A game-theoretic analysis of content-adaptive steganography with independent embedding

Pascal Schottle, Aron Laszka, Benjamin Johnson, Jens Grossklags, Rainer Bohme

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

We provide a game-theoretic analysis of a scenario from the field of content-adaptive steganography. Alice, a steganographer, wants to embed a secret message into a random binary sequence with a known distribution in which the value of each position is independently but non-identically distributed. Eve, a steganalyst, observes the sequence and wants to determine whether it contains a hidden message. Alice is allowed to flip binary values independently at random, with the constraint that the expected number of changes is a fixed constant. Eve may choose to classify each sequence as either unmodified (cover) or modified (stego). The payoff for Eve in the game is the probability that her classification is correct; and the payoff for Alice is the probability that Eve's classification is incorrect, so that the game is constant-sum. We show that Eve's best response strategy in this game can be expressed as a linear aggregation threshold formula similar to those used in practical steganalysis. We give a general formula for Alice's best response strategy; and we compute explicit pure strategy equilibria for the special case of changing one bit in a length-two sequence.

Original languageEnglish
Title of host publication2013 Proceedings of the 21st European Signal Processing Conference, EUSIPCO 2013
PublisherEuropean Signal Processing Conference, EUSIPCO
ISBN (Print)9780992862602
StatePublished - 2013
Externally publishedYes
Event2013 21st European Signal Processing Conference, EUSIPCO 2013 - Marrakech, Morocco
Duration: 9 Sep 201313 Sep 2013

Publication series

NameEuropean Signal Processing Conference
ISSN (Print)2219-5491

Conference

Conference2013 21st European Signal Processing Conference, EUSIPCO 2013
Country/TerritoryMorocco
CityMarrakech
Period9/09/1313/09/13

Fingerprint

Dive into the research topics of 'A game-theoretic analysis of content-adaptive steganography with independent embedding'. Together they form a unique fingerprint.

Cite this