TY - GEN
T1 - Bitspotting
T2 - 12th International Workshop on Digital-Forensics and Watermarking, IWDW 2013
AU - Johnson, Benjamin
AU - Schöttle, Pascal
AU - Laszka, Aron
AU - Grossklags, Jens
AU - Böhme, Rainer
PY - 2014
Y1 - 2014
N2 - We analyze a two-player zero-sum game between a steganographer, Alice, and a steganalyst, Eve. In this game, Alice wants to hide a secret message of length in a binary sequence, and Eve wants to detect whether a secret message is present. The individual positions of all binary sequences are independently distributed, but have different levels of predictability. Using knowledge of this distribution, Alice randomizes over all possible size-subsets of embedding positions. Eve uses an optimal (possibly randomized) decision rule that considers all positions, and incorporates knowledge of both the sequence distribution and Alice's embedding strategy. Our model extends prior work by removing restrictions on Eve's detection power. The earlier work determined where Alice should hide the bits when Eve can only look in one position. Here, we expand Eve's capacity to spot these bits by allowing her to consider all positions. We give defining formulas for each player's best response strategy and minimax strategy; and we present additional structural constraints on the game's equilibria. For the special case of length-two binary sequences, we compute explicit equilibria and provide numerical illustrations.
AB - We analyze a two-player zero-sum game between a steganographer, Alice, and a steganalyst, Eve. In this game, Alice wants to hide a secret message of length in a binary sequence, and Eve wants to detect whether a secret message is present. The individual positions of all binary sequences are independently distributed, but have different levels of predictability. Using knowledge of this distribution, Alice randomizes over all possible size-subsets of embedding positions. Eve uses an optimal (possibly randomized) decision rule that considers all positions, and incorporates knowledge of both the sequence distribution and Alice's embedding strategy. Our model extends prior work by removing restrictions on Eve's detection power. The earlier work determined where Alice should hide the bits when Eve can only look in one position. Here, we expand Eve's capacity to spot these bits by allowing her to consider all positions. We give defining formulas for each player's best response strategy and minimax strategy; and we present additional structural constraints on the game's equilibria. For the special case of length-two binary sequences, we compute explicit equilibria and provide numerical illustrations.
KW - Content-adaptive steganography
KW - Game theory
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=84904718754&partnerID=8YFLogxK
U2 - 10.1007/978-3-662-43886-2_1
DO - 10.1007/978-3-662-43886-2_1
M3 - Conference contribution
AN - SCOPUS:84904718754
SN - 9783662438855
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 3
EP - 18
BT - Digital-Forensics and Watermarking - 12th International Workshop, IWDW 2013, Revised Selected Papers
PB - Springer Verlag
Y2 - 1 October 2013 through 4 October 2013
ER -