4 February 2009 Protocols for data hiding in pseudo-random state
Author Affiliations +
An emerging form of steganographic communication uses ciphertext to replace the output of a random or strong pseudo-random number generator. PRNG-driven media, for example computer animated backdrops in video-conferencing channels, can then be used as a covert channel, if the PRNG bits that generated a piece of content can be estimated by the recipient. However, all bits sent over such a channel must be computationally indistinguishable from i.i.d. coin flips. Ciphertext messages and even key exchange datagrams are easily shaped to match this distribution; however, when placing these messages into a continous stream of PRNG bits, the sender is unable to provide synchronization markers, metadata, or error correction to ensure the message's location and proper decoding. In this paper we explore methods for message transmission and steganographic key exchange in such a "coin flip" channel. We establish that key exchange is generally not possible in this channel if an adversary possesses even a modest noise budget. If the warden is not vigilant in adding noise, however, communication is very simple.
© (2009) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Scott Craver, Scott Craver, Enping Li, Enping Li, Jun Yu, Jun Yu, } "Protocols for data hiding in pseudo-random state", Proc. SPIE 7254, Media Forensics and Security, 72540W (4 February 2009); doi: 10.1117/12.806254; https://doi.org/10.1117/12.806254


Mathematical approach to steganalysis
Proceedings of SPIE (April 28 2002)
Unitary embedding for data hiding with the SVD
Proceedings of SPIE (March 20 2005)
Links between cryptography and information hiding
Proceedings of SPIE (April 28 2002)

Back to Top