Efficient construction of provably secure steganography under ordinary covert channels

Steganography is the science of hiding information within seemingly harmless messages or inno- cent media. This paper addresses the problems of efficient construction of secure steganography in ordinary covert channels. Without relying on any sampling assumption, we provide a general construction of...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Science China. Information sciences 2012-07, Vol.55 (7), p.1639-1649
Hauptverfasser: Zhu, Yan, Yu, MengYang, Hu, HongXin, Ahn, Gail-Joon, Zhao, HongJia
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1649
container_issue 7
container_start_page 1639
container_title Science China. Information sciences
container_volume 55
creator Zhu, Yan
Yu, MengYang
Hu, HongXin
Ahn, Gail-Joon
Zhao, HongJia
description Steganography is the science of hiding information within seemingly harmless messages or inno- cent media. This paper addresses the problems of efficient construction of secure steganography in ordinary covert channels. Without relying on any sampling assumption, we provide a general construction of secure steganography under computational indistinguishability. Our results show that unpredictability of mapping function in covertext sampler is indispensable for secure stegosystem on indistinguishability against adaptive chosen hiddentext attacks. We completely prove that computationally secure steganography can be constructed on pseudorandom function and unbiased sampling function under ordinary covert channels, that is, its secu- rity is inversely proportional to the sum of errors of these two functions, as well as the legth of hiddentexts. More importantly, our research is not dependent upon pseudorandom ciphertext assumption of cryptosystem or perfect sampling assumption. Hence, our results are practically useful for construction and analysis of secure stegosystems.
doi_str_mv 10.1007/s11432-012-4598-3
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1136357456</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>42308023</cqvip_id><sourcerecordid>1136357456</sourcerecordid><originalsourceid>FETCH-LOGICAL-c375t-d68470f43d0c33776856d383f76df8c8876ebf32298424cdab4ff07402e7e7293</originalsourceid><addsrcrecordid>eNp9kE9LwzAYh4soOOY-gLeKFy_RJG-apEcZ8w8MvKh4C12abB1dsiXtYN_ejA4FD-aSHJ7f733zZNk1wfcEY_EQCWFAESYUsaKUCM6yEZG8RKQk5Xl6c8GQAPi6zCYxrnE6AJgKOco-Z9Y2ujGuy7V3sQu97hrvcm_zbfD7atEe8mh0H0weO7OsnF-Gars65L2rTch9qBtXhUMK701IHavKOdPGq-zCVm00k9M9zj6eZu_TFzR_e36dPs6RBlF0qOaSCWwZ1FgDCMFlwWuQYAWvrdRSCm4WFigtJaNM19WCWYsFw9QII2gJ4-xu6E3L7noTO7VpojZtWznj-6gIAQ6FYAVP6O0fdO374NJ2ipbJFhUFFokiA6WDjzEYq7ah2aQfKoLVUbYaZKskWx1lK0gZOmRiYt3ShN_m_0I3p0Er75a7lPuZxChgiSnAN5dTjOI</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918627507</pqid></control><display><type>article</type><title>Efficient construction of provably secure steganography under ordinary covert channels</title><source>ProQuest Central UK/Ireland</source><source>Alma/SFX Local Collection</source><source>SpringerLink Journals - AutoHoldings</source><source>ProQuest Central</source><creator>Zhu, Yan ; Yu, MengYang ; Hu, HongXin ; Ahn, Gail-Joon ; Zhao, HongJia</creator><creatorcontrib>Zhu, Yan ; Yu, MengYang ; Hu, HongXin ; Ahn, Gail-Joon ; Zhao, HongJia</creatorcontrib><description>Steganography is the science of hiding information within seemingly harmless messages or inno- cent media. This paper addresses the problems of efficient construction of secure steganography in ordinary covert channels. Without relying on any sampling assumption, we provide a general construction of secure steganography under computational indistinguishability. Our results show that unpredictability of mapping function in covertext sampler is indispensable for secure stegosystem on indistinguishability against adaptive chosen hiddentext attacks. We completely prove that computationally secure steganography can be constructed on pseudorandom function and unbiased sampling function under ordinary covert channels, that is, its secu- rity is inversely proportional to the sum of errors of these two functions, as well as the legth of hiddentexts. More importantly, our research is not dependent upon pseudorandom ciphertext assumption of cryptosystem or perfect sampling assumption. Hence, our results are practically useful for construction and analysis of secure stegosystems.</description><identifier>ISSN: 1674-733X</identifier><identifier>EISSN: 1869-1919</identifier><identifier>DOI: 10.1007/s11432-012-4598-3</identifier><language>eng</language><publisher>Heidelberg: SP Science China Press</publisher><subject>Algorithms ; Channels ; Computation ; Computer Science ; Construction ; Encryption ; Information Systems and Communication Service ; Mathematical analysis ; Mathematical models ; Pseudorandom ; Research Paper ; Samplers ; Sampling ; Steganography ; 不可分 ; 不可预测性 ; 伪随机函数 ; 信息科学 ; 可证明安全 ; 新媒体 ; 计算安全 ; 隐蔽通道</subject><ispartof>Science China. Information sciences, 2012-07, Vol.55 (7), p.1639-1649</ispartof><rights>Science China Press and Springer-Verlag Berlin Heidelberg 2012</rights><rights>Science China Press and Springer-Verlag Berlin Heidelberg 2012.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c375t-d68470f43d0c33776856d383f76df8c8876ebf32298424cdab4ff07402e7e7293</citedby><cites>FETCH-LOGICAL-c375t-d68470f43d0c33776856d383f76df8c8876ebf32298424cdab4ff07402e7e7293</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/84009A/84009A.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11432-012-4598-3$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918627507?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,778,782,21371,27907,27908,33727,33728,41471,42540,43788,51302,64366,64368,64370,72220</link.rule.ids></links><search><creatorcontrib>Zhu, Yan</creatorcontrib><creatorcontrib>Yu, MengYang</creatorcontrib><creatorcontrib>Hu, HongXin</creatorcontrib><creatorcontrib>Ahn, Gail-Joon</creatorcontrib><creatorcontrib>Zhao, HongJia</creatorcontrib><title>Efficient construction of provably secure steganography under ordinary covert channels</title><title>Science China. Information sciences</title><addtitle>Sci. China Inf. Sci</addtitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><description>Steganography is the science of hiding information within seemingly harmless messages or inno- cent media. This paper addresses the problems of efficient construction of secure steganography in ordinary covert channels. Without relying on any sampling assumption, we provide a general construction of secure steganography under computational indistinguishability. Our results show that unpredictability of mapping function in covertext sampler is indispensable for secure stegosystem on indistinguishability against adaptive chosen hiddentext attacks. We completely prove that computationally secure steganography can be constructed on pseudorandom function and unbiased sampling function under ordinary covert channels, that is, its secu- rity is inversely proportional to the sum of errors of these two functions, as well as the legth of hiddentexts. More importantly, our research is not dependent upon pseudorandom ciphertext assumption of cryptosystem or perfect sampling assumption. Hence, our results are practically useful for construction and analysis of secure stegosystems.</description><subject>Algorithms</subject><subject>Channels</subject><subject>Computation</subject><subject>Computer Science</subject><subject>Construction</subject><subject>Encryption</subject><subject>Information Systems and Communication Service</subject><subject>Mathematical analysis</subject><subject>Mathematical models</subject><subject>Pseudorandom</subject><subject>Research Paper</subject><subject>Samplers</subject><subject>Sampling</subject><subject>Steganography</subject><subject>不可分</subject><subject>不可预测性</subject><subject>伪随机函数</subject><subject>信息科学</subject><subject>可证明安全</subject><subject>新媒体</subject><subject>计算安全</subject><subject>隐蔽通道</subject><issn>1674-733X</issn><issn>1869-1919</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kE9LwzAYh4soOOY-gLeKFy_RJG-apEcZ8w8MvKh4C12abB1dsiXtYN_ejA4FD-aSHJ7f733zZNk1wfcEY_EQCWFAESYUsaKUCM6yEZG8RKQk5Xl6c8GQAPi6zCYxrnE6AJgKOco-Z9Y2ujGuy7V3sQu97hrvcm_zbfD7atEe8mh0H0weO7OsnF-Gars65L2rTch9qBtXhUMK701IHavKOdPGq-zCVm00k9M9zj6eZu_TFzR_e36dPs6RBlF0qOaSCWwZ1FgDCMFlwWuQYAWvrdRSCm4WFigtJaNM19WCWYsFw9QII2gJ4-xu6E3L7noTO7VpojZtWznj-6gIAQ6FYAVP6O0fdO374NJ2ipbJFhUFFokiA6WDjzEYq7ah2aQfKoLVUbYaZKskWx1lK0gZOmRiYt3ShN_m_0I3p0Er75a7lPuZxChgiSnAN5dTjOI</recordid><startdate>20120701</startdate><enddate>20120701</enddate><creator>Zhu, Yan</creator><creator>Yu, MengYang</creator><creator>Hu, HongXin</creator><creator>Ahn, Gail-Joon</creator><creator>Zhao, HongJia</creator><general>SP Science China Press</general><general>Springer Nature B.V</general><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>W92</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>7SC</scope><scope>8FD</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20120701</creationdate><title>Efficient construction of provably secure steganography under ordinary covert channels</title><author>Zhu, Yan ; Yu, MengYang ; Hu, HongXin ; Ahn, Gail-Joon ; Zhao, HongJia</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c375t-d68470f43d0c33776856d383f76df8c8876ebf32298424cdab4ff07402e7e7293</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Algorithms</topic><topic>Channels</topic><topic>Computation</topic><topic>Computer Science</topic><topic>Construction</topic><topic>Encryption</topic><topic>Information Systems and Communication Service</topic><topic>Mathematical analysis</topic><topic>Mathematical models</topic><topic>Pseudorandom</topic><topic>Research Paper</topic><topic>Samplers</topic><topic>Sampling</topic><topic>Steganography</topic><topic>不可分</topic><topic>不可预测性</topic><topic>伪随机函数</topic><topic>信息科学</topic><topic>可证明安全</topic><topic>新媒体</topic><topic>计算安全</topic><topic>隐蔽通道</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Zhu, Yan</creatorcontrib><creatorcontrib>Yu, MengYang</creatorcontrib><creatorcontrib>Hu, HongXin</creatorcontrib><creatorcontrib>Ahn, Gail-Joon</creatorcontrib><creatorcontrib>Zhao, HongJia</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库-工程技术</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Science China. Information sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zhu, Yan</au><au>Yu, MengYang</au><au>Hu, HongXin</au><au>Ahn, Gail-Joon</au><au>Zhao, HongJia</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Efficient construction of provably secure steganography under ordinary covert channels</atitle><jtitle>Science China. Information sciences</jtitle><stitle>Sci. China Inf. Sci</stitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><date>2012-07-01</date><risdate>2012</risdate><volume>55</volume><issue>7</issue><spage>1639</spage><epage>1649</epage><pages>1639-1649</pages><issn>1674-733X</issn><eissn>1869-1919</eissn><abstract>Steganography is the science of hiding information within seemingly harmless messages or inno- cent media. This paper addresses the problems of efficient construction of secure steganography in ordinary covert channels. Without relying on any sampling assumption, we provide a general construction of secure steganography under computational indistinguishability. Our results show that unpredictability of mapping function in covertext sampler is indispensable for secure stegosystem on indistinguishability against adaptive chosen hiddentext attacks. We completely prove that computationally secure steganography can be constructed on pseudorandom function and unbiased sampling function under ordinary covert channels, that is, its secu- rity is inversely proportional to the sum of errors of these two functions, as well as the legth of hiddentexts. More importantly, our research is not dependent upon pseudorandom ciphertext assumption of cryptosystem or perfect sampling assumption. Hence, our results are practically useful for construction and analysis of secure stegosystems.</abstract><cop>Heidelberg</cop><pub>SP Science China Press</pub><doi>10.1007/s11432-012-4598-3</doi><tpages>11</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1674-733X
ispartof Science China. Information sciences, 2012-07, Vol.55 (7), p.1639-1649
issn 1674-733X
1869-1919
language eng
recordid cdi_proquest_miscellaneous_1136357456
source ProQuest Central UK/Ireland; Alma/SFX Local Collection; SpringerLink Journals - AutoHoldings; ProQuest Central
subjects Algorithms
Channels
Computation
Computer Science
Construction
Encryption
Information Systems and Communication Service
Mathematical analysis
Mathematical models
Pseudorandom
Research Paper
Samplers
Sampling
Steganography
不可分
不可预测性
伪随机函数
信息科学
可证明安全
新媒体
计算安全
隐蔽通道
title Efficient construction of provably secure steganography under ordinary covert channels
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T23%3A08%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Efficient%20construction%20of%20provably%20secure%20steganography%20under%20ordinary%20covert%20channels&rft.jtitle=Science%20China.%20Information%20sciences&rft.au=Zhu,%20Yan&rft.date=2012-07-01&rft.volume=55&rft.issue=7&rft.spage=1639&rft.epage=1649&rft.pages=1639-1649&rft.issn=1674-733X&rft.eissn=1869-1919&rft_id=info:doi/10.1007/s11432-012-4598-3&rft_dat=%3Cproquest_cross%3E1136357456%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918627507&rft_id=info:pmid/&rft_cqvip_id=42308023&rfr_iscdi=true