<title>Steganalysis of block-structured stegotext</title>
2004, Security, Steganography, and Watermarking of Multimedia Contents VI
https://doi.org/10.1117/12.527745Abstract
We study a detection-theoretic approach to steganalysis. The relative entropy between covertext and stegotext determines the steganalyzer's difficulty in discriminating them, which in turn defines the detectability of the stegosystem. We consider the case of Gaussian random covertexts and mean-squared embedding constraint. We derive a lower bound on the relative entropy between covertext and stegotext for block-based embedding functions. This lower bound can be approached arbitrarily closely using a spread-spectrum method and secret keys with large entropy. The lower bound can also be attained using a stochastic quantization index modulation (QIM) encoder, without need for secret keys. In general, perfect undetectability can be achieved for blockwise memoryless Gaussian covertexts. For general Gaussian covertexts with memory, the relative entropy increases approximately linearly with the number of blocks observed by the steganalyzer. The error probabilities of the best steganalysis methods decrease exponentially with the number of blocks.
References (13)
- N. F. Johnson, Z. Duric and S. Jajodia, Information hiding: Steganography and watermarking-Attacks and countermeasures, Kluwer Academic Publishers, Boston, 2000.
- G. J. Simmons, "The Prisoners' problem and the subliminal channel," in D. Chaum (Ed.): Advances in Cryptology: Proceedings of Crypto 83, pp. 51-67, Plenum Press, 1984.
- C. Cachin, " An information-theoretic model for steganography", in D. Aucsmith (Ed.): Information Hiding, 2nd International Workshop, vol. 1525 of Lectures Notes in Computer Science, pp. 306-318. Springer, 1998.
- R. E. Blahut, Principles and practice of information theory, Reading: Addison-Wesley, 1987.
- H. V. Poor, An introduction to signal detection and estimation, Springer-Verlag, New York, 1994.
- B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding", IEEE Trans. on Info. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
- M. Kesal, K. M. Mıhçak, R. Kötter and P. Moulin, "Iteratively Decodable Codes for Watermarking Appli- cations," in Proc. 2nd Symposium on Turbo Codes and Related Topics, Brest, France, Sep. 2000.
- P. Guillon, T. Furon and P. Duhamel, " Applied public-key steganography", in Proc. of SPIE, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, vol. 4675, San Jose, CA, USA, Jan. 2002.
- R. Zamir, S. Shamai (Shitz), and U. Erez, "Nested Linear/Lattice Codes for Structured Multiterminal Bin- ning," IEEE Trans. on Information Theory, vol. 48, no. 6, pp. 1250-1276, June 2002.
- U. Erez and R. Zamir, "Achieving 1 2 log(1 + SN R) on the AWGN Channel with Lattice Encoding and Decoding," preprint, May 2001; revised, Sep. 2003.
- G. D. Forney, Jr., "On the Role of MMSE Estimation in Approaching the Information-Theoretic Limits of Linear Gaussian Channels: Shannon Meets Wiener," Proc. Allerton Conf., Monticello, IL, Oct. 2003.
- Y. Wang and P. Moulin, "New results on steganographic capacity", preprint, 2003.
- J. Fridrich, M. Goljan and R. Du, "Detecting LSB steganography in color and gray-scale images", IEEE Multimedia, vol. 8, no. 4 , pp. 22-28, Oct.-Dec. 2001.