V. Korzhik, Cuong Nguyen, I. Fedyanin, G. Morales-Luna
{"title":"在嵌入之前执行消息加密的隐写系统的侧攻击","authors":"V. Korzhik, Cuong Nguyen, I. Fedyanin, G. Morales-Luna","doi":"10.20944/PREPRINTS201802.0143.V1","DOIUrl":null,"url":null,"abstract":"There are introduced two new steganalytic methods not depending on the statistics of the cover objects, namely side attacks stegosystems. The first one assumes that the plaintext, encrypted before embedding, is partly known by the attacker. In this case, the stegosystems detection is based on the calculation of mutual information between message and extracted encrypted data. For this calculation, a notion of the k-nearest neighbor distance is applied. The second method is applied to HUGO, one of the most efficient steganographic algorithms. In this case the stegosystems detection is based on a verification of the NIST tests to the extracted encrypted messages. Moreover, we show that the problem to find a submatrix of the embedding matrix determining a trellis code structure in the HUGO algorithm provides a search of the stegokey by the proposed method.","PeriodicalId":38474,"journal":{"name":"Journal of Information Hiding and Multimedia Signal Processing","volume":"1 1","pages":"44-57"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Side Attacks on Stegosystems Executing Message Encryption Previous to Embedding\",\"authors\":\"V. Korzhik, Cuong Nguyen, I. Fedyanin, G. Morales-Luna\",\"doi\":\"10.20944/PREPRINTS201802.0143.V1\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There are introduced two new steganalytic methods not depending on the statistics of the cover objects, namely side attacks stegosystems. The first one assumes that the plaintext, encrypted before embedding, is partly known by the attacker. In this case, the stegosystems detection is based on the calculation of mutual information between message and extracted encrypted data. For this calculation, a notion of the k-nearest neighbor distance is applied. The second method is applied to HUGO, one of the most efficient steganographic algorithms. In this case the stegosystems detection is based on a verification of the NIST tests to the extracted encrypted messages. Moreover, we show that the problem to find a submatrix of the embedding matrix determining a trellis code structure in the HUGO algorithm provides a search of the stegokey by the proposed method.\",\"PeriodicalId\":38474,\"journal\":{\"name\":\"Journal of Information Hiding and Multimedia Signal Processing\",\"volume\":\"1 1\",\"pages\":\"44-57\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-02-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Hiding and Multimedia Signal Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.20944/PREPRINTS201802.0143.V1\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Hiding and Multimedia Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.20944/PREPRINTS201802.0143.V1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Computer Science","Score":null,"Total":0}
Side Attacks on Stegosystems Executing Message Encryption Previous to Embedding
There are introduced two new steganalytic methods not depending on the statistics of the cover objects, namely side attacks stegosystems. The first one assumes that the plaintext, encrypted before embedding, is partly known by the attacker. In this case, the stegosystems detection is based on the calculation of mutual information between message and extracted encrypted data. For this calculation, a notion of the k-nearest neighbor distance is applied. The second method is applied to HUGO, one of the most efficient steganographic algorithms. In this case the stegosystems detection is based on a verification of the NIST tests to the extracted encrypted messages. Moreover, we show that the problem to find a submatrix of the embedding matrix determining a trellis code structure in the HUGO algorithm provides a search of the stegokey by the proposed method.