Chosen-key extracting attack to random LSB steganography
A chosen-key extracting attack based on random LSB steganography was proposed.By constructing an orient ring model for a sort of pseudo-random steganography algorithms,it proved that there are many equivalent keys and neighboring keys in the model,and then proposed a method to calculate the number o...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2010-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74647184/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537737893609472 |
---|---|
author | CHEN Jia-yong1 ZHU Yue-fei1 ZHANG Wei-ming2 LIU Jiu-fen2 |
author_facet | CHEN Jia-yong1 ZHU Yue-fei1 ZHANG Wei-ming2 LIU Jiu-fen2 |
author_sort | CHEN Jia-yong1 |
collection | DOAJ |
description | A chosen-key extracting attack based on random LSB steganography was proposed.By constructing an orient ring model for a sort of pseudo-random steganography algorithms,it proved that there are many equivalent keys and neighboring keys in the model,and then proposed a method to calculate the number of equivalent keys.With the charac-ter of equivalent keys,neighboring keys and outlier detection method,the proposed scheme achieved lower computational complexity than the method proposed by Fridrich.Both academic results and experimental results indicated that the algorithm was reliable even with rather big error in estimating the embedding rate. |
format | Article |
id | doaj-art-8d9ed7ffdf0e409ca7280790c0a4e82f |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2010-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-8d9ed7ffdf0e409ca7280790c0a4e82f2025-01-14T08:25:36ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2010-01-0131738074647184Chosen-key extracting attack to random LSB steganographyCHEN Jia-yong1ZHU Yue-fei1ZHANG Wei-ming2LIU Jiu-fen2A chosen-key extracting attack based on random LSB steganography was proposed.By constructing an orient ring model for a sort of pseudo-random steganography algorithms,it proved that there are many equivalent keys and neighboring keys in the model,and then proposed a method to calculate the number of equivalent keys.With the charac-ter of equivalent keys,neighboring keys and outlier detection method,the proposed scheme achieved lower computational complexity than the method proposed by Fridrich.Both academic results and experimental results indicated that the algorithm was reliable even with rather big error in estimating the embedding rate.http://www.joconline.com.cn/zh/article/74647184/steganographysteganalysispseudo-random permutationstego-keyextracting attackJSteg |
spellingShingle | CHEN Jia-yong1 ZHU Yue-fei1 ZHANG Wei-ming2 LIU Jiu-fen2 Chosen-key extracting attack to random LSB steganography Tongxin xuebao steganography steganalysis pseudo-random permutation stego-key extracting attack JSteg |
title | Chosen-key extracting attack to random LSB steganography |
title_full | Chosen-key extracting attack to random LSB steganography |
title_fullStr | Chosen-key extracting attack to random LSB steganography |
title_full_unstemmed | Chosen-key extracting attack to random LSB steganography |
title_short | Chosen-key extracting attack to random LSB steganography |
title_sort | chosen key extracting attack to random lsb steganography |
topic | steganography steganalysis pseudo-random permutation stego-key extracting attack JSteg |
url | http://www.joconline.com.cn/zh/article/74647184/ |
work_keys_str_mv | AT chenjiayong1 chosenkeyextractingattacktorandomlsbsteganography AT zhuyuefei1 chosenkeyextractingattacktorandomlsbsteganography AT zhangweiming2 chosenkeyextractingattacktorandomlsbsteganography AT liujiufen2 chosenkeyextractingattacktorandomlsbsteganography |