The square root law requires a linear key

We extend the square root law of steganographic capacity, for the simplest case of iid covers, in two ways. First, we show that the law still holds under a more realistic embedding assumption, where the payload is of fixed length (instead of, in the classic result, independent embedding at each location). Second, we consider the case of nonuniform embedding paths, which is forced when the stegosystem's secret key is of limited size: we show that the secret key must be of length at least linear in the payload size, if a square root law is to hold. The latter is parallel to Shannon's perfect cryptography bound.

[1]  Andrew D. Ker Estimating Steganographic Fisher Information in Real Images , 2009, Information Hiding.

[2]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[3]  Jessica J. Fridrich,et al.  Searching for the stego-key , 2004, IS&T/SPIE Electronic Imaging.

[4]  Andrew D. Ker A Capacity Result for Batch Steganography , 2007, IEEE Signal Processing Letters.

[5]  W. Hoeffding Probability Inequalities for sums of Bounded Random Variables , 1963 .

[6]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[7]  Andrew D. Ker Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.

[8]  Andrew D. Ker Locating steganographic payload via ws residuals , 2008, MM&Sec '08.

[9]  Andrew D. Ker Steganographic strategies for a square distortion function , 2008, Electronic Imaging.

[10]  Andrew D. Ker,et al.  Feature reduction and payload location with WAM steganalysis , 2009, Electronic Imaging.

[11]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[12]  Jessica J. Fridrich,et al.  Matrix embedding for large payloads , 2006, IEEE Trans. Inf. Forensics Secur..

[13]  Jessica J. Fridrich,et al.  The square root law of steganographic capacity for Markov covers , 2009, Electronic Imaging.

[14]  C. Fontaine,et al.  Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.

[15]  Jessica J. Fridrich,et al.  Complete characterization of perfectly secure stego-systems with mutually independent embedding operation , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[16]  Jessica J. Fridrich,et al.  Fisher Information Determines Capacity of ε-Secure Steganography , 2009, Information Hiding.