New results on steganographic capacity

نویسندگان

  • Pierre Moulin
  • Ying Wang
چکیده

This paper extends recent results on steganographic capacity. We derive capacity expressions for perfectly-secure steganographic systems. The warden may be passive, or active using a memoryless attack channel, or active using an arbitrarily varying channel. Neither encoder nor decoder know which channel was selected by the warden. In some cases, the steganographic constraint does not result in any capacity loss. To achieve steganographic capacity, encoder and decoder generally need to share a secret codebook.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A High Quality Steganographic Method Using Morphing

A new morphed steganographic algorithm is proposed in this paper. Image security is a challenging problem these days. Steganography is a method of hiding secret data in cover media. The Least Significant Bit is a standard Steganographic method that has some limitations. The limitations are less capacity to hide data, poor stego image quality, and imperceptibility. The proposed algorithm focuses...

متن کامل

Capacity of the Additive Steganographic Channel Edics: 3-comm

Many digital steganographic systems employ the capacity of an additive white Gaussian noise (WGN) channel as a performance metric. We present results that show that this capacity metric understates the capacity potential of these systems and propose a more accurate measure based on the arbitrary noise channel. This measure is compared to the capacity of the additive WGN channel and the performa...

متن کامل

A New Steganographic Algorithm Based on Multi Directional PVD and Modified LSB

Steganographic techniques can be utilized to conceal data within digital images with small or invisible changes in the perceived appearance of the image. Generally, five main objectives are used to assess the performance of steganographic algorithms which include embedding capacity, imperceptibility, security, robustness and complexity. However, steganographic algorithms hardly take all of thes...

متن کامل

Efficient Public Key Steganography Secure Against Adaptive Chosen Stegotext Attacks

We provide construction of steganographic schemes secure against adaptive chosen stegotext attacks. Our constructions achieve embedding rate equals to the Shannon entropy bound on steganographic channel capacity. Further the covertext distribution can be given as either an integrable probability function or as a random covertext sampler. We also introduce steganographic codes that are of intere...

متن کامل

An Adaptive JPEG Steganographic Scheme Based on the Block Entropy of DCT Coefficients

Minimizing the embedding impact is a practically feasible philosophy in designing steganographic systems. The development of steganographic systems can be formulated as the construction of distortion profile reflecting the embedding impact and the design of syndrome coding based on a certain code. The authors devise a new distortion profile exploring both the block complexity and the distortion...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004