Grey-box steganography

被引:7
|
作者
Liskiewicz, Maciej [1 ]
Reischuk, Ruediger [1 ]
Woelfel, Ulrich [1 ]
机构
[1] Univ Lubeck, Inst Theoret Informat, D-23538 Lubeck, Germany
关键词
PROVABLY SECURE STEGANOGRAPHY; PUBLIC-KEY STEGANOGRAPHY;
D O I
10.1016/j.tcs.2012.03.037
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In steganography secret messages are encoded into unsuspicious covertexts such that an adversary cannot distinguish the resulting stegotexts from original covertexts. To accomplish their respective tasks, encoder and adversary need information about the covertext distribution. In previous investigations, the knowledge about the covertext channel was highly unbalanced: while the adversary was granted full knowledge, the encoder could only query a black-box sampling oracle. In such a situation, the only general steganographic technique known is rejection sampling. But this method requires exponential sampling complexity with respect to the number of message bits per covertext document. The other extreme, a white-box setting, where the encoder knows the covertext distribution perfectly, resp. the distribution is efficiently computable, is also unrealistic in practice. To resolve these deficiencies and to get a finer-grained security analysis, we propose a new model, called grey-box steganography. Here, the encoder starts with at least some partial knowledge about the type of covertext channel. Using the sampling oracle, he first uses machine learning techniques to learn the covertext distribution and then tries to actively construct a suitable stegotext-either by modifying a covertext or by creating a new one. We illustrate our concept with three examples of concept classes of different complexity: channels that can be described by monomials, by decision trees and by DNF-formulae. Their learning complexity ranges from easily learnable up to (probably) difficult to learn. A generic construction is given showing that besides the learning complexity, the efficiency of grey-box steganography depends on the complexity of the membership test, and suitable modification procedures. For the concept classes considered we present efficient algorithms for changing a covertext into a stegotext. (C) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:27 / 41
页数:15
相关论文
共 50 条
  • [1] Grey-Box Steganography
    Liskiewicz, Maciej
    Reischuk, Ruediger
    Woelfel, Ulrich
    [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, TAMC 2011, 2011, 6648 : 390 - 402
  • [2] Grey-box checking
    Elkind, Edith
    Genest, Blaise
    Peled, Doron
    Qu, Hongyang
    [J]. FORMAL TECHNIQUES FOR NETWORKED AND DISTRIBUTED SYSTEMS - FORTE 2006, 2006, 4229 : 420 - 435
  • [3] Black-box testing of grey-box behavior
    Tyler, B
    Soundarajan, N
    [J]. FORMAL APPROACHES TO SOFTWARE TESTING, 2004, 2931 : 1 - 14
  • [4] Grey-box identification of a TMP refiner
    Allison, BJ
    Isaksson, AJ
    Karlstrom, A
    [J]. PULP & PAPER-CANADA, 1997, 98 (04) : 50 - 53
  • [5] A grey-box approach to component composition
    de Bruin, H
    [J]. GENERATIVE AND COMPONENT-BASED SOFTWARE ENGINEERING, PROCEEDINGS, 2000, 1799 : 195 - 209
  • [6] Refined Grey-Box Fuzzing with SIVO
    Nikolic, Ivica
    Mantu, Radu
    Shen, Shiqi
    Saxena, Prateek
    [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2021, 2021, 12756 : 106 - 129
  • [7] Grey-box modeling of HCCI engines
    Bidarvatan, M.
    Thakkar, V.
    Shahbakhti, M.
    Bahri, B.
    Aziz, A. Abdul
    [J]. APPLIED THERMAL ENGINEERING, 2014, 70 (01) : 397 - 409
  • [8] Grey-box identification of the continuous digester
    Funkquist, J
    [J]. CONTROL SYSTEMS '96, PREPRINTS, 1996, : 147 - 152
  • [9] Grey-box models: Concepts and application
    Kroll, A
    [J]. NEW FRONTIERS IN COMPUTATIONAL INTELLIGENCE AND ITS APPLICATIONS, 2000, 57 : 42 - 51
  • [10] Grey-Box Learning of Register Automata
    Garhewal, Bharat
    Vaandrager, Frits
    Howar, Falk
    Schrijvers, Timo
    Lenaerts, Toon
    Smits, Rob
    [J]. INTEGRATED FORMAL METHODS, IFM 2020, 2020, 12546 : 22 - 40