Skip to main content

On the Existence of Perfect Stegosystems

  • Conference paper
Digital Watermarking (IWDW 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3710))

Included in the following conference series:

Abstract

There are several steganography techniques (e.g. linguistic or least significant bit embedding) that provide security but no robustness against an active adversary. On the other hand it is rather well known that the spread-spectrum based technique is robust against an active adversary but it seems to be insecure against a statistical detection of stegosignal. We prove in this paper that actually this is not the case and that there exists an stegosystem that is asymptotically both secure to statistical detection and robust against a jamming of stegosignal by an active adversary. We call such stegosystems quasiperfect whereas we call them perfect if in addition the data rate of secret information is asymptotically constant. We prove that perfect stegosystems do not exist for both blind and informed decoders. Some examples using the simplex and the Reed-Muller codes jointly with stegosystems are given.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  2. Bolshakov, S.: A method of linguistic steganography based on collocation-proven synonymy. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 13–23. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  3. Damitrescu, S., Wu, X., Wang, Z.: Detection of LSB steganography via sample pair analysis. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 355–372. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  4. Malvar, H.S., Florencio, D.: Improved spread spectrum: A new modulation technique for robust watermarking. IEEE Transaction on Signal Processing 51, 898–905 (2003)

    Article  MathSciNet  Google Scholar 

  5. Cover, T., Thomas, J.: Elements of Information Theory. John Wiley and Sons, Inc., Chichester (1991)

    Book  MATH  Google Scholar 

  6. Proakis, J.: Digital Communications, 4th edn. McGraw Hill, New York (2001)

    Google Scholar 

  7. MacWilliams, F., Sloan, N.: The Theory of Error Correcting Codes. Bell Labs. (1991)

    Google Scholar 

  8. Korjik, V., Morales-Luna, G.: Information hiding through noisy channels. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 42–50. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Korzhik, V., Morales-Luna, G., Lee, M.H. (2005). On the Existence of Perfect Stegosystems. In: Barni, M., Cox, I., Kalker, T., Kim, HJ. (eds) Digital Watermarking. IWDW 2005. Lecture Notes in Computer Science, vol 3710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11551492_3

Download citation

  • DOI: https://doi.org/10.1007/11551492_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28768-1

  • Online ISBN: 978-3-540-32052-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics