Chaotic iterations for steganography - Stego-security and chaos-security

In this paper is proposed a novel steganographic scheme based on chaotic iterations. This research work takes place into the information hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called “watermark-only attack”. Additionally, we prove that this scheme presents topological properties so that it is one of the firsts able to face, at least partially, an adversary when considering the others categories of attacks defined in the literature.

[1]  François Cayre,et al.  Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding , 2008, IEEE Transactions on Information Forensics and Security.

[2]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[3]  Gustavus J. Simmons,et al.  The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.

[4]  Stefan Katzenbeisser,et al.  Content-Aware Steganography: About Lazy Prisoners and Narrow-Minded Wardens , 2006, Information Hiding.

[5]  Thomas Mittelholzer,et al.  An Information-Theoretic Approach to Steganography and Watermarking , 1999, Information Hiding.

[6]  Garry Howell,et al.  An Introduction to Chaotic dynamical systems. 2nd Edition, by Robert L. Devaney , 1990 .

[7]  Mauro Barni,et al.  A general framework for robust watermarking security , 2003, Signal Process..

[8]  Jacques M. Bahi,et al.  A chaos-based approach for information hiding security , 2010, ArXiv.

[9]  C. Fontaine,et al.  Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.

[10]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[11]  Fernando Pérez-González,et al.  Secret dither estimation in lattice-quantization data hiding: a set membership approach , 2006, Electronic Imaging.

[12]  Jana Dittmann,et al.  Malicious attacks on media authentication schemes based on invertible watermarks , 2004, IS&T/SPIE Electronic Imaging.

[13]  Christophe Guyeux,et al.  A new chaos-based watermarking algorithm , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).

[14]  J. Banks,et al.  On Devaney's definition of chaos , 1992 .

[15]  Shujun Li,et al.  Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding , 2001, IMACC.

[16]  Ton Kalker,et al.  Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[17]  Jacques M. Bahi,et al.  Chaotic Iterations versus Spread-Spectrum: Chaos and Stego Security , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[18]  Andrew D. Ker Batch Steganography and Pooled Steganalysis , 2006, Information Hiding.

[19]  M. Bernhard Introduction to Chaotic Dynamical Systems , 1992 .

[20]  Josep Domingo-Ferrer,et al.  On Overlappings of Digitized Straight Lines and Shared Steganographic File Systems , 2008, Trans. Data Priv..

[21]  Josep Domingo-Ferrer,et al.  A Shared Steganographic File System with Error Correction , 2008, MDAI.