Publication Type
Conference Proceeding Article
Version
acceptedVersion
Publication Date
12-2004
Abstract
There have been some achievements in steganalysis recently. Many people have been making strides in steganalysis. They have approached steganalysis from different angles; from information theory to complexity theory. Anderson gave a possibility that there is a provable secure steganographic system, but there had not been complexity theoretical approaches for years. In 2002, Katzenbeisser and Petitcolas defined the conditional security of steganography and gave a possibility for a practical, provable secure steganography for the first time, and Hopper et al. introduced a provable secure steganographic algorithm in the sense of complexity theory. Chang et al. also tried to define the complexity theoretical security and showed a practical, provable secure algorithm. Chang et al. presented chose-input attack model in a view of pseudoprocessingness for a steganographic system. In this paper, we try to improve this notion in detail. So we define chosen-cover attack model and chosen-message attack model. Moreover, we present the relation between them.
Keywords
steganography, steganalysis, pseudoprocessingness
Discipline
Information Security
Research Areas
Cybersecurity
Publication
Information Security and Cryptology ICISC 2004: 7th International Conference, Seoul, Korea, December 2-3: Revised Selected Papers
Volume
3506
First Page
440
Last Page
454
ISBN
9783540320838
Identifier
10.1007/11496618_32
Publisher
Springer
City or Country
Berlin
Citation
CHANG, Kisik; DENG, Robert H.; BAO, Feng; LEE, Sangjin; KIM, Hyungjun; and LIM, Jongin.
On Security Notions for Steganalysis. (2004). Information Security and Cryptology ICISC 2004: 7th International Conference, Seoul, Korea, December 2-3: Revised Selected Papers. 3506, 440-454.
Available at: https://ink.library.smu.edu.sg/sis_research/279
Copyright Owner and License
Authors
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
https://doi.org/10.1007/11496618_32