Fisher Information Determines Capacity
- f ε-secure Steganography
Tomáš Filler and Jessica Fridrich
- Dept. of Electrical and Computer Engineering
SUNY Binghamton, New York
Perfect vs. Imperfect Steganography Stegosystems can be divided into - - PowerPoint PPT Presentation
Fisher Information Determines Capacity of -secure Steganography Tom Filler and Jessica Fridrich Dept. of Electrical and Computer Engineering SUNY Binghamton, New York 11th Information Hiding, Darmstadt, Germany, 2009 Perfect vs.
SUNY Binghamton, New York
Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 2 of 18
β
Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 3 of 18
Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 4 of 18
1 ASSUMPTIONS
2 STEGANOGRAPHIC CAPACITY & ROOT RATE
3 APPLICATION
4 CONCLUSION
Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 5 of 18
1 COVER SOURCE - Markov Chain
2 EMBEDDING ALGORITHM - MI embedding
3 STEGOSYSTEM - ε-secure (imperfect)
Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 7 of 18
Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 8 of 18
Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 8 of 18
2
Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 8 of 18
Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 8 of 18
Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 8 of 18
1 If nβn
√n → 0 then the stegosyst. are asymptotically secure.
2 If nβn
√n → +∞ then arbitrarily accurate stego detectors
Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 10 of 18
β (X) = 1
β (X)
Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 11 of 18
β (X) is Gaussian (Local Asymptotic Normality).
σ2 σ2
n d2 dβ 2 DKL
β
Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 12 of 18
Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 13 of 18
255 255 −5 −10 −15
CAMRAW - log aij
−10 −5 127 255 j
log a127,j
data model
Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 15 of 18
1 2 0 - LSB 1 - ±1 NRCS NRCS-JPEG CAMRAW
λ Fcλ
Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 16 of 18
1 2 0 - LSB 1 - ±1 NRCS NRCS-JPEG CAMRAW
Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 16 of 18
0.2 0.4 0.6 0.8 1 254 ±1 emb. NRCS
Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 17 of 18
Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 18 of 18
Filler, Fridrich Fisher Information Determines Capacity of ε-secure Steganography 18 of 18