Cryptographic Secrecy Analysis of Matrix Embedding

Matrix embedding has been used to improve the embedding efficiency of steganography, which is an efficient method to enhance the concealment security. The privacy security of matrix embedding has also been studied under the condition of known-stego-object attcack. However, with the development of steganalysis, the attacker could obtain the estimated cover by the cover restoration technique. Consequently, the privacy security under the stronger attack condition should be considered. In this paper we study the secrecy security of matrix embedding using information theory under the circumstance of known-cover attack from the point of the key equivocation. The relation among the wet ratio of covers, embedding rate, and key equivocation is presented. We also proposed a new differential attack to matrix embedding under the circumstance of chosen-stego attack.

[1]  Tomás Pevný,et al.  Statistically undetectable jpeg steganography: dead ends challenges, and opportunities , 2007, MM&Sec.

[2]  Phillip A. Regalia,et al.  Cryptographic Secrecy of Steganographic Matrix Embedding , 2008, IEEE Transactions on Information Forensics and Security.

[3]  Jessica J. Fridrich,et al.  On Steganographic Embedding Efficiency , 2006, Information Hiding.

[4]  Gregory A. Kabatiansky,et al.  Information hiding by coverings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[5]  Vladimir Oleshchuk,et al.  Internet of things and privacy preserving technologies , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.

[6]  Weiming Zhang,et al.  Security Measurements of Steganographic Systems , 2004, ACNS.

[7]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[8]  Wen-Guey Tzeng,et al.  An Optimal Data Hiding Scheme With Tree-Based Parity Check , 2011, IEEE Transactions on Image Processing.

[9]  Jessica J. Fridrich,et al.  Wet paper codes with improved embedding efficiency , 2006, IEEE Transactions on Information Forensics and Security.

[10]  Jessica J. Fridrich,et al.  Efficient Wet Paper Codes , 2005, Information Hiding.

[11]  Kevin Curran,et al.  A Watermarking Based Tamper Detection Solution for RFID Tags , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[12]  Carlo Maria Medaglia,et al.  An Overview of Privacy and Security Issues in the Internet of Things , 2010 .

[13]  Jessica J. Fridrich,et al.  Forensic steganalysis: determining the stego key in spatial domain steganography , 2005, IS&T/SPIE Electronic Imaging.

[14]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[15]  Jessica J. Fridrich,et al.  Writing on wet paper , 2005, IEEE Transactions on Signal Processing.

[16]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..

[17]  Li Shi-qu,et al.  Information-theoretic analysis for the difficulty of extracting hidden information , 2008, Wuhan University Journal of Natural Sciences.

[18]  Jessica J. Fridrich,et al.  Searching for the stego-key , 2004, IS&T/SPIE Electronic Imaging.

[19]  Yunkai Gao,et al.  Employing Optimal Matrix for Efficient Matrix Embedding , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.