✬ ✫ ✩ ✪
The Method of Types and Its Application to Information Hiding
Pierre Moulin University of Illinois at Urbana-Champaign www.ifp.uiuc.edu/˜moulin/talks/eusipco05-slides.pdf EUSIPCO Antalya, September 7, 2005
1
The Method of Types and Its Application to Information Hiding - - PowerPoint PPT Presentation
The Method of Types and Its Application to Information Hiding Pierre Moulin University of Illinois at Urbana-Champaign www.ifp.uiuc.edu/ moulin/talks/eusipco05-slides.pdf EUSIPCO Antalya, September 7, 2005 1
1
2
3
4
x∈X p(x) log p(x)
x∈X
5
6
12, 7 12)
n. 7
8
9
10
11
n log pn(x) − H(X)| < ǫ
12
i=1 p(yi|xi)
13
px) ≤ |Tx| ≤ enH(ˆ px)
px) 14
px(x)
x∈X ˆ
px(x) log p(x)
px)+D(ˆ px||p)]
px||p)
py|x)
Y |X(Ty|x|x) .
pxy||pY |X ˆ px) 15
16
pX min pY |X I(X; Y )
17
18
Ty|xm
Ty|xm
Ty|xm
Ty|xm
pxmy||pY |X ˆ pxm) |Ty|xm \ Dm|
19
20
21
22
Encoder Host Key
Message Decoder Attack
23
n
24
p(x,u|s)∈Q(D1)
p(y|x)∈A(D2)[I(U; Y ) − I(U; S)]
x,u,s p(x, u|s)p(s)d(s, x) ≤ D1}
x,y p(y|x)p(x)d(x, y) ≤ D2}
25
26
27
28
n→∞
pFn,Gn
pY|X Pe(FN, GN, pY|X)
29
Attack M ^ Steganalyzer S Source Secret key K
X X
M Y pS Message X {1, ... , 2 }
S
p y|x
2 NR 1 N
f A( )
N
Encoder p =p ? Distortion D Distortion D Decoder φ
p(x,u|s)
p(y|x)[I(U; Y ) − I(U; S)] 30
31