Advanced Search
Volume 32 Issue 2
Aug.  2010
Turn off MathJax
Article Contents
Song Hui, Kong Xiang-wei, You Xin-gang. The Study of Security in Steganography Based on K-L Divergence[J]. Journal of Electronics & Information Technology, 2010, 32(2): 439-443. doi: 10.3724/SP.J.1146.2009.00142
Citation: Song Hui, Kong Xiang-wei, You Xin-gang. The Study of Security in Steganography Based on K-L Divergence[J]. Journal of Electronics & Information Technology, 2010, 32(2): 439-443. doi: 10.3724/SP.J.1146.2009.00142

The Study of Security in Steganography Based on K-L Divergence

doi: 10.3724/SP.J.1146.2009.00142
  • Received Date: 2009-02-04
  • Rev Recd Date: 2009-07-21
  • Publish Date: 2010-02-19
  • This paper presents a universality method for measure of security in steganography. According to the definition of K-L divergence and the properties of security in steganography, some limitations in Cachins definition of security are shown in the beginning. Besides the divergence of probability distributions between stego and cover, the sample size and the cardinality of the state set of random variable have great effect on security in steganography. Based on K-L divergence and hypothesis testing, an amended measure of security and a useful illation are presented. The result of examination can prove that the new measure of security is reasonable.
  • loading
  • 尤新刚, 周琳娜, 郭云彪. 信息隐藏学科的主要分支及术语[C]. CIHW2001, 西安, 2001: 43-50.[2]You Xin-gang.[J].Zhou Lin-na, and Guo Yun-biao. The main offshoots and terminology in information hiding [C]. CIHW2001, Xian.2001,:-[3]Simmons G J. The prisoners problem and the subliminal channel[C]. IEEE Workshop Communications Security CRYPTO, New York, 1983: 51-67.[4]Ettinger J M. Steganalysis and game equilibria[C][J].Information Hiding 1998, Oregon, USA, LNCS.1998, 1525:319-328[5]Mittelholzer T. An information-theoretic approach to steganography and watermarking[C]. Information Hiding, Dresden, Germany, LNCS, 1999, 1768: 1-16.[6]Moulin P and OSullivan J A. Information-theoretic analysis of information hiding [J].IEEE Transactions on Information Theory.2003, 49(3):563-593[7]Cachin C. An information-theoretic model for steganography[C][J].Information Hiding 1998, Oregon, USA, LNCS.1998, 1525:306-318[8]Chen B and Wornell G. Quantization index modulation: A class of provably good method watermarking and information embedding[J]. IEEE Transactions on Information Theory, 2001, 48(4): 1423-1443.[9]Kim Y, Duric Z, and Richards D. Modified matrix encoding technique for minimal distortion steganography[C]. Information Hiding 2006, VA, USA, LNCS, 2006, 4437: 314-327.[10]Fridrich J.[J].Pevny T, and Kodovsky K. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities[C]. The 9th Workshop on Multimedia Security, Dallas, Texas, USA.2007,:-[11]Ker A. A capacity result for batch steganograph [J].IEEE Signal Processing Letters.2007, 14(8):525-528[12]Ker A.[J].Pevny T, and Kodovsky J, et al.. The square root law of steganographic capacity[C]. MMSec 08, Oxford, UK.2008,:-Pevny T and Fridrich J. Benchmarking for steganography[C]. Information Hiding 2008, Santa Barbara, CA, USA, 2008: 251-267.[13]Leibler K. On information and sufficiency[J].Annals of Mathematical Statistics.1951, 22(1):79-86[14]Pevny T and Fridrich J. Merging markov and DCT features for multi-class JPEG steganalysis[C]. Security, Steganography and Watermarking of Multimedia Contents IX, San Jose, CA, 2007: 6505.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3275) PDF downloads(617) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return