2013
DOI: 10.1016/j.tcs.2012.03.037
|View full text |Cite
|
Sign up to set email alerts
|

Grey-box steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Although the central idea was not unique to his work, Sallee coined the phrase model-based steganography [30] to describe a system in which a model of the cover medium provides a conditional probability distribution that is used to embed an encrypted message through source coding. Similar schemes based on source coding have also been proposed for the complexity-theoretic setting, in which the distribution over cover messages is learned through stateful black-box sampling [19] or by modeling the channel as an efficiently learnable concept class [20].…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Although the central idea was not unique to his work, Sallee coined the phrase model-based steganography [30] to describe a system in which a model of the cover medium provides a conditional probability distribution that is used to embed an encrypted message through source coding. Similar schemes based on source coding have also been proposed for the complexity-theoretic setting, in which the distribution over cover messages is learned through stateful black-box sampling [19] or by modeling the channel as an efficiently learnable concept class [20].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Challenges in practice. While this approach is conceptually straightforward and has been applied in some prior work [6,19,20,30,32,36], there is much to be done in order to address implementation and deployment realities that arise from using generative models, and co-opting large public platforms for covert-message passing. Prior work has largely elided these matters, and most of our system-building effort is aimed at tackling them head-on.…”
Section: Introductionmentioning
confidence: 99%
“…As in the cryptographic setting, the security of the stegosystems should only rely on the secrecy of the keys used by the system. Symmetric-key steganography, which assumes that Alice and Bob share a secret-key, has been a subject of intensive study both in an information-theoretic [7,36,40] and in a computational setting [13,22,23,25,26,30]. A drawback of such an approach is that the encoder and the decoder must have shared a key in a secure way.…”
Section: Introductionmentioning
confidence: 99%