997.

    Google Scholar 

  18. C. E. Shannon, “A mathematical theory of communication,” Bell System Technical Journal, vol. 27, pp. 379–423, 623-656, July, Oct. 1948.

    Google Scholar 

  19. G. J. Simmons, “The prisoners’ problem and the subliminal channel,” in Advances in Cryptology: Proceedings of Crypto 83 (D. Chaum, ed.), pp. 51–67, Plenum Press, 1984.

    Google Scholar 

  20. G. J. Simmons, “Authentication theory/coding theory,” in Advances in Cryptology: Proceedings of CRYPTO 84 (G. R. Blakley and D. Chaum, eds.), vol. 196 of Lecture Notes in Computer Science, Springer, 1985.

    Chapter  Google Scholar 

  21. G. J. Simmons, “An introduction to shared secret and/or shared control schemes and their application,” in Contemporary Cryptology: The Science of Information Integrity (G. J. Simmons, ed.), pp. 441–497, IEEE Press, 1991.

    Google Scholar 

  22. F. M. Willems, “Universal data compression and repetition times,” IEEE Transactions on Information Theory, vol. 35, pp. 54–58, Jan. 1989.

    Google Scholar 

  23. J. Ziv and A. Lempel, “A universal algorithm for sequential data compression,” IEEE Transactions on Information Theory, vol. 23, pp. 337–343, May 1977.

    Google Scholar 

  24. J. Zöllner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, “Modeling the security of steganographic systems,” in Proc. 2nd Workshop on Information Hiding (D. Aucsmith, ed.), Lecture Notes in Computer Science, Springer-Verlag, 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cachin, C. (1998). An Information-Theoretic Model for Steganography. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_21

Download citation

  • DOI: https://doi.org/10.1007/3-540-49380-8_21

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65386-8

  • Online ISBN: 978-3-540-49380-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics