2004
DOI: 10.1016/j.ic.2004.02.003
|View full text |Cite
|
Sign up to set email alerts
|

An information-theoretic model for steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
405
0
10

Year Published

2005
2005
2017
2017

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 399 publications
(416 citation statements)
references
References 3 publications
1
405
0
10
Order By: Relevance
“…The notion of ǫ-security proposed by Cachin [21] states that a steganographic scheme is ǫ-secure if the Kullback-Leibler divergence between the cover and the stego signal distributions is less than a small number ǫ. This definition inherently assumes that cover signals can be described by "natural" distributions, which are known to the steganalyst.…”
Section: Resisting Blind Steganalysismentioning
confidence: 99%
“…The notion of ǫ-security proposed by Cachin [21] states that a steganographic scheme is ǫ-secure if the Kullback-Leibler divergence between the cover and the stego signal distributions is less than a small number ǫ. This definition inherently assumes that cover signals can be described by "natural" distributions, which are known to the steganalyst.…”
Section: Resisting Blind Steganalysismentioning
confidence: 99%
“…Cachin [4] presented an information-theoretic model for steganography, which was the first to explicitly require that the stegotext distribution is indistinguishable from the covertext distribution to an adversary. Since the model is unconditional, a statistical information measure is used.…”
Section: Discussionmentioning
confidence: 99%
“…Several information-theoretic formalizations [4,24,15] and one complexity-theoretic model [12] have addressed private-key steganography, where the participants share a common secret key. These models are all limited to a passive adversary, however, who can only read messages on the channel.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Program obfuscation was formalized and shown to be impossible in general [19], but subsequently some progress has been made in limited cases [20,21]. Steganography, in contrast, was formalized and shown to be possible, but at limited rates [22,23,24]. Surprisingly, formal definitions for watermarking security have only recently appeared in the literature.…”
Section: Introductionmentioning
confidence: 99%