Skip to main content

Information Transmission and Steganography

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3710))

Abstract

Recently there has been strong interest in developing models of steganography based on information theory. Previous work has considered under what conditions the security of the stegosystem can be guaranteed and the number of bits that can then be embedded in a cover Work. This work implicitly assumes that the hidden message is uncorrelated with the cover Work, the latter simply being used to conceal the hidden message. Here, we consider the case in which the cover Work is chosen such that it is correlated with the covert message. In this situation, the number of bits needed to encode the hidden message can be considerably reduced. We discuss the information that can then be transmitted and show that it is substantially greater than simply the number of embedded bits. We also note that the security of the system as defined by Cachin need not be compromised. However, the Shannon security may be compromised, but it remains unclear to what extent. Experimental results are presented that demonstrate the fundamental concepts.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Simmons, G.J.: The prisoner’s problem and the subliminal channel. In: Proc. of CRYPTO 1983, pp. 51–67 (1984)

    Google Scholar 

  2. Herodotus, The Histories, Penguin Books, London (1996); Translated by Aubrey de Sélincourt

    Google Scholar 

  3. Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE J. of Selected Areas in Communications 16(4), 474–481 (1998)

    Article  Google Scholar 

  4. Shannon, C.E.: Communications theory of secrecy systems. Bell System technical Journal 28, 656–715 (1954)

    MathSciNet  Google Scholar 

  5. Anderson, R.J.: Stretching the limits of steganography. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 39–48. Springer, Heidelberg (1996)

    Google Scholar 

  6. Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  7. Sallee, P.: Model based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Slepian, D., Wolf, J.K.: Noiseless coding of correlated information sources. IEEE Trans. on Information Theory IT-19(4), 471–480 (1973)

    Article  MathSciNet  Google Scholar 

  9. Blahut, R.E.: Principles and Practice of Information theory. Addison-Wesley, Reading (1987)

    MATH  Google Scholar 

  10. MacKay, D.J.C.: Information Theory, Inference and Learning Algorithms. Cambridge University Press, Cambridge (2003)

    MATH  Google Scholar 

  11. Cox, I.J., Miller, M.L., McKellips, A.L.: Watermarking as communications with side information. Proc. IEEE 87, 1127–1141 (1999)

    Article  Google Scholar 

  12. Chou, J., Pradhan, S.S., Ramchandran, K.: On the duality between distributed source coding and data hiding. In: Proc. Thirty-third Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, October 1999, vol. 2, pp. 1503–1507 (1999)

    Google Scholar 

  13. Chen, B., Wornell, G.W.: An information-theoretic approach to the design of robust digital watermarking systems. In: Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, Phoenix, Arizona, USA, March 1999, vol. 4, pp. 2061–2064 (1999)

    Google Scholar 

  14. Miller, M.L., Doërr, G.J., Cox, I.J.: Dirty-paper trellis codes for watermarking. In: Proc. IEEE Int. Conf. on Image Processing, Rochester, New York, USA, September 2002, vol. 2, pp. 129–132 (2002)

    Google Scholar 

  15. Miller, M.L., Doërr, G.J., Cox, I.J.: Applying informed coding and embedding to design a robust high-capacity watermark. IEEE Trans. Image Processing 13, 792–807 (2004)

    Article  Google Scholar 

  16. Pradhan, S.S., Ramchandran, K.: Distributed source coding using syndromes (DISCUS): Design and construction. In: Proc. of the 1999 IEEE Data Compression Conference (1999)

    Google Scholar 

  17. Pradhan, S.S., Ramchandran, K.: Distributed source coding using syndromes (DISCUS): Design and construction, vol. 49, pp. 626–643 (2003)

    Google Scholar 

  18. Costa, M.: Writing on dirty paper. IEEE Trans. Inform. Theory 29, 439–441 (1983)

    Article  MATH  MathSciNet  Google Scholar 

  19. Heegard, C., El Gamal, A.: On the capacity of a computer memory with defects. IEEE Trans. on Information Theory 29 (1983)

    Google Scholar 

  20. Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography with wet paper codes. In: ACM Multimedia Workshop (2004)

    Google Scholar 

  21. Chan, C.-K., Cheng, L.M., Leung, K.-C., Li, S.-L.: Image hiding based on block difference. In: 8th Int. Conf. on Control, Automation, Robotics and Vision (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cox, I.J., Kalker, T., Pakura, G., Scheel, M. (2005). Information Transmission and Steganography. In: Barni, M., Cox, I., Kalker, T., Kim, HJ. (eds) Digital Watermarking. IWDW 2005. Lecture Notes in Computer Science, vol 3710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11551492_2

Download citation

  • DOI: https://doi.org/10.1007/11551492_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28768-1

  • Online ISBN: 978-3-540-32052-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics