{"title":"Information theoretic analysis of steganography","authors":"J. O’Sullivan, P. Moulin, J. M. Ettinger","doi":"10.1109/ISIT.1998.708902","DOIUrl":null,"url":null,"abstract":"Steganography is formulated as a game played between an information hider and an attacker. The cost function in this formulation is a conditional mutual information between the input and output of the attack channel given the host data set. Optimal information hiding and attack strategies are shown to correspond to optimal channel coding and data compression strategies.","PeriodicalId":133728,"journal":{"name":"Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"83","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIT.1998.708902","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 83
Abstract
Steganography is formulated as a game played between an information hider and an attacker. The cost function in this formulation is a conditional mutual information between the input and output of the attack channel given the host data set. Optimal information hiding and attack strategies are shown to correspond to optimal channel coding and data compression strategies.