Provably Secure Steganography
How to hide messages imperceptibly? This blog post gives a learning journey for you.
Check this out on GitHub: Link
Must-read papers:
| Category | Paper | Abbr. | Message Embedding Domain | Drawbacks |
|---|---|---|---|---|
| Basic Theories | Communication Theory of Secrecy Systems Shannon. BSTJ ’49 |
- | - | - |
| An Information-Theoretic Model for Steganography Cachin. IH ’98 |
- | - | - | |
| Chapter 6: Steganographic Security, in Steganography in Digital Media: Principles, Algorithms, and Applications Fridrich. 2009 |
- | - | - | |
| Rejection sampling-based | Provably Secure Steganography Hopper et al. CRYPTO ’02 |
RejSamp | f(stego) | Slow & Inefficient |
| Public-Key Steganography von Ahn and Hopper. EUROCRYPT ’04 |
||||
| Public-Key Steganography with Active Attacks Backes and Cachin. TCC ’05 |
||||
| Arithmetic coding-based | Efficient Provably Secure Public Key Steganography Le. IACR ePrint ’03 |
AC | Token indexes | Not secure |
| Provably Secure Generative Steganography Based on Autoregressive Model Yang et al. IWDW ’18 |
||||
| Neural Linguistic Steganography Ziegler et al. EMNLP ’19 |
||||
| Distribution-Preserving Steganography Based on Text-to-Speech Generative Models Chen et al. TDSC ’21 |
||||
| Meteor: Cryptographically Secure Steganography for Realistic Distributions Kaptchuk et al. CCS ’21 |
Meteor | Token indexes | Slow (w/ sort) or Inefficient (w/o sort) | |
| Grouping-based | Provably Secure Generative Linguistic Steganography Zhang et al. Findings of ACL ’21 |
ADG | Group indexes | Not secure |
| Coupling-based | Perfectly Secure Steganography Using Minimum Entropy Coupling Witt et al. ICLR ’23 |
iMEC | Token indexes | Slow |
| Distribution copies-based | Discop: Provably Secure Steganography in Practice Based on “Distribution Copies” Ding et al. S&P ’23 |
Discop | Distribution copy indexes | Symmetric-key only |
| SparSamp: Efficient Provably Secure Steganography Based on Sparse Sampling Wang et al. USENIX Sec ’25 |
SparSamp | |||
| Review | Provably Secure Steganography: Theory, Application and Prospects (in Chinese) Zhang et al. J.Cybersecurity (CN) ’23 |
- | - | - |
Optional reference papers (generative linguistic steganography):
- Generating Steganographic Text with LSTMs
- RNN-Stega: Linguistic Steganography Based on Recurrent Neural Networks
- Towards Near-imperceptible Steganographic Text
- Near-imperceptible Neural Linguistic Steganography via Self-Adjusting Arithmetic Coding
Keywords: information hiding, steganography, provably secure steganography, rejection sampling, arithmetic coding, adaptive dynamic grouping, distribution copies, minimum entropy coupling
关键词:信息隐藏,隐写,可证明安全隐写,拒绝采样,算术编码,动态自适应分组,分布副本,最小熵耦合
本文采用 CC BY-NC-SA 4.0 许可协议,转载请注明来自 ComyDream 。
本文链接:http://comydream.github.io/2023/12/31/provably-secure-steganography/