doi:

DOI: 10.3724/SP.J.1146.2009.00142

Journal of Electronics & Information Technology (电子与信息学报) 2010/32:2 PP.439-443

The Study of Security in Steganography Based on K-L Divergence


Abstract:
This paper presents a universality method for measure of security in steganography. According to the definition of K-L divergence and the properties of security in steganography, some limitations in Cachin’s definition of security are shown in the beginning. Besides the divergence of probability distributions between stego and cover, the sample size and the cardinality of the state set of random variable have great effect on security in steganography. Based on K-L divergence and hypothesis testing, an amended measure of security and a useful illation are presented. The result of examination can prove that the new measure of security is reasonable.

Key words:Steganography,Measure of security,K-L divergence,Sample size

ReleaseDate:2014-07-21 15:11:10



[1] 尤新刚, 周琳娜, 郭云彪. 信息隐藏学科的主要分支及术语[C]. CIHW2001, 西安, 2001: 43-50. You Xin-gang, Zhou Lin-na, and Guo Yun-biao. The main offshoots and terminology in information hiding [C]. CIHW2001, Xi'an, 2001: 43-50.

[2] Simmons G J. The prisoners’problem and the subliminal channel[C]. IEEE Workshop Communications Security CRYPTO, New York, 1983: 51-67.

[3] Ettinger J M. Steganalysis and game equilibria[C]. Information Hiding 1998, Oregon, USA, LNCS, 1998, 1525: 319-328.

[4] Mittelholzer T. An information-theoretic approach to steganography and watermarking[C]. Information Hiding, Dresden, Germany, LNCS, 1999, 1768: 1-16.

[5] Moulin P and O’Sullivan J A. Information-theoretic analysis of information hiding [J].IEEE Transactions on Information Theory, 2003, 49(3): 563-593.

[6] Cachin C. An information-theoretic model for steganography[C]. Information Hiding 1998, Oregon, USA, LNCS, 1998, 1525: 306-318.

[7] Chen B and Wornell G. Quantization index modulation: A class of provably good method watermarking and information embedding[J]. IEEE Transactions on Information Theory, 2001, 48(4): 1423-1443.

[8] Kim Y, Duric Z, and Richards D. Modified matrix encoding technique for minimal distortion steganography[C]. Information Hiding 2006, VA, USA, LNCS, 2006, 4437: 314-327.

[9] Fridrich J, Pevny T, and Kodovsky K. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities[C]. The 9th Workshop on Multimedia & Security, Dallas, Texas, USA, 2007: 3-14.

[10] Ker A. A capacity result for batch steganograph [J]. IEEE Signal Processing Letters, 2007, 14(8): 525-528.

[11] Ker A, Pevny T, and Kodovsky J, et al. The square root law of steganographic capacity[C]. MM&Sec 08, Oxford, UK, 2008: 107-116.

[12] Pevny T and Fridrich J. Benchmarking for steganography[C]. Information Hiding 2008, Santa Barbara, CA, USA, 2008: 251-267.

[13] Leibler K. On information and sufficiency[J]. Annals of Mathematical Statistics, 1951, 22(1): 79-86.

[14] Pevny T and Fridrich J. Merging markov and DCT features for multi-class JPEG steganalysis[C]. Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, CA, 2007: 6505.