DocumentCode :
968421
Title :
Provably Secure Steganography
Author :
Hopper, Nicholas ; Von Ahn, Luis ; Langford, John
Author_Institution :
Univ. of Minnesota, Minneapolis, MN
Volume :
58
Issue :
5
fYear :
2009
fDate :
5/1/2009 12:00:00 AM
Firstpage :
662
Lastpage :
676
Abstract :
Steganography is the problem of hiding secret messages in "innocent-lookingrdquo public communication so that the presence of the secret messages cannot be detected. This paper introduces a cryptographic formalization of steganographic security in terms of computational indistinguishability from a channel, an indexed family of probability distributions on cover messages. We use cryptographic and complexity-theoretic proof techniques to show that the existence of one-way functions and the ability to sample from the channel are necessary conditions for secure steganography. We then construct a steganographic protocol, based on rejection sampling from the channel, that is provably secure and has nearly optimal bandwidth under these conditions. This is the first known example of a general provably secure steganographic protocol. We also give the first formalization of "robustrdquo steganography, where an adversary attempts to remove any hidden messages without unduly disrupting the cover channel. We give a necessary condition on the amount of disruption the adversary is allowed in terms of a worst case measure of mutual information. We give a construction that is provably secure and computationally efficient and has nearly optimal bandwidth, assuming repeatable access to the channel distribution.
Keywords :
cryptographic protocols; probability; steganography; channel rejection sampling; complexity-theoretic proof technique; covert channel; cryptographic formalization; innocent-looking public communication; probability distribution; provably secure steganography; secret message hiding; steganographic protocol; Bandwidth; Cryptographic protocols; Cryptography; Distributed computing; Mutual information; Probability distribution; Robustness; Sampling methods; Security; Steganography; Encryption; Reducibility and completeness; Security and Protection; Steganography; covert channels; provable security.;
fLanguage :
English
Journal_Title :
Computers, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9340
Type :
jour
DOI :
10.1109/TC.2008.199
Filename :
4663056
Link To Document :
بازگشت