Schöttle, Pascal: The role of side information in steganography. 2016
Inhalt
- Contents
- List of Figures
- List of Tables
- List of Acronyms
- List of Symbols
- 1 Introduction
- 2 Preliminaries
- 2.1 Principles of Steganography
- 2.2 Security in Steganographic Systems
- 2.3 Summary
- 3 Exploiting Side Information in Steganalysis
- 3.1 Side Information in Steganalysis
- 3.1.1 Steganographic Side Information and Uncertainty
- 3.1.1.1 Steganographic Side Information
- 3.1.1.2 Uncertainty
- 3.1.1.3 Common Use of Side Information in Steganography
- 3.1.2 Initial Evidence
- 3.1.3 Formalizing Adaptive Steganography and Steganalysis
- 3.2 Powerful Steganalysis of LSB Replacement
- 3.3 A Targeted Attack on Naïve Adaptive Embedding
- 3.3.1 Overview of Adaptivity Criteria
- 3.3.2 Data and Set-up
- 3.3.3 Evaluation Strategy
- 3.3.4 Attacked Adaptivity Criteria
- 3.3.5 Recoverability of the Adaptivity Criteria
- 3.3.6 Empirical Results – Detecting Naïve Adaptive Embedding
- 3.4 Summary
- 4 Game Theory and Steganography
- 4.1 Motivation
- 4.2 Principles of Game Theory
- 4.3 Game-Theoretical Approaches in Steganography
- 4.3.1 Game Theory and Capacity
- 4.3.2 Game Theory and Batch Steganography
- 4.3.3 Game Theory and Detection Performance
- 4.3.4 Game Theory and Adaptive LSB Matching
- 4.4 The Game-Theoretical Framework
- 4.5 Summary
- 5 Game-Theoretic Insights
- 5.1 Cover Models with Binary Embedding Positions
- 5.1.1 Restricted Steganalyst Model
- 5.1.2 Powerful Steganalyst and Fixed Net Embedding
- 5.1.2.1 Strategies
- 5.1.2.2 Embedding Impact
- 5.1.2.3 Payoff
- 5.1.2.4 Solving the Game
- 5.1.2.5 Solution and Numerical Illustration for n=2 and k=1
- 5.1.3 Powerful Steganalyst and Independent Embedding
- 5.1.3.1 Strategies
- 5.1.3.2 Embedding Impact
- 5.1.3.3 Payoff
- 5.1.3.4 Solving the Game
- 5.1.3.5 Solution and Numerical Illustration for n=2 and k=1
- 5.1.4 Summary
- 5.2 Cover Models with Two Embedding Positions
- 5.2.1 Linear Increasing PMF
- 5.2.1.1 Cover Generation
- 5.2.1.2 Embedding Impact
- 5.2.1.3 Eve's Decision: Optimal Local Detector
- 5.2.1.4 Error Rates and Payoff
- 5.2.1.5 Solving the Game
- 5.2.2 Constant Ratio PMF
- 5.2.2.1 Cover Generation and Justification
- 5.2.2.2 Embedding Impact
- 5.2.2.3 Heterogeneity
- 5.2.2.4 Eve's Decision: Optimal Local Detector
- 5.2.2.5 Error Rates and Payoff
- 5.2.2.6 Solving the Game
- 5.2.3 Imperfect Recoverability
- 5.2.3.1 Imperfect Recovery with Linear Increasing PMF
- 5.2.3.2 Imperfect Recovery with Constant Ratio PMF
- 5.2.4 Numerical Illustrations
- 5.2.4.1 Numerical Illustration for Linear Increasing PMF
- 5.2.4.2 Numerical Illustration for Constant Ratio PMF
- 5.2.4.3 Comparison
- 5.2.5 Type of Game
- 5.2.6 Discussion and Summary
- 5.3 Lessons Learned and Limitations
- 6 Conclusion
- 6.1 Summary of Results
- 6.1.1 Formalizing Side Information in Steganography
- 6.1.2 Game-Theoretical Modeling of Steganography
- 6.2 Outlook and Future Research
- Bibliography
- A Information-Theoretic Derivations
- B Game Theory in Related Fields
- C Omitted Proofs
- C.1 Proof of Lemma 5.11
- C.2 Proof of Lemma 5.12
- C.3 Proof of Lemma 5.13
- C.4 Proof of Lemma 5.14
- C.5 Proof of Lemma 5.15
- D Curriculum Vitae
