2005
DOI: 10.1007/978-3-540-30576-7_12
|View full text |Cite
|
Sign up to set email alerts
|

Public-Key Steganography with Active Attacks

Abstract: Abstract.A complexity-theoretic model for public-key steganography with active attacks is introduced. The notion of steganographic security against adaptive chosen-covertext attacks (SS-CCA) and a relaxation called steganographic security against publicly-detectable replayable adaptive chosen-covertext attacks (SS-PDR-CCA) are formalized. These notions are closely related to CCA-security and PDR-CCA-security for public-key cryptosystems. In particular, it is shown that any SS-(PDR-)CCA stegosystem is a (PDR-)C… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
62
0

Year Published

2005
2005
2017
2017

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 57 publications
(62 citation statements)
references
References 23 publications
0
62
0
Order By: Relevance
“…A common approach to realize public-key stegosystems is the "encrypt-then-embed" paradigm [4,28,29,44], depicted in Fig. 2.…”
Section: Channelsmentioning
confidence: 99%
See 2 more Smart Citations
“…A common approach to realize public-key stegosystems is the "encrypt-then-embed" paradigm [4,28,29,44], depicted in Fig. 2.…”
Section: Channelsmentioning
confidence: 99%
“…As shown in [4,44], if the channel is always informative, H is a strongly universal hash function, and c is uniformly random, then the maximum statistical distance between s 1 ← Sample(λ, h, H, c) and s 2 ← C |c| h for any valid h ∈ Σ * is negligible in the security parameter λ. For simplicity, we denote this statistical distance when |c| = 1 by 1 in the reminder of the paper.…”
Section: A Bs-cha-secure Constructionmentioning
confidence: 99%
See 1 more Smart Citation
“…Modern cryptography already uses established formal models and definitions for information-theoretic and computational security. Inspired by cryptographic methodology similar approaches have been proposed for steganography [1,2,3,4]. In contrast, less investigation has been done with this regard for watermarking schemes, and the existing approaches do not cover the subtle aspects essential for reasonable formal security definitions, analysis and abstraction of watermarking schemes.…”
Section: Motivationmentioning
confidence: 99%
“…2 Due to the fundamental difference between steganography and digital watermarking, one cannot simply adapt recent definitions of steganographic security [3,4].…”
Section: Motivationmentioning
confidence: 99%