On the Limits of Perfect Security for Steganographic System

KF Rafat, M Sher - arXiv preprint arXiv:1310.5902, 2013 - arxiv.org
arXiv preprint arXiv:1310.5902, 2013arxiv.org
Until now the discussion on perfect security for steganographic systems has remained
confined within the realm of mathematicians and information theory experts whose concise
and symbolic representation of their philosophies, postulates, and inference thereafter has
made it hard for the na\" ive academics to have an insight of the concepts. This paper is an
endeavor not only to appraise on the limitations of one of such pioneer comprehensions but
also to illustrate a pitfall in another scheme that asserts on having perfect security without the …
Until now the discussion on perfect security for steganographic systems has remained confined within the realm of mathematicians and information theory experts whose concise and symbolic representation of their philosophies, postulates, and inference thereafter has made it hard for the na\"ive academics to have an insight of the concepts. This paper is an endeavor not only to appraise on the limitations of one of such pioneer comprehensions but also to illustrate a pitfall in another scheme that asserts on having perfect security without the use of public or secret key. Goals set are accomplished through contrasting test results of a steganographic scheme that exploits English words with corresponding acronyms for hiding bits of secret information in chat - a preferred way to exchange messages these days. The misapprehension about perfect security and reign in characteristic of stego key in bit embedding process are unfolded respectively by launching elementary chosen-message and chosen-cover attack, and through proposed enhancement of target scheme.
arxiv.org