Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/844102.844124acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article

Capacity is the wrong paradigm

Published: 23 September 2002 Publication History

Abstract

At present, "capacity" is the prevailing paradigm for covert channels. With respect to steganography, however, capacity is at best insufficient, and at worst, is incorrect. In this paper, we propose a new paradigm called "capability" which gauges the effectiveness of a steganographic method. It includes payload carrying ability, detectability, and robustness components. We also discuss the use of zero-error capacity for channel analysis and demonstrate that a JPEG compressed image always has the potential to carry hidden information.

References

[1]
R. Anderson. Stretching the Limits of Steganography, in R. Anderson (Ed.) Information Hiding, LNCS 1174, IH'96, pp. 39--48, Springer 1996.]]
[2]
R. Anderson. Security Engineering, Wiley, 2001.]]
[3]
R. B. Ash. Information Theory, Interscience Publishers 1965, republished Dover Publications 1990.]]
[4]
L. Chang. Issues in Information Hiding Transform Techniques, NRL Memorandum Report, 2002.]]
[5]
T. M. Cover and J. Y. Thomas. Elements of Information Theory, Wiley, 1991]]
[6]
J. Fridrich, M. Goljan, and R. Du. Steganalysis Based on JPEG Compatibility, in A. Tescher, B. Vasudev, & V. M. Bove, Jr. (Ed.) Proc. SPIE Vol. 4518 (2001), Multimedia Systems and Applications IV, pp. 275--280.]]
[7]
N. F. Johnson, Z. Duric, and S. Jajodia. Information Hiding: Steganography and Watermarking---Attacks and Countermeasures, Advances in Information Security 1, Kluwer Academic Publishers, 2001.]]
[8]
S. Katzenbeisser and F. A. P. Petitcolas (editors). Information Hiding techniques for steganography and digital watermarking, Artech House, 2000.]]
[9]
E. Kawaguchi and R. O. Eason. The principle and applications of bpcs-steganography, in SPIE International Symposium on Voice, Video, and Data Communications: Multimedia Systems and Applications, pages 464--473, Boston, MA, November 2--4 1998.]]
[10]
C. Kurak & J. McHugh. A Cautionary Note on Image Downgrading, in Computer Security Applications Conference, San Antonio, TX, USA, pp. 153--159, Dec. 1992.]]
[11]
Y. Lee and L. Chen. An adaptive image steganographic model based on minimum-error lsb replacement, in Ninth National Conference on Information Security, pages 8--15, Taichung, Taiwan, 14--15 May 1999.]]
[12]
L. M. Marvel. Image Steganography for Hidden Communication, PhD dissertation, Dept. of Electrical Engineering, Univ. of Delaware, Spring, 1999.]]
[13]
L. M. Marvel, C. G. Boncelet, Jr., and C. T. Retter. Spread Spectrum Image Steganography, IEEE Trans. on Image Processing, Vol. 8, No. 8, pp. 1075--1083, August 1999.]]
[14]
I. S. Moskowitz and M. H. Kang. Covert Channels --- Here to Stay? Proc. COMPASS, Gaithersburg, MD, pp. 235--243, IEEE Press, 1994.]]
[15]
I. S. Moskowitz, G. E. Longdon, and L. Chang. A New Paradigm Hidden in Steganography, Proc. NSPW, Ballycotton, County Cork, Ireland, pp. 12--22, ACM, Sept. 2000. Reprinted in "The Privacy Papers," (Ed. R. Herold) pp. 331--349, Auerbach, 2002.]]
[16]
I. S. Moskowitz, N. F. Johnson, and M. Jacobs. A Detection Study of an NRL Steganographic Method, NRL Memorandum Report: forthcoming 2002.]]
[17]
R. Nelson. What is a Secret and What does that have to do with Computer Security? Proc. NSPW, Rhode Island, pp. 74--79, 1994.]]
[18]
R. E. Newman, I. S. Moskowitz, L. Chang, and M. M. Brahmadesam. A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis, to appear, Proc. Information Hiding Workshop, Oct. 2002, the Netherlands, IH 2002.]]
[19]
M. Niimi, H. Noda, and E. Kawaguchi. An image embedding in image by a complexity based region segmentation method, In ICIP, volume 3, pages 74--77, 1997.]]
[20]
W. B. Pennebaker and J. L. Mitchell JPEG Still Image Data Compression Standard, Van Nostrand Reinhold, 1993.]]
[21]
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn. Attacks on Copyright Marking Systems, in D. Aucsmith (Ed.), Information Hiding, LNCS 1525, IH'98, pp. 219--239 Springer, 1998.]]
[22]
F. A. P. Petitcolas and R. J. Anderson. Evaluation of Copyright Marking Systems, in Proc. IEEE Multimedia Systems (ICMCS'99), vol. 1, pp. 574--579, June 1999, Florence, Italy.]]
[23]
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn. Information hiding -- a survey, in Proceedings of the IEEE, 87(7):1062--1078, July 1999.]]
[24]
N. Provos. Defending against statistical steganalysis, in Proc. 10th USENIX Security Symposium, pages 323--335, August 2001.]]
[25]
N. Provos. Probabilistic methods for improving information hiding, Technical Report 01-1, CITI, University of Michigan, January 2001.]]
[26]
M. Ramkumar Data Hiding in Multimedia --- Theory and Applications, PhD dissertation, Dept. of ECE, New Jersey Institute of Technology, Newark, NJ, 1999.]]
[27]
M. Ramkumar, A. N. Akansu, and A. A. Alatan. An FFT Based Signaling Scheme for Multimedia Steganography, Preprint.]]
[28]
C. E. Shannon and W. Weaver. The Mathematical Theory of Communication, University of Illinois Press, 1949. Also appeared as a series of papers by Shannon in the Bell System Technical Journal, July 1948, October 1948 (A Mathematical Theory of Communication), January 1949 (Communication in the Presence of Noise).]]
[29]
C. E. Shannon. The Zero Error Capacity of a Noisy Channel, IRE Trans. on Information Theory, Vol. IT-2, pp. S8--S19, Sept. 1956.]]
[30]
G. Strang. The discrete cosine transform, SIAM Review, 41(1):135--147, 1999.]]
[31]
G. J. Simmons. The Prisoners' Problem and the Subliminal Channel, D. Chaum (ed.) Advances In Cryptology: Proc. of Crypto 83, pp. 51--67, Plenum Press, 1984.]]
[32]
G. J. Simmons. the History of Subliminal Channels, newblockIEEE J. on Selected Areas in Communications, v 16, no 4, pp. 452--273, April 1998.]]
[33]
R. Sugihara. Practical Capacity of Digital Watermarks, in I.S. Moskowitz (Ed.) Information Hiding, LNCS 2137, IH 2001, pp. 316--329, Springer 2001.]]
[34]
D. Upham. Jpeg-Jsteg. Modification of the Independent JPEG Group's JPEG software (release 4) for 1-bit steganography in JFIF output files, http://www.tiac.net/usres/lorejwa/jsteg.htm, 1997.]]
[35]
B. R. Venkatraman and R. E. Newman-Wolfe Capacity Estimation and Auditability of Network Covert Channels, Proc. Symposium on Security and Privacy, Oakland, CA, pp. 186--198, IEEE, May 8--10, 1995.]]
[36]
A. Westfeld. F5 --- A Steganographie Algorithm: High Capacity Despite Better Steganalysis, in I. S. Moskowitz (Ed.) Information Hiding, LNCS 2137, IH 2001, pp. 289--302, Springer 2001.]]
[37]
xv, http://www.trilon.com/xv/, 1994.]]

Cited By

View all
  • (2020)Distributed data hiding in multi-cloud storage environmentJournal of Cloud Computing10.1186/s13677-020-00208-49:1Online publication date: 9-Dec-2020
  • (2016)A Survey and Taxonomy Aimed at the Detection and Measurement of Covert ChannelsProceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security10.1145/2909827.2930800(115-126)Online publication date: 20-Jun-2016
  • (2016)Perfect undetectability of network steganographySecurity and Communication Networks10.1002/sec.14919:15(2998-3010)Online publication date: 1-Oct-2016
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
NSPW '02: Proceedings of the 2002 workshop on New security paradigms
September 2002
153 pages
ISBN:158113598X
DOI:10.1145/844102
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 September 2002

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

NSPW02
Sponsor:
NSPW02: New Security Paradigms Workshop 2002
September 23 - 26, 2002
Virginia, Virginia Beach

Acceptance Rates

NSPW '02 Paper Acceptance Rate 14 of 40 submissions, 35%;
Overall Acceptance Rate 98 of 265 submissions, 37%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Distributed data hiding in multi-cloud storage environmentJournal of Cloud Computing10.1186/s13677-020-00208-49:1Online publication date: 9-Dec-2020
  • (2016)A Survey and Taxonomy Aimed at the Detection and Measurement of Covert ChannelsProceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security10.1145/2909827.2930800(115-126)Online publication date: 20-Jun-2016
  • (2016)Perfect undetectability of network steganographySecurity and Communication Networks10.1002/sec.14919:15(2998-3010)Online publication date: 1-Oct-2016
  • (2015)“The Good, The Bad and The Ugly”: Evaluation of Wi-Fi SteganographyJournal of Communications10.12720/jcm.10.10.747-752Online publication date: 2015
  • (2009)Capacity of steganographic channelsIEEE Transactions on Information Theory10.1109/TIT.2009.201299155:4(1775-1792)Online publication date: 1-Apr-2009
  • (2009)Permutation-based steganographic channels2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009)10.1109/CRISIS.2009.5411975(67-73)Online publication date: Oct-2009
  • (2007)J2Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security10.5555/1659141.1659148(28-32)Online publication date: 17-Sep-2007
  • (2005)Capacity of steganographic channelsProceedings of the 7th workshop on Multimedia and security10.1145/1073170.1073175(11-24)Online publication date: 1-Aug-2005
  • (2005)Fingerpnnted secret sharing steganography for robustness against image cropping attacksINDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005.10.1109/INDIN.2005.1560463(717-724)Online publication date: 2005
  • (2004)A qualitative framework for Shannon information theoriesProceedings of the 2004 workshop on New security paradigms10.1145/1065907.1066030(23-31)Online publication date: 20-Sep-2004
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media