de
en
Schliessen
Detailsuche
Bibliotheken
Projekt
Impressum
Datenschutz
zum Inhalt
Detailsuche
Schnellsuche:
OK
Ergebnisliste
Titel
Titel
Inhalt
Inhalt
Seite
Seite
Im Dokument suchen
Schöttle, Pascal: The role of side information in steganography. 2016
Inhalt
Contents
List of Figures
List of Tables
List of Acronyms
List of Symbols
1 Introduction
1.1 Background, Motivation, and Scope
1.2 Outline and Contribution
1.3 Notation
2 Preliminaries
2.1 Principles of Steganography
2.1.1 Set-Up of a Steganographic System
2.1.2 Embedding Operations
2.1.2.1 LSB Replacement
2.1.2.2 LSB Matching
2.1.3 Embedding Strategies
2.1.3.1 (Initial) Sequential Embedding
2.1.3.2 Random Uniform Embedding
2.1.3.3 Side-Informed Embedding
2.2 Security in Steganographic Systems
2.2.1 The Prisoners' Problem
2.2.2 Theoretical Security Notions
2.2.2.1 Information-Theoretic Approach
2.2.2.2 Complexity-Theoretic Approach
2.2.3 Empirical Security Notions
2.2.3.1 Receiver Operating Characteristic
2.2.3.2 Single Number Measures
2.3 Summary
3 Exploiting Side Information in Steganalysis
3.1 Side Information in Steganalysis
3.1.1 Steganographic Side Information and Uncertainty
3.1.1.1 Steganographic Side Information
3.1.1.2 Uncertainty
3.1.1.3 Common Use of Side Information in Steganography
3.1.2 Initial Evidence
3.1.2.1 Targeted Attack on PSP Steganography
3.1.2.2 The Detectability Profile
3.1.3 Formalizing Adaptive Steganography and Steganalysis
3.2 Powerful Steganalysis of LSB Replacement
3.2.1 Asymptotically Uniformly Most Powerful Test
3.2.2 Weighted Stego-Image Steganalysis
3.2.2.1 WS Steganalysis for Sequential Embedding
3.2.2.2 WS Steganalysis for Naïve Adaptive Embedding
3.3 A Targeted Attack on Naïve Adaptive Embedding
3.3.1 Overview of Adaptivity Criteria
3.3.2 Data and Set-up
3.3.3 Evaluation Strategy
3.3.4 Attacked Adaptivity Criteria
3.3.4.1 Local Variance
3.3.4.2 Edges
3.3.4.3 Texture
3.3.4.4 NUGO (Not so Undetectable steGO)
3.3.5 Recoverability of the Adaptivity Criteria
3.3.6 Empirical Results – Detecting Naïve Adaptive Embedding
3.4 Summary
4 Game Theory and Steganography
4.1 Motivation
4.2 Principles of Game Theory
4.2.1 Basic Definitions of Game Theory
4.2.2 Solution Concepts
4.2.2.1 Dominant Strategy Equilibrium
4.2.2.2 Nash Equilibrium
4.2.2.3 Maxmin and Minmax Strategy
4.2.2.4 Equalizer Strategies
4.3 Game-Theoretical Approaches in Steganography
4.3.1 Game Theory and Capacity
4.3.2 Game Theory and Batch Steganography
4.3.3 Game Theory and Detection Performance
4.3.4 Game Theory and Adaptive LSB Matching
4.4 The Game-Theoretical Framework
4.4.1 Basic Definitions
4.4.2 Set-Up and Knowledge
4.4.3 Strategies
4.5 Summary
5 Game-Theoretic Insights
5.1 Cover Models with Binary Embedding Positions
5.1.1 Restricted Steganalyst Model
5.1.1.1 Strategies
5.1.1.2 Payoff
5.1.1.3 Solving the Game
5.1.1.4 Numerical Illustration
5.1.2 Powerful Steganalyst and Fixed Net Embedding
5.1.2.1 Strategies
5.1.2.2 Embedding Impact
5.1.2.3 Payoff
5.1.2.4 Solving the Game
5.1.2.5 Solution and Numerical Illustration for n=2 and k=1
5.1.3 Powerful Steganalyst and Independent Embedding
5.1.3.1 Strategies
5.1.3.2 Embedding Impact
5.1.3.3 Payoff
5.1.3.4 Solving the Game
5.1.3.5 Solution and Numerical Illustration for n=2 and k=1
5.1.4 Summary
5.2 Cover Models with Two Embedding Positions
5.2.1 Linear Increasing PMF
5.2.1.1 Cover Generation
5.2.1.2 Embedding Impact
5.2.1.3 Eve's Decision: Optimal Local Detector
5.2.1.4 Error Rates and Payoff
5.2.1.5 Solving the Game
5.2.2 Constant Ratio PMF
5.2.2.1 Cover Generation and Justification
5.2.2.2 Embedding Impact
5.2.2.3 Heterogeneity
5.2.2.4 Eve's Decision: Optimal Local Detector
5.2.2.5 Error Rates and Payoff
5.2.2.6 Solving the Game
5.2.3 Imperfect Recoverability
5.2.3.1 Imperfect Recovery with Linear Increasing PMF
5.2.3.2 Imperfect Recovery with Constant Ratio PMF
5.2.4 Numerical Illustrations
5.2.4.1 Numerical Illustration for Linear Increasing PMF
5.2.4.2 Numerical Illustration for Constant Ratio PMF
5.2.4.3 Comparison
5.2.5 Type of Game
5.2.6 Discussion and Summary
5.3 Lessons Learned and Limitations
5.3.1 Lessons Learned – Secure Adaptive Steganography
5.3.2 Limitations
6 Conclusion
6.1 Summary of Results
6.1.1 Formalizing Side Information in Steganography
6.1.2 Game-Theoretical Modeling of Steganography
6.2 Outlook and Future Research
Bibliography
A Information-Theoretic Derivations
A.1 Derivation of Definition 3.2
A.2 Derivation of Remark 3.9
B Game Theory in Related Fields
B.1 Multimedia Forensics
B.2 Digital Watermarking
B.3 Adversarial Classification
C Omitted Proofs
C.1 Proof of Lemma 5.11
C.2 Proof of Lemma 5.12
C.3 Proof of Lemma 5.13
C.4 Proof of Lemma 5.14
C.5 Proof of Lemma 5.15
D Curriculum Vitae