The Square Root Law in Stegosystems with Imperfect Information

Theoretical results about the capacity of stegosystems typically assume that one or both of the adversaries has perfect knowledge of the cover source. So-called perfect steganography is possible if the embedder has this perfect knowledge, and the Square Root Law of capacity applies when the embedder has imperfect knowledge but the detector has perfect knowledge. The epistemology of stegosystems is underdeveloped and these assumptions are sometimes unstated. In this work we consider stegosystems where the detector has imperfect information about the cover source: once the problem is suitably formalized, we show a parallel to the Square Root Law. This answers a question raised by Bohme.

[1]  Jana Dittmann,et al.  Proceedings of the 10th ACM workshop on Multimedia and security , 2008 .

[2]  Andrew D. Ker Estimating Steganographic Fisher Information in Real Images , 2009, Information Hiding.

[3]  John Langford,et al.  Provably secure steganography: (Extended abstract) , 2002, CRYPTO 2002.

[4]  Tomás Pevný,et al.  The square root law of steganographic capacity , 2008, MM&Sec '08.

[5]  Rainer Böhme,et al.  Improved statistical steganalysis using models of heterogeneous cover signals , 2009 .

[6]  E. Lehmann Testing Statistical Hypotheses , 1960 .

[7]  Andrew D. Ker The square root law requires a linear key , 2009, MM&Sec '09.

[8]  Jessica J. Fridrich,et al.  On Steganographic Embedding Efficiency , 2006, Information Hiding.

[9]  S. Ravi Testing Statistical Hypotheses, 3rd edn by E. L. Lehmann and J. P. Romano , 2007 .

[10]  Andrew D. Ker THE UNIFORM PRIOR AND ZERO INFORMATION : A TECHNICAL NOTE , 2010 .

[11]  Edward J. Delp,et al.  Communications approach to image steganography , 2002, IS&T/SPIE Electronic Imaging.

[12]  John Langford,et al.  Provably Secure Steganography , 2002, IEEE Transactions on Computers.

[13]  Rainer Böhme,et al.  An Epistemological Approach to Steganography , 2009, Information Hiding.

[14]  Moti Yung,et al.  Advances in Cryptology — CRYPTO 2002 , 2002, Lecture Notes in Computer Science.

[15]  Ronald L. Graham,et al.  Concrete Mathematics, a Foundation for Computer Science , 1991, The Mathematical Gazette.

[16]  Phil Sallee,et al.  Model-Based Methods For Steganography And Steganalysis , 2005, Int. J. Image Graph..

[17]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[18]  Jessica J. Fridrich,et al.  The square root law of steganographic capacity for Markov covers , 2009, Electronic Imaging.

[19]  Andrew D. Ker The square root law does not require a linear key , 2010, MM&Sec '10.

[20]  Jessica J. Fridrich,et al.  Fisher Information Determines Capacity of ε-Secure Steganography , 2009, Information Hiding.

[21]  Stefan Katzenbeisser,et al.  Defining security in steganographic systems , 2002, IS&T/SPIE Electronic Imaging.

[22]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[23]  Ying Wang,et al.  Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions , 2007, IEEE Transactions on Information Theory.