Abstract
Recently there has been strong interest in developing models of steganography based on information theory. Previous work has considered under what conditions the security of the stegosystem can be guaranteed and the number of bits that can then be embedded in a cover Work. This work implicitly assumes that the hidden message is uncorrelated with the cover Work, the latter simply being used to conceal the hidden message. Here, we consider the case in which the cover Work is chosen such that it is correlated with the covert message. In this situation, the number of bits needed to encode the hidden message can be considerably reduced. We discuss the information that can then be transmitted and show that it is substantially greater than simply the number of embedded bits. We also note that the security of the system as defined by Cachin need not be compromised. However, the Shannon security may be compromised, but it remains unclear to what extent. Experimental results are presented that demonstrate the fundamental concepts.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Simmons, G.J.: The prisoner’s problem and the subliminal channel. In: Proc. of CRYPTO 1983, pp. 51–67 (1984)
Herodotus, The Histories, Penguin Books, London (1996); Translated by Aubrey de Sélincourt
Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE J. of Selected Areas in Communications 16(4), 474–481 (1998)
Shannon, C.E.: Communications theory of secrecy systems. Bell System technical Journal 28, 656–715 (1954)
Anderson, R.J.: Stretching the limits of steganography. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 39–48. Springer, Heidelberg (1996)
Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)
Sallee, P.: Model based steganography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 154–167. Springer, Heidelberg (2004)
Slepian, D., Wolf, J.K.: Noiseless coding of correlated information sources. IEEE Trans. on Information Theory IT-19(4), 471–480 (1973)
Blahut, R.E.: Principles and Practice of Information theory. Addison-Wesley, Reading (1987)
MacKay, D.J.C.: Information Theory, Inference and Learning Algorithms. Cambridge University Press, Cambridge (2003)
Cox, I.J., Miller, M.L., McKellips, A.L.: Watermarking as communications with side information. Proc. IEEE 87, 1127–1141 (1999)
Chou, J., Pradhan, S.S., Ramchandran, K.: On the duality between distributed source coding and data hiding. In: Proc. Thirty-third Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, USA, October 1999, vol. 2, pp. 1503–1507 (1999)
Chen, B., Wornell, G.W.: An information-theoretic approach to the design of robust digital watermarking systems. In: Proc. IEEE Int. Conf. on Acoustics, Speech, and Signal Processing, Phoenix, Arizona, USA, March 1999, vol. 4, pp. 2061–2064 (1999)
Miller, M.L., Doërr, G.J., Cox, I.J.: Dirty-paper trellis codes for watermarking. In: Proc. IEEE Int. Conf. on Image Processing, Rochester, New York, USA, September 2002, vol. 2, pp. 129–132 (2002)
Miller, M.L., Doërr, G.J., Cox, I.J.: Applying informed coding and embedding to design a robust high-capacity watermark. IEEE Trans. Image Processing 13, 792–807 (2004)
Pradhan, S.S., Ramchandran, K.: Distributed source coding using syndromes (DISCUS): Design and construction. In: Proc. of the 1999 IEEE Data Compression Conference (1999)
Pradhan, S.S., Ramchandran, K.: Distributed source coding using syndromes (DISCUS): Design and construction, vol. 49, pp. 626–643 (2003)
Costa, M.: Writing on dirty paper. IEEE Trans. Inform. Theory 29, 439–441 (1983)
Heegard, C., El Gamal, A.: On the capacity of a computer memory with defects. IEEE Trans. on Information Theory 29 (1983)
Fridrich, J., Goljan, M., Soukal, D.: Perturbed quantization steganography with wet paper codes. In: ACM Multimedia Workshop (2004)
Chan, C.-K., Cheng, L.M., Leung, K.-C., Li, S.-L.: Image hiding based on block difference. In: 8th Int. Conf. on Control, Automation, Robotics and Vision (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cox, I.J., Kalker, T., Pakura, G., Scheel, M. (2005). Information Transmission and Steganography. In: Barni, M., Cox, I., Kalker, T., Kim, HJ. (eds) Digital Watermarking. IWDW 2005. Lecture Notes in Computer Science, vol 3710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11551492_2
Download citation
DOI: https://doi.org/10.1007/11551492_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28768-1
Online ISBN: 978-3-540-32052-4
eBook Packages: Computer ScienceComputer Science (R0)