Elements of information theory
Elements of information theory
What is a secret—and—what does that have to do with computer security?
NSPW '94 Proceedings of the 1994 workshop on New security paradigms
SIAM Review
A new paradigm hidden in steganography
Proceedings of the 2000 workshop on New security paradigms
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
JPEG Still Image Data Compression Standard
JPEG Still Image Data Compression Standard
Stretching the Limits of Steganography
Proceedings of the First International Workshop on Information Hiding
Practical Capacity of Digital Watermarks
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
An Image Embedding in Image by a Complexity Based Region Segmentation Method
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 3 - Volume 3
Capacity estimation and auditability of network covert channels
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Evaluation of Copyright Marking Systems
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
The history of subliminal channels
IEEE Journal on Selected Areas in Communications
Spread spectrum image steganography
IEEE Transactions on Image Processing
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures Steganography and Watermarking - Attacks and Countermeasures
A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
A qualitative framework for Shannon information theories
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Capacity of steganographic channels
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
J2: refinement of a topological image steganographic method
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Capacity of steganographic channels
IEEE Transactions on Information Theory
Hi-index | 0.06 |
At present, "capacity" is the prevailing paradigm for covert channels. With respect to steganography, however, capacity is at best insufficient, and at worst, is incorrect. In this paper, we propose a new paradigm called "capability" which gauges the effectiveness of a steganographic method. It includes payload carrying ability, detectability, and robustness components. We also discuss the use of zero-error capacity for channel analysis and demonstrate that a JPEG compressed image always has the potential to carry hidden information.