2009
DOI: 10.1134/s0032946009020094
|View full text |Cite
|
Sign up to set email alerts
|

Asymptotically optimal perfect steganographic systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
52
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(53 citation statements)
references
References 5 publications
1
52
0
Order By: Relevance
“…(A cryptographic secret key would still be needed to keep the content of the payload from the enemy.) This parallels a result by Ryabko [16], which applies in the very different context of perfect steganography. The results in [16] demonstrate that no stego key is needed even when embedding an asymptotically maximum capacity payload, though the case of perfect steganography is completely different and the capacities are linear in the cover size.…”
Section: Introductionsupporting
confidence: 67%
See 1 more Smart Citation
“…(A cryptographic secret key would still be needed to keep the content of the payload from the enemy.) This parallels a result by Ryabko [16], which applies in the very different context of perfect steganography. The results in [16] demonstrate that no stego key is needed even when embedding an asymptotically maximum capacity payload, though the case of perfect steganography is completely different and the capacities are linear in the cover size.…”
Section: Introductionsupporting
confidence: 67%
“…This emphasises the difference between steganographic security, where the covers are not altered sufficiently for the changes to be detectable, and cryptographic security which prevents the enemy from understanding the payload. The same applies to the perfect steganography result in [16], where the embedding distortion is perfectly undetectable but the enemy can still read the payload if it is not encrypted.…”
Section: A Simple Solutionmentioning
confidence: 84%
“…Many works characterize the capacity of various steganographic problems -see for instance [4][5][6][7][8]. An important exception to the non-zero covertext assumption occurs in the work of Bash, Goeckel and Towsley [1, 2] -we discuss this work in depth below.…”
Section: Related Work a Steganographymentioning
confidence: 99%
“…This key is usually sent via a secure channel between Alice and Bob which is not known by Willie. Also, there are some of the works by [5,8] do not make this assumption of a shared key.…”
Section: Related Work a Steganographymentioning
confidence: 99%
See 1 more Smart Citation