Abstract
We present a model of steganographic systems which allows to evaluate their security. We especially want to establish an analogy to the known-plaintext-attack which is commonly used to rate cryptographic systems. This model’s main statement is that the embedding operation of a steganographic system should work indeterministic from the attacker’s point of view. This is proved by means of information theory.
The work was sponsored by the German Ministry of Education, Science, Research and Technology and the Gottlieb-Daimler- and Karl-Benz-Foundation Ladenburg (Germany).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
B. Schneier, Applied Cryptography, 2nd ed. New York: John Wiley & Sons, 1996, p. 9.
B. Pfitzmann, ‘Information Hiding Terminology’. In R. Anderson, Information Hiding: first international workshop, Proceedings (Lecture notes in computer science; Vol. 1147), Berlin: Springer, 1996.
J. Zöllner, H. Federrath, A. Pfitzmann, A. Westfeld, G. Wicke, G. Wolf, “über die Modellierung steganographischer Systeme”. In G. Müller, K. Rannenberg, M. ReitenspieΒ, H. Stiegler, VerlÄΒliche IT-Systeme. Zwischen Key-Escrow und elektronischem Geld, Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig/Wiesbaden, 1997, pp. 211–223.
H. limant, R. Piotraschke, “Informationstheoretische Bewertung steganographischer Konzelationssysteme”. In G. Müller, K. Rannenberg, M. ReitenspieΒ, H. Stiegler: VerlÄΒliche IT-Systeme. Zwischen Key-Escrow und elektronischem Geld, Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig/Wiesbaden, 1997, pp. 225–232.
R. Anderson, F. Petitcolas, “On the limits of steganography”. To be published in IEEE Journal on Selected Areas in Communications, Special Issue on copyright and privacy protection. Available at: http://www.cl.cam.ac.uk/ftp/users/rja14/steganjsac2.ps.gz
C. Cachin, “An Information-Theoretic Model for Steganography”. In Information Hiding: second international workshop, Preproceedings; 15–17 April 1998; Portland, Oregon.
R. G. Gallagher, Information Theory and Reliable Communication. John Wiley & Sons, 1968.
A. Westfeld, G. Wolf, “Steganography in a Video Conferencing System”. In Information Hiding: second international workshop, Preproceedings; 15–17 April 1998; Portland, Oregon.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zöllner, J. et al. (1998). Modeling the Security of Steganographic Systems. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_24
Download citation
DOI: https://doi.org/10.1007/3-540-49380-8_24
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65386-8
Online ISBN: 978-3-540-49380-8
eBook Packages: Springer Book Archive