Security of Steganographic Systems
Učënye zapiski Kazanskogo universiteta. Seriâ Fiziko-matematičeskie nauki, Kazanskii Gosudarstvennyi Universitet. Uchenye Zapiski. Seriya Fiziko-Matematichaskie Nauki, Tome 151 (2009) no. 2, pp. 126-132 Cet article a éte moissonné depuis la source Math-Net.Ru

Voir la notice du chapitre de livre

This paper regards the security of steganographic systems. Two main approaches to steganographic security are discussed. Two types of steganalysis are examined, advantages and disadvantages of each type of steganalysis are considered.
Keywords: steganography, steganalysis, information hiding, steganographic security.
@article{UZKU_2009_151_2_a15,
     author = {E. V. Razinkov and R. Kh. Latypov},
     title = {Security of {Steganographic} {Systems}},
     journal = {U\v{c}\"enye zapiski Kazanskogo universiteta. Seri\^a Fiziko-matemati\v{c}eskie nauki},
     pages = {126--132},
     year = {2009},
     volume = {151},
     number = {2},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/UZKU_2009_151_2_a15/}
}
TY  - JOUR
AU  - E. V. Razinkov
AU  - R. Kh. Latypov
TI  - Security of Steganographic Systems
JO  - Učënye zapiski Kazanskogo universiteta. Seriâ Fiziko-matematičeskie nauki
PY  - 2009
SP  - 126
EP  - 132
VL  - 151
IS  - 2
UR  - http://geodesic.mathdoc.fr/item/UZKU_2009_151_2_a15/
LA  - ru
ID  - UZKU_2009_151_2_a15
ER  - 
%0 Journal Article
%A E. V. Razinkov
%A R. Kh. Latypov
%T Security of Steganographic Systems
%J Učënye zapiski Kazanskogo universiteta. Seriâ Fiziko-matematičeskie nauki
%D 2009
%P 126-132
%V 151
%N 2
%U http://geodesic.mathdoc.fr/item/UZKU_2009_151_2_a15/
%G ru
%F UZKU_2009_151_2_a15
E. V. Razinkov; R. Kh. Latypov. Security of Steganographic Systems. Učënye zapiski Kazanskogo universiteta. Seriâ Fiziko-matematičeskie nauki, Kazanskii Gosudarstvennyi Universitet. Uchenye Zapiski. Seriya Fiziko-Matematichaskie Nauki, Tome 151 (2009) no. 2, pp. 126-132. http://geodesic.mathdoc.fr/item/UZKU_2009_151_2_a15/

[1] Simmons G. J., “The Prisoners' Problem and the Subliminal Channel”, Proc. of Crypto' 83, ed. D. Chaum, Plenum Press, N.Y., 1984, 51–67 | MR

[2] Cox I. J., Miller M. L., Bloom J. A., Fridrich J., Ton K., Digital Watermarking and Steganography, Elsevier, 2008, 593 pp.

[3] Wayner P., Disappearing Cryptography. Information Hiding: Steganography and Watermarking, Elsevier, 2002, 413 pp.

[4] Cachin C., “An Information-Theoretic Model for Steganography”, Proc. of 2nd Workshop on Information Hiding, Lecture Notes in Computer Science, 1525, ed. D. Aucsmith, Springer-Verlag, N.Y., 1998, 306–318 | DOI

[5] Fridrich J., Goljan M., Du R., “Steganalysis Based on JPEG Compatibility”, Special session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, SPIE Multimedia Systems and Applications IV, Denver, CO, 2001, 275–280

[6] Lee K., Westfeld A., Lee S., “Generalised Category Attack – Improving Histogram-Based Attack on JPEG LSB Embedding”, Information Hiding, 9th Int. Workshop, Lecture Notes in Computer Science, 4567, Springer-Verlag, 2007, 378–391 | DOI

[7] Westfield A., “F5 – A Steganographic Algorithm: High Capacity Despite Better Steganalysis”, Information Hiding, 4th Intern. Workshop, Lecture Notes in Computer Science, 2137, Springer-Verlag, Berlin–Heidelberg–New York, 2001, 289–302 | DOI

[8] Fridrich J., Lisonek P., Soukal D., “On Steganographic Embedding Efficiency”, Information Hiding, 8th Int. Workshop, Lecture Notes in Computer Science, 4437, Springer-Verlag, 2007, 282–296 | DOI

[9] Fridrich J., Goljan M., Soukal D., “Perturbed Quantization Steganography”, ACM Multimedia and Security Journal, 11:2 (2005), 98–107 | DOI

[10] Fridrich J., Goljan M., Lisonek P., Soukal D., “Writing on Wet Paper”, IEEE Trans. Sig. Proc., 53:10, Special Issue on Media Security (2005), 3923–3935 | DOI | MR

[11] Razinkov E. V., Latypov R. Kh., “Skrytaya peredacha informatsii s ispolzovaniem granits ob'ektov”, Uchen. zap. Kazan. un-ta. Ser. Fiz.-matem. nauki, 149, no. 2, 2007, 128–137

[12] Razinkov E. V., Latypov R. Kh., “Image Steganography Technique Using Objects Outlines”, Proc. of the IEEE Systems, Man and Cybernetic Society 6th Conference on Cybernetic Systems, Dublin, 2007, 46–50

[13] Fridrich J., Goljan M., “Practical Steganalysis of Digital Images State of the Art”, Proc. SPIE Electronic Imaging, Security and Watermarking of Multimedia Contents, San Jose, CA, USA, 2002, 1–13 | DOI

[14] Farid H., Detecting Steganographic Message in Digital Images, Report TR2001-412, Dartmouth College, Hanover, NH, 2001 | Zbl

[15] Chandramouli R., Subbalakshmi K., “Current Trends in Steganalysis: A Critical Survey”, IEEE Int. Conf. on Control, Automation, Robotics and Vision, ICARCV, V. 2, 2004, 964–967

[16] Fridrich J., Pevny T., Kodovsky J., “Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities”, Proc. ACM Workshop Multimedia and Security, eds. J. Dittmann, J. Fridrich, Dallas, TX, 2007, 3–14

[17] Sullivan K., Madhow U., Chandrasekaran S., Manjunath B., “Steganalysis for Markov Cover Data With Applications to Images”, IEEE Transactions on Information Forensics and Security, 1:2 (2006), 275–287 | DOI

[18] Sencar H. T., Ramkumar M., Akansu A. N., Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia, Acad. Press, Orlando, FL, USA, 2004, 252 pp. | Zbl

[19] Duric Z., Jacobs M., Jajodia S., “Information Hiding: Steganography and Steganalysis”, Handbook of Statistics: Data Mining and Data Visualization, 24, 2005, 171–188 | DOI

[20] Fridrich J., Goljan M., Hogea D., “Steganalysis of JPEG Images: Breaking the F5 Algorithm”, Revised Papers from the 5th Int. Workshop on Information Hiding, 2002, 310–323

[21] Chandramouli R., Kharrazi M., Memon N. D., “Image steganography and steganalysis: Concepts and practice”, Digital Watermarking, 2nd Int. Workshop, IWDW 2003 (Seoul, Korea, 2003), Lecture Notes in Computer Science, 2939, Springer-Verlag, N.Y., 2004, 35–49 | DOI

[22] Chandramouli R., “A mathematical framework for active steganalysis”, ACM Multimedia Systems, 9:3 (2003), 303–311 | DOI

[23] Fridrich J., Goljan M., Hogea D., “Attacking the OutGuess”, Proc. ACM Workshop Multimedia and Security 2002, ACM Press, N.Y., 2002; http://faculty.ksu.edu.sa/ghazy/Steg/References/Ref11.pdf

[24] Fridrich J., Goljan M., Soukal D., “Searching for the Stego Key”, Proc. SPIE-Security, Steganography and Watermarking of Multimedia Contents, VI, Electronic Imaging, San Jose, CA, 2004, 70–82 | DOI