【24h】

On Security Notions for Steganalysis

机译:关于隐写分析的安全概念

获取原文
获取原文并翻译 | 示例

摘要

There have been some achievements in steganalysis recently. Many people have been making strides in steganalysis. They have approached steganalysis from different angles; from information theory to complexity theory. Anderson gave a possibility that there is a provable secure steganographic system, but there had not been complexity theoretical approaches for years. In 2002, Katzenbeisser and Petitcolas defined the conditional security of steganography and gave a possibility for a practical, provable secure steganography for the first time, and Hopper et al. introduced a provable secure steganographic algorithm in the sense of complexity theory. Chang et al. also tried to define the complexity theoretical security and showed a practical, provable secure algorithm. Chang et al. presented chose-input attack model in a view of pseudopro-cessingness for a steganographic system. In this paper, we try to improve this notion in detail. So we define chosen-cover attack model and chosen-message attack model. Moreover, we present the relation between them.
机译:最近,隐写分析取得了一些成就。许多人在隐写分析方面取得了长足的进步。他们从不同角度进行了隐写分析。从信息论到复杂论。安德森(Anderson)给出了一个可证明的安全隐写系统的可能性,但是多年来没有复杂的理论方法。在2002年,Katzenbeisser和Petitcolas定义了隐写术的条件安全性,并首次为实用,可证明的安全隐写术提供了可能性。从复杂性理论的角度介绍了一种可证明的安全隐写算法。 Chang等。还试图定义复杂性的理论安全性,并展示了一种实用的,可证明的安全算法。 Chang等。鉴于隐写系统的伪处理,提出了选择输入攻击模型。在本文中,我们尝试详细改进此概念。因此,我们定义了选择覆盖攻击模型和选择消息攻击模型。此外,我们介绍了它们之间的关系。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号