steganalysis technique for a specific steganography algorithm, the long term goal must be to develop a steganalysis framework that can work effectively at least for a class of steganography methods if not for all. Clearly, this poses a number of mathematical challenges and questions some of which are summarized below.
1.Can the current and future steganography algorithms be categorized into distinct classes of mathematical
techniques?
2.What is a good mathematical definition of steganalysis?
3.What a priori knowledge can we assume the steganalyst possesses?
4.What mathematical properties a class of steganography algorithms must satisfy for which good steganalysis techniques can be developed? This will give rise to a new notion of security in steganography that could be quite different from the popular information theoretic definition.1
5.What are the candidate cost or risk functions that a steganalyst must optimize during hidden data detection or extraction procedure?
6.What are the performance trade-offs involved if a steganalysis algorithm is designed only to detect, only to extract, or detect and extract the hidden message?
determine if there is anything suspicious about it. Wendy could perform one or several tests to decide if the message from
Therefore, based on the ultimate outcome of the effort we classify steganalysis into two categories:
Passive steganalysis: Detect the presence or absence of a secret message in an observed message
Active steganalysis: Extract a (possibly approximate) version of the secret message from a stego message.
secret message (if any) but an active steganalyst attempts to estimate and extract the secret message without destroying it. In this paper, we discuss a mathematical framework for active steganalysis when a certain class of linear steganography algorithms are employed. We also discuss the strengths and limitations of the proposed framework and provide numerical examples. Without loss of generality we consider digital images as cover messages for our experiments. Our primary goal is to estimate the cover message, secret message, and even perhaps the steganography key using only the observed stego messages. During this process we exploit spatial diversity and temporal diversity information.
2 comments:
I like your thought. Its interesting and informative. Yes In the today's world everybody need to know the new technologies.I am very impressed to know about this.Thanks.
eSignature
Post a Comment