Translator Disclaimer
Paper
29 April 2002 Applied public-key steganography
Author Affiliations +
Proceedings Volume 4675, Security and Watermarking of Multimedia Contents IV; (2002) https://doi.org/10.1117/12.465294
Event: Electronic Imaging, 2002, San Jose, California, United States
Abstract
We consider the problem of hiding information in a steganographic framework, i.e. embedding a binary message within an apparently innocuous content, in order to establish a suspicion-free digital communication channel. The adversary is passive as no intentional attack is foreseen. The only threat is that she discovers the presence of a hidden communication. The main goal of this article is to find if the Scalar Costa Scheme, a recently published embedding method exploiting side information at the encoder, is suitable for that framework. We justify its use assessing its security level with respect to the Cachin's criterion. We derive a public-key stego-system following the ideas of R. Anderson and P. Petitcolas. This technique is eventually applied to PCM audio contents. Experimental performances are detailed in terms of bit-rate and Kullback-Leibler distance.
© (2002) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Pierre Guillon, Teddy Furon, and Pierre Duhamel "Applied public-key steganography", Proc. SPIE 4675, Security and Watermarking of Multimedia Contents IV, (29 April 2002); https://doi.org/10.1117/12.465294
PROCEEDINGS
12 PAGES


SHARE
Advertisement
Advertisement
RELATED CONTENT

TCQ-based quantizer design for data hiding in images
Proceedings of SPIE (March 21 2005)
Steganalysis of block-structured stegotext
Proceedings of SPIE (June 22 2004)
Writing on wet paper
Proceedings of SPIE (March 21 2005)

Back to Top