Writing on wet paper
Top Cited Papers
- 19 September 2005
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Signal Processing
- Vol. 53 (10) , 3923-3935
- https://doi.org/10.1109/tsp.2005.855393
Abstract
In this paper, we show that the communication channel known as writing in memory with defective cells is a relevant information-theoretical model for a specific case of passive warden steganography when the sender embeds a secret message into a subset C of the cover object X without sharing C with the recipient. The set C, which is also called the selection channel, could be arbitrary, determined by the sender from the cover object using a deterministic, pseudo-random, or a truly random process. We call this steganography "writing on wet paper" and realize it using a simple variable-rate random linear code that gives the sender a convenient flexibility and control over the embedding process and is thus suitable for practical implementation. The importance of the wet paper scenario for covert communication is discussed within the context of adaptive steganography and perturbed quantization steganography. Heuristic arguments supported by tests using blind steganalysis indicate that the wet paper steganography provides improved steganographic security and is less vulnerable to steganalytic attacks compared with existing methods with shared selection channels.Keywords
This publication has 22 references indexed in Scilit:
- Model-Based SteganographyPublished by Springer Nature ,2004
- Steganographic system based on higher-order statisticsPublished by SPIE-Intl Soc Optical Eng ,2003
- Steganalysis using image quality metricsIEEE Transactions on Image Processing, 2003
- Defining security in steganographic systemsPublished by SPIE-Intl Soc Optical Eng ,2002
- Communications approach to image steganographyPublished by SPIE-Intl Soc Optical Eng ,2002
- Compression-compatible fragile and semifragile tamper detectionPublished by SPIE-Intl Soc Optical Eng ,2000
- Data hiding in digital binary imagePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2000
- Modeling the Security of Steganographic SystemsPublished by Springer Nature ,1998
- On the limits of steganographyIEEE Journal on Selected Areas in Communications, 1998
- Solving sparse linear equations over finite fieldsIEEE Transactions on Information Theory, 1986