{"title":"使用分组密码对嵌入信息进行加密的隐写系统检测","authors":"V. Korzhik, I. Fedyanin, Cuong Nguyen","doi":"10.23919/FRUCT.2017.8071309","DOIUrl":null,"url":null,"abstract":"We consider firstly stegosystems in which the embedded messages are encrypted preliminary by any block cipher in a codebook mode. Detection of stegosystems presence is performed if the number of the repeated extracted blocks exceeds of some given threshold. Experiments demonstrate that if the embedding data are meaningful text and extraction algorithm is known for the attacker, then a distinguishing between stego and cover objects occur very reliable even for matrix embedding with very small rate. If the embedding data are known for attacker then it is used attack based on a calculation of mutual information between message and the encrypted data with application of k-nearest neighbor distance. Experiments show that for not very strong ciphers with block length at most 32 bits this attack is successful.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Detection of stegosystems using block ciphers for encryption of the embedded messages\",\"authors\":\"V. Korzhik, I. Fedyanin, Cuong Nguyen\",\"doi\":\"10.23919/FRUCT.2017.8071309\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We consider firstly stegosystems in which the embedded messages are encrypted preliminary by any block cipher in a codebook mode. Detection of stegosystems presence is performed if the number of the repeated extracted blocks exceeds of some given threshold. Experiments demonstrate that if the embedding data are meaningful text and extraction algorithm is known for the attacker, then a distinguishing between stego and cover objects occur very reliable even for matrix embedding with very small rate. If the embedding data are known for attacker then it is used attack based on a calculation of mutual information between message and the encrypted data with application of k-nearest neighbor distance. Experiments show that for not very strong ciphers with block length at most 32 bits this attack is successful.\",\"PeriodicalId\":114353,\"journal\":{\"name\":\"2017 20th Conference of Open Innovations Association (FRUCT)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 20th Conference of Open Innovations Association (FRUCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/FRUCT.2017.8071309\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 20th Conference of Open Innovations Association (FRUCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/FRUCT.2017.8071309","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detection of stegosystems using block ciphers for encryption of the embedded messages
We consider firstly stegosystems in which the embedded messages are encrypted preliminary by any block cipher in a codebook mode. Detection of stegosystems presence is performed if the number of the repeated extracted blocks exceeds of some given threshold. Experiments demonstrate that if the embedding data are meaningful text and extraction algorithm is known for the attacker, then a distinguishing between stego and cover objects occur very reliable even for matrix embedding with very small rate. If the embedding data are known for attacker then it is used attack based on a calculation of mutual information between message and the encrypted data with application of k-nearest neighbor distance. Experiments show that for not very strong ciphers with block length at most 32 bits this attack is successful.