Practical Insecurity for Effective Steganalysis

  • Authors:
  • Johann Barbier;Stéphanie Alt

  • Affiliations:
  • Centre d'Électronique de l'ARmement, Département de Cryptologie, Bruz Cedex, France 35174 and École Supérieure et d'Application des Transmissions, Laboratoire de Virologie et C ...;Centre d'Électronique de l'ARmement, Département de Cryptologie, Bruz Cedex, France 35174

  • Venue:
  • Information Hiding
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we propose to link practical steganalysis and classical security models. In one hand, some steganography schemes are proved to be secure in some security models but in practice, they cannot be used in real-life because of too many constrains. In the other hand, lots of practical steganography algorithms have been broken by effective steganalysis but without any connection with standard models of attackers. So, we introduce two new types of adversaries to simulate real attackers, the IND-SSA adversary and the IND-USA adversary. The IND-SSA adversary emulates specific steganalysis whereas the IND-USA attacker stands for universal steganalysis. We also define the games and the security models associated with and formalize discrimination attacks and discriminant steganalysis. Then, we connect these new models with the hierarchy of classical security models. Using models introduced by C. Cachin, S. Katzenbeisser and F. Petitcolas, and finally by N. Hopper, we show how effective steganalysis gives us a lower bound on the insecurity of the steganalyzed steganography schemes. We also point out that steganography schemes which are not secure in these new models are also not secure in the classical models of security.