Abstract
There are several steganography techniques (e.g. linguistic or least significant bit embedding) that provide security but no robustness against an active adversary. On the other hand it is rather well known that the spread-spectrum based technique is robust against an active adversary but it seems to be insecure against a statistical detection of stegosignal. We prove in this paper that actually this is not the case and that there exists an stegosystem that is asymptotically both secure to statistical detection and robust against a jamming of stegosignal by an active adversary. We call such stegosystems quasiperfect whereas we call them perfect if in addition the data rate of secret information is asymptotically constant. We prove that perfect stegosystems do not exist for both blind and informed decoders. Some examples using the simplex and the Reed-Muller codes jointly with stegosystems are given.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)
Bolshakov, S.: A method of linguistic steganography based on collocation-proven synonymy. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 13–23. Springer, Heidelberg (2004)
Damitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 355–372. Springer, Heidelberg (2003)
Malvar, H.S., Florencio, D.: Improved spread spectrum: A new modulation technique for robust watermarking. IEEE Transaction on Signal Processing 51, 898–905 (2003)
Cover, T., Thomas, J.: Elements of Information Theory. John Wiley and Sons, Inc., Chichester (1991)
Proakis, J.: Digital Communications, 4th edn. McGraw Hill, New York (2001)
MacWilliams, F., Sloan, N.: The Theory of Error Correcting Codes. Bell Labs. (1991)
Korjik, V., Morales-Luna, G.: Information hiding through noisy channels. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 42–50. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Korzhik, V., Morales-Luna, G., Lee, M.H. (2005). On the Existence of Perfect Stegosystems. In: Barni, M., Cox, I., Kalker, T., Kim, HJ. (eds) Digital Watermarking. IWDW 2005. Lecture Notes in Computer Science, vol 3710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11551492_3
Download citation
DOI: https://doi.org/10.1007/11551492_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28768-1
Online ISBN: 978-3-540-32052-4
eBook Packages: Computer ScienceComputer Science (R0)