Steganography Security: Principle and Practice

This paper focuses on several theoretical issues and principles in steganography security, and defines four security levels by analyzing the corresponding algorithm instances. In the theoretical analysis, we discuss the differences between steganography security and watermarking security. The two necessary conditions for the steganography security are obtained. Under the current technology situation, we then analyze the indistinguishability of the cover and stego-cover, and consider that the steganography security should rely on the key secrecy with algorithms open. By specifying the role of key in steganography, the necessary conditions for a secure steganography algorithm in theory are formally presented. When analyzing the security instances, we have classified the steganalysis attacks according to their variable access to the steganography system, and then defined the four security levels. The higher level security one has, the higher level attacks one can resist. We have also presented algorithm instances based on current technical conditions, and analyzed their data hiding process, security level, and practice requirements.

[1]  Philip J. Corriveau,et al.  Study of Rating Scales for Subjective Quality Assessment of High-Definition Video , 2011, IEEE Transactions on Broadcasting.

[2]  Fernando Pérez-González,et al.  Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis , 2005, Information Hiding.

[3]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[4]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[5]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[6]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.

[7]  John Langford,et al.  Provably Secure Steganography , 2002, IEEE Transactions on Computers.

[8]  Rainer Böhme,et al.  A game-theoretic analysis of content-adaptive steganography with independent embedding , 2013, 21st European Signal Processing Conference (EUSIPCO 2013).

[9]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[10]  Michael Backes,et al.  Public-Key Steganography with Active Attacks , 2005, TCC.

[11]  David Pointcheval,et al.  Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries , 1999, ASIACRYPT.

[12]  Jia Liu,et al.  Generative Steganography with Kerckhoffs' Principle based on Generative Adversarial Networks , 2017, ArXiv.

[13]  Jiwu Huang,et al.  Reversible data hiding in Paillier cryptosystem , 2016, J. Vis. Commun. Image Represent..

[14]  Sam Kwong,et al.  A Study on the Security Levels of Spread-Spectrum Embedding Schemes in the WOA Framework , 2018, IEEE Transactions on Cybernetics.

[15]  W. Marsden I and J , 2012 .

[16]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[17]  J. Nash,et al.  NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.

[18]  Eric van Damme,et al.  Non-Cooperative Games , 2000 .

[19]  Minh N. Do,et al.  Semantic Image Inpainting with Deep Generative Models , 2016, 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[20]  Ton Kalker,et al.  Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[21]  Tomás Pevný,et al.  Using High-Dimensional Image Models to Perform Highly Undetectable Steganography , 2010, Information Hiding.

[22]  Tomás Pevný,et al.  Benchmarking for Steganography , 2008, Information Hiding.

[23]  Jessica J. Fridrich,et al.  Further study on the security of S-UNIWARD , 2014, Electronic Imaging.

[24]  Yun Q. Shi,et al.  Structural Design of Convolutional Neural Networks for Steganalysis , 2016, IEEE Signal Processing Letters.

[25]  Jing Dong,et al.  Learning and transferring representations for image steganalysis using convolutional neural network , 2016, 2016 IEEE International Conference on Image Processing (ICIP).

[27]  Leon A. Gatys,et al.  Texture Synthesis Using Convolutional Neural Networks , 2015, NIPS.

[28]  Jessica J. Fridrich,et al.  Multivariate gaussian model for designing additive distortion for steganography , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[29]  Xiaoyuan Yang,et al.  A multilevel reversible data hiding scheme in encrypted domain based on LWE , 2018, J. Vis. Commun. Image Represent..

[30]  Andrew D. Ker Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.

[31]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[32]  Soumith Chintala,et al.  Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.

[33]  Nan Jiang,et al.  LSB Based Quantum Image Steganography Algorithm , 2015, International Journal of Theoretical Physics.

[34]  Tomás Pevný,et al.  Steganalysis by subtractive pixel adjacency matrix , 2010, IEEE Trans. Inf. Forensics Secur..

[35]  Donghui Hu,et al.  Coverless Information Hiding Based on Robust Image Hashing , 2017, ICIC.

[36]  Jessica J. Fridrich,et al.  The square root law of steganographic capacity for Markov covers , 2009, Electronic Imaging.

[37]  Jessica J. Fridrich,et al.  Designing steganographic distortion using directional filters , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[38]  Stefan Katzenbeisser,et al.  Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.

[39]  Yun Q. Shi,et al.  Uniform Embedding for Efficient JPEG Steganography , 2014, IEEE Transactions on Information Forensics and Security.

[40]  Jessica Fridrich,et al.  Steganography in Digital Media: References , 2009 .

[41]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[42]  C. Fontaine,et al.  Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.

[43]  Shen Wang,et al.  Least significant qubit (LSQb) information hiding algorithm for quantum image , 2015 .

[44]  François Cayre,et al.  Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding , 2008, IEEE Transactions on Information Forensics and Security.