skip to main content
10.1145/2037252.2037268acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

A square-root law for active wardens

Published:29 September 2011Publication History

ABSTRACT

The Square Root Law of Ker, Filler and Fridrich establishes asymptotic capacity limits for steganographic communication, caused by the watchful eye of a passive warden. We exhibit a separate fundamental limit of steganographic communication caused by a second phenomenon, the noise inflicted by an active warden. When a steganographic channel is not protected by a secret key, for example when it is used for key exchange, the number of errors needed to derail the channel grows no faster than the square root of the cover length. This means that contrary to intuition, embedding a message across a larger cover makes transmission less robust. This result is so pessimistic that it applies even to the transmission of a single datagram, a message of constant length, within a cover stream of arbitrary size. It is also true if the warden is forced by channel constraints to inflict noise randomly instead of surgically.

While this law does not apply when the sender and receiver share a key in advance, ultimately this result implies that an active warden can indefinitely postpone the initial handshake of steganographic communication with a vanishingly small error rate. It also causes us to question whether the notion of a supraliminal channel is physically realizable, as even very highly robust communications channels become increasingly vulnerable for larger covers.

References

  1. S. Craver, E. Li, and J. Yu. Protocols for data hiding in pseudo-random state. In Media Forensics and Security, page 72540, 2009.Google ScholarGoogle Scholar
  2. S. Craver, E. Li, J. Yu, and I. Atakli. Information hiding. chapter A Supraliminal Channel in a Videoconferencing Application, pages 283--293. Springer-Verlag, Berlin, Heidelberg, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. T. Filler, A. D. Ker, and J. J. Fridrich. The square root law of steganographic capacity for markov covers. In Media Forensics and Security, page 725408, 2009.Google ScholarGoogle Scholar
  4. N. L. Johnson and S. Kotz. Continuous univariate distributions--l. In International Symposium on Mobile Agents, 1970.Google ScholarGoogle Scholar
  5. E. Li and S. Craver. A supraliminal channel in a wireless phone application. In Proceedings of the 11th ACM workshop on Multimedia and security, MM&Sec '09, pages 151--154, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. G. J. Simmons. The history of subliminal channels. In Proceedings of the First International Workshop on Information Hiding, pages 237--256, London, UK, 1996. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A square-root law for active wardens

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MM&Sec '11: Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
      September 2011
      140 pages
      ISBN:9781450308069
      DOI:10.1145/2037252

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 29 September 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate128of318submissions,40%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader