Steganography Security: Principle and Practice

06/10/2018
by   Yan Ke, et al.
0

This paper focuses on several theoretical issues and principles in steganography security, and defines four security levels by analyzing corresponding algorithm instances. In the theoretical analysis, we discuss the differences between steganography security and watermarking security. The two necessary conditions for the steganography security are obtained. Then under the current technology situation, we analyze the indistinguishability of the cover and stego-cover, and consider that the steganography security should rely on the key secrecy with algorithms open. By specifying the security requirements of the keys, the role of Kerckhoffs' principle in steganography is emphasized. The necessary conditions for a secure steganography algorithm in theory are formally presented. When analyzing the security instances, we classify the steganalysis attacks according to their variable access to the steganography system, and then define the four security levels. The higher level security one has, the higher level attacks one can resist. We present algorithm instances based on current technical conditions, and analyze their data hiding process, security level, and practice requirements.

READ FULL TEXT
research
03/13/2023

The Realizations of Steganography in Encrypted Domain

With the popularization and application of privacy protection technologi...
research
07/18/2020

A Comprehensive Survey of Aadhar and Security Issues

The concept of Aadhaar came with the need for a unique identity for ever...
research
03/07/2019

A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL

Split manufacturing was introduced as an effective countermeasure agains...
research
08/01/2020

Achieving Covertness and Secrecy: A New Paradigm for Secure Wireless Communication

This paper explores a novel secure wireless communication paradigm where...
research
12/28/2018

A Precedent Approach to Assigning Access Rights

To design a discretionary access control policy, a technique is proposed...
research
12/20/2021

Forensic Issues and Techniques to Improve Security in SSD with Flex Capacity Feature

Over-provisioning technology is typically introduced as a means to impro...
research
03/09/2022

COMMAND: Certifiable Open Measurable Mandates

Security mandates today are often in the form of checklists and are gene...

Please sign up or login with your details

Forgot password? Click here to reset