Paper
4 February 2009 Protocols for data hiding in pseudo-random state
Author Affiliations +
Proceedings Volume 7254, Media Forensics and Security; 72540W (2009) https://doi.org/10.1117/12.806254
Event: IS&T/SPIE Electronic Imaging, 2009, San Jose, California, United States
Abstract
An emerging form of steganographic communication uses ciphertext to replace the output of a random or strong pseudo-random number generator. PRNG-driven media, for example computer animated backdrops in video-conferencing channels, can then be used as a covert channel, if the PRNG bits that generated a piece of content can be estimated by the recipient. However, all bits sent over such a channel must be computationally indistinguishable from i.i.d. coin flips. Ciphertext messages and even key exchange datagrams are easily shaped to match this distribution; however, when placing these messages into a continous stream of PRNG bits, the sender is unable to provide synchronization markers, metadata, or error correction to ensure the message's location and proper decoding. In this paper we explore methods for message transmission and steganographic key exchange in such a "coin flip" channel. We establish that key exchange is generally not possible in this channel if an adversary possesses even a modest noise budget. If the warden is not vigilant in adding noise, however, communication is very simple.
© (2009) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Scott Craver, Enping Li, and Jun Yu "Protocols for data hiding in pseudo-random state", Proc. SPIE 7254, Media Forensics and Security, 72540W (4 February 2009); https://doi.org/10.1117/12.806254
Lens.org Logo
CITATIONS
Cited by 3 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Berkelium

Data hiding

Error analysis

Evolutionary algorithms

Optical spheres

Symmetric-key encryption

Forward error correction

RELATED CONTENT

Mathematical approach to steganalysis
Proceedings of SPIE (April 29 2002)
Unitary embedding for data hiding with the SVD
Proceedings of SPIE (March 21 2005)
Links between cryptography and information hiding
Proceedings of SPIE (April 29 2002)

Back to Top