Steganographic key recovery for adaptive steganography under “known-message attacks”
Since the performance of STC (Syndrome-Trellis Codes) is approaching the theoretical optimum in minimizing embedded distortion, STC-based adaptive steganography has become the focus of forward improvement and the difficulty of reverse analysis of steganography algorithms. At present, the researches...
Gespeichert in:
Veröffentlicht in: | Multimedia tools and applications 2022-03, Vol.81 (8), p.10981-11004 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 11004 |
---|---|
container_issue | 8 |
container_start_page | 10981 |
container_title | Multimedia tools and applications |
container_volume | 81 |
creator | Du, Hansong Liu, Jiufen Tian, Yuguo Luo, Xiangyang |
description | Since the performance of STC (Syndrome-Trellis Codes) is approaching the theoretical optimum in minimizing embedded distortion, STC-based adaptive steganography has become the focus of forward improvement and the difficulty of reverse analysis of steganography algorithms. At present, the researches on secret message extraction from STC-based adaptive steganography are mainly focused on the scenario where the secret message is plaintext and part of the plaintext format information is known, while it needs to be studied when these characteristics are unknown. Analogous to the “known-plaintext attack” in cryptanalysis, this manuscript proposes a steganographic key recovery algorithm under the condition of “known-message attack”. Firstly, by studying the structure characteristics of STC parity-check matrix, the concept of basic row vector is proposed, and the problem of secret message extraction attack is transformed into the problem of solving the basic row vectors. Then, the existence of bit string with special structure in the differential sequences of stego sequences is proved. Finally, using the distribution characteristics of the special bit strings in the differential sequence, the problem of solving the basic row vectors is transformed into the problem of solving the simple linear equation system through the differential analysis, and good code judgment criteria is used to filter out the correct steganographic key. The research results of this manuscript can realize the secret message extraction attack when the secret message is ciphertext, which is expected to solve the application requirements of actual scenarios. At the same time, the experimental results also show that, based on the algorithm proposed in this manuscript, only a PC can be used to extract secret message from the common STC-based adaptive steganography algorithm. |
doi_str_mv | 10.1007/s11042-022-12109-6 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2644603817</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2644603817</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-2842937c2990e1ccac7c2dec177a2569782db4418f0070a71a8af6054d0c92e03</originalsourceid><addsrcrecordid>eNp9kE1OwzAQRi0EEqVwAVaWWBtmbCdOlqjiT6rEApDYWcZxQluaBDstyq4Hgcv1JBiCBCtWM4v3faN5hBwjnCKAOguIIDkDzhlyhJylO2SEiRJMKY67cRcZMJUA7pODEOYAmCZcjsjjXecqUzeVN-3zzNKF66l3tlk739Oy8dQUpu1ma0fDH7Cnq7pwnm4374u6eavZ0oVgKkdN1xm7CNvNxyHZK81LcEc_c0weLi_uJ9dsent1MzmfMisw7xjPJM-FsjzPwaG1xsa9cBaVMjxJc5Xx4klKzMr4JhiFJjNlCokswObcgRiTk6G39c3ryoVOz5uVr-NJzVMpUxAZqkjxgbK-CcG7Urd-tjS-1wj6y6AeDOpoUH8b1GkMiSEUIlxXzv9W_5P6BMsMdeo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2644603817</pqid></control><display><type>article</type><title>Steganographic key recovery for adaptive steganography under “known-message attacks”</title><source>Springer Nature - Complete Springer Journals</source><creator>Du, Hansong ; Liu, Jiufen ; Tian, Yuguo ; Luo, Xiangyang</creator><creatorcontrib>Du, Hansong ; Liu, Jiufen ; Tian, Yuguo ; Luo, Xiangyang</creatorcontrib><description>Since the performance of STC (Syndrome-Trellis Codes) is approaching the theoretical optimum in minimizing embedded distortion, STC-based adaptive steganography has become the focus of forward improvement and the difficulty of reverse analysis of steganography algorithms. At present, the researches on secret message extraction from STC-based adaptive steganography are mainly focused on the scenario where the secret message is plaintext and part of the plaintext format information is known, while it needs to be studied when these characteristics are unknown. Analogous to the “known-plaintext attack” in cryptanalysis, this manuscript proposes a steganographic key recovery algorithm under the condition of “known-message attack”. Firstly, by studying the structure characteristics of STC parity-check matrix, the concept of basic row vector is proposed, and the problem of secret message extraction attack is transformed into the problem of solving the basic row vectors. Then, the existence of bit string with special structure in the differential sequences of stego sequences is proved. Finally, using the distribution characteristics of the special bit strings in the differential sequence, the problem of solving the basic row vectors is transformed into the problem of solving the simple linear equation system through the differential analysis, and good code judgment criteria is used to filter out the correct steganographic key. The research results of this manuscript can realize the secret message extraction attack when the secret message is ciphertext, which is expected to solve the application requirements of actual scenarios. At the same time, the experimental results also show that, based on the algorithm proposed in this manuscript, only a PC can be used to extract secret message from the common STC-based adaptive steganography algorithm.</description><identifier>ISSN: 1380-7501</identifier><identifier>EISSN: 1573-7721</identifier><identifier>DOI: 10.1007/s11042-022-12109-6</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Adaptive algorithms ; Algorithms ; Computer Communication Networks ; Computer Science ; Cryptography ; Data Structures and Information Theory ; Differential equations ; Encryption ; Linear equations ; Mathematical analysis ; Multimedia Information Systems ; Recovery ; Special Purpose and Application-Based Systems ; Steganography ; Strings ; Trellis coding</subject><ispartof>Multimedia tools and applications, 2022-03, Vol.81 (8), p.10981-11004</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022</rights><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-2842937c2990e1ccac7c2dec177a2569782db4418f0070a71a8af6054d0c92e03</citedby><cites>FETCH-LOGICAL-c319t-2842937c2990e1ccac7c2dec177a2569782db4418f0070a71a8af6054d0c92e03</cites><orcidid>0000-0003-3225-4649</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11042-022-12109-6$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11042-022-12109-6$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,776,780,27903,27904,41467,42536,51297</link.rule.ids></links><search><creatorcontrib>Du, Hansong</creatorcontrib><creatorcontrib>Liu, Jiufen</creatorcontrib><creatorcontrib>Tian, Yuguo</creatorcontrib><creatorcontrib>Luo, Xiangyang</creatorcontrib><title>Steganographic key recovery for adaptive steganography under “known-message attacks”</title><title>Multimedia tools and applications</title><addtitle>Multimed Tools Appl</addtitle><description>Since the performance of STC (Syndrome-Trellis Codes) is approaching the theoretical optimum in minimizing embedded distortion, STC-based adaptive steganography has become the focus of forward improvement and the difficulty of reverse analysis of steganography algorithms. At present, the researches on secret message extraction from STC-based adaptive steganography are mainly focused on the scenario where the secret message is plaintext and part of the plaintext format information is known, while it needs to be studied when these characteristics are unknown. Analogous to the “known-plaintext attack” in cryptanalysis, this manuscript proposes a steganographic key recovery algorithm under the condition of “known-message attack”. Firstly, by studying the structure characteristics of STC parity-check matrix, the concept of basic row vector is proposed, and the problem of secret message extraction attack is transformed into the problem of solving the basic row vectors. Then, the existence of bit string with special structure in the differential sequences of stego sequences is proved. Finally, using the distribution characteristics of the special bit strings in the differential sequence, the problem of solving the basic row vectors is transformed into the problem of solving the simple linear equation system through the differential analysis, and good code judgment criteria is used to filter out the correct steganographic key. The research results of this manuscript can realize the secret message extraction attack when the secret message is ciphertext, which is expected to solve the application requirements of actual scenarios. At the same time, the experimental results also show that, based on the algorithm proposed in this manuscript, only a PC can be used to extract secret message from the common STC-based adaptive steganography algorithm.</description><subject>Adaptive algorithms</subject><subject>Algorithms</subject><subject>Computer Communication Networks</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Data Structures and Information Theory</subject><subject>Differential equations</subject><subject>Encryption</subject><subject>Linear equations</subject><subject>Mathematical analysis</subject><subject>Multimedia Information Systems</subject><subject>Recovery</subject><subject>Special Purpose and Application-Based Systems</subject><subject>Steganography</subject><subject>Strings</subject><subject>Trellis coding</subject><issn>1380-7501</issn><issn>1573-7721</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>8G5</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><sourceid>GUQSH</sourceid><sourceid>M2O</sourceid><recordid>eNp9kE1OwzAQRi0EEqVwAVaWWBtmbCdOlqjiT6rEApDYWcZxQluaBDstyq4Hgcv1JBiCBCtWM4v3faN5hBwjnCKAOguIIDkDzhlyhJylO2SEiRJMKY67cRcZMJUA7pODEOYAmCZcjsjjXecqUzeVN-3zzNKF66l3tlk739Oy8dQUpu1ma0fDH7Cnq7pwnm4374u6eavZ0oVgKkdN1xm7CNvNxyHZK81LcEc_c0weLi_uJ9dsent1MzmfMisw7xjPJM-FsjzPwaG1xsa9cBaVMjxJc5Xx4klKzMr4JhiFJjNlCokswObcgRiTk6G39c3ryoVOz5uVr-NJzVMpUxAZqkjxgbK-CcG7Urd-tjS-1wj6y6AeDOpoUH8b1GkMiSEUIlxXzv9W_5P6BMsMdeo</recordid><startdate>20220301</startdate><enddate>20220301</enddate><creator>Du, Hansong</creator><creator>Liu, Jiufen</creator><creator>Tian, Yuguo</creator><creator>Luo, Xiangyang</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7WY</scope><scope>7WZ</scope><scope>7XB</scope><scope>87Z</scope><scope>8AL</scope><scope>8AO</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8FL</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BEZIV</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>FRNLG</scope><scope>F~G</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K60</scope><scope>K6~</scope><scope>K7-</scope><scope>L.-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0C</scope><scope>M0N</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PQBIZ</scope><scope>PQBZA</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>Q9U</scope><orcidid>https://orcid.org/0000-0003-3225-4649</orcidid></search><sort><creationdate>20220301</creationdate><title>Steganographic key recovery for adaptive steganography under “known-message attacks”</title><author>Du, Hansong ; Liu, Jiufen ; Tian, Yuguo ; Luo, Xiangyang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-2842937c2990e1ccac7c2dec177a2569782db4418f0070a71a8af6054d0c92e03</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Adaptive algorithms</topic><topic>Algorithms</topic><topic>Computer Communication Networks</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Data Structures and Information Theory</topic><topic>Differential equations</topic><topic>Encryption</topic><topic>Linear equations</topic><topic>Mathematical analysis</topic><topic>Multimedia Information Systems</topic><topic>Recovery</topic><topic>Special Purpose and Application-Based Systems</topic><topic>Steganography</topic><topic>Strings</topic><topic>Trellis coding</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Du, Hansong</creatorcontrib><creatorcontrib>Liu, Jiufen</creatorcontrib><creatorcontrib>Tian, Yuguo</creatorcontrib><creatorcontrib>Luo, Xiangyang</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ABI/INFORM Collection</collection><collection>ABI/INFORM Global (PDF only)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ABI/INFORM Global (Alumni Edition)</collection><collection>Computing Database (Alumni Edition)</collection><collection>ProQuest Pharma Collection</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ABI/INFORM Collection (Alumni Edition)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Business Premium Collection</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Business Premium Collection (Alumni)</collection><collection>ABI/INFORM Global (Corporate)</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Business Collection (Alumni Edition)</collection><collection>ProQuest Business Collection</collection><collection>Computer Science Database</collection><collection>ABI/INFORM Professional Advanced</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ABI/INFORM Global</collection><collection>Computing Database</collection><collection>Research Library</collection><collection>Research Library (Corporate)</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Business</collection><collection>ProQuest One Business (Alumni)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central Basic</collection><jtitle>Multimedia tools and applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Du, Hansong</au><au>Liu, Jiufen</au><au>Tian, Yuguo</au><au>Luo, Xiangyang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Steganographic key recovery for adaptive steganography under “known-message attacks”</atitle><jtitle>Multimedia tools and applications</jtitle><stitle>Multimed Tools Appl</stitle><date>2022-03-01</date><risdate>2022</risdate><volume>81</volume><issue>8</issue><spage>10981</spage><epage>11004</epage><pages>10981-11004</pages><issn>1380-7501</issn><eissn>1573-7721</eissn><abstract>Since the performance of STC (Syndrome-Trellis Codes) is approaching the theoretical optimum in minimizing embedded distortion, STC-based adaptive steganography has become the focus of forward improvement and the difficulty of reverse analysis of steganography algorithms. At present, the researches on secret message extraction from STC-based adaptive steganography are mainly focused on the scenario where the secret message is plaintext and part of the plaintext format information is known, while it needs to be studied when these characteristics are unknown. Analogous to the “known-plaintext attack” in cryptanalysis, this manuscript proposes a steganographic key recovery algorithm under the condition of “known-message attack”. Firstly, by studying the structure characteristics of STC parity-check matrix, the concept of basic row vector is proposed, and the problem of secret message extraction attack is transformed into the problem of solving the basic row vectors. Then, the existence of bit string with special structure in the differential sequences of stego sequences is proved. Finally, using the distribution characteristics of the special bit strings in the differential sequence, the problem of solving the basic row vectors is transformed into the problem of solving the simple linear equation system through the differential analysis, and good code judgment criteria is used to filter out the correct steganographic key. The research results of this manuscript can realize the secret message extraction attack when the secret message is ciphertext, which is expected to solve the application requirements of actual scenarios. At the same time, the experimental results also show that, based on the algorithm proposed in this manuscript, only a PC can be used to extract secret message from the common STC-based adaptive steganography algorithm.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11042-022-12109-6</doi><tpages>24</tpages><orcidid>https://orcid.org/0000-0003-3225-4649</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1380-7501 |
ispartof | Multimedia tools and applications, 2022-03, Vol.81 (8), p.10981-11004 |
issn | 1380-7501 1573-7721 |
language | eng |
recordid | cdi_proquest_journals_2644603817 |
source | Springer Nature - Complete Springer Journals |
subjects | Adaptive algorithms Algorithms Computer Communication Networks Computer Science Cryptography Data Structures and Information Theory Differential equations Encryption Linear equations Mathematical analysis Multimedia Information Systems Recovery Special Purpose and Application-Based Systems Steganography Strings Trellis coding |
title | Steganographic key recovery for adaptive steganography under “known-message attacks” |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T19%3A08%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Steganographic%20key%20recovery%20for%20adaptive%20steganography%20under%20%E2%80%9Cknown-message%20attacks%E2%80%9D&rft.jtitle=Multimedia%20tools%20and%20applications&rft.au=Du,%20Hansong&rft.date=2022-03-01&rft.volume=81&rft.issue=8&rft.spage=10981&rft.epage=11004&rft.pages=10981-11004&rft.issn=1380-7501&rft.eissn=1573-7721&rft_id=info:doi/10.1007/s11042-022-12109-6&rft_dat=%3Cproquest_cross%3E2644603817%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2644603817&rft_id=info:pmid/&rfr_iscdi=true |