{"title":"隐写术的信息理论分析","authors":"J. O’Sullivan, P. Moulin, J. M. Ettinger","doi":"10.1109/ISIT.1998.708902","DOIUrl":null,"url":null,"abstract":"Steganography is formulated as a game played between an information hider and an attacker. The cost function in this formulation is a conditional mutual information between the input and output of the attack channel given the host data set. Optimal information hiding and attack strategies are shown to correspond to optimal channel coding and data compression strategies.","PeriodicalId":133728,"journal":{"name":"Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"83","resultStr":"{\"title\":\"Information theoretic analysis of steganography\",\"authors\":\"J. O’Sullivan, P. Moulin, J. M. Ettinger\",\"doi\":\"10.1109/ISIT.1998.708902\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Steganography is formulated as a game played between an information hider and an attacker. The cost function in this formulation is a conditional mutual information between the input and output of the attack channel given the host data set. Optimal information hiding and attack strategies are shown to correspond to optimal channel coding and data compression strategies.\",\"PeriodicalId\":133728,\"journal\":{\"name\":\"Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1998-08-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"83\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISIT.1998.708902\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIT.1998.708902","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Steganography is formulated as a game played between an information hider and an attacker. The cost function in this formulation is a conditional mutual information between the input and output of the attack channel given the host data set. Optimal information hiding and attack strategies are shown to correspond to optimal channel coding and data compression strategies.