Version 1
: Received: 22 February 2018 / Approved: 22 February 2018 / Online: 22 February 2018 (11:40:18 CET)
How to cite:
Korzhik, V.; Nguyen, C.; Fedyanin, I.; Morales-Luna, G. Side Attacks on Stegosystems Executing Message Encryption Previous to Embedding. Preprints2018, 2018020143. https://doi.org/10.20944/preprints201802.0143.v1
Korzhik, V.; Nguyen, C.; Fedyanin, I.; Morales-Luna, G. Side Attacks on Stegosystems Executing Message Encryption Previous to Embedding. Preprints 2018, 2018020143. https://doi.org/10.20944/preprints201802.0143.v1
Korzhik, V.; Nguyen, C.; Fedyanin, I.; Morales-Luna, G. Side Attacks on Stegosystems Executing Message Encryption Previous to Embedding. Preprints2018, 2018020143. https://doi.org/10.20944/preprints201802.0143.v1
APA Style
Korzhik, V., Nguyen, C., Fedyanin, I., & Morales-Luna, G. (2018). Side Attacks on Stegosystems Executing Message Encryption Previous to Embedding. Preprints. https://doi.org/10.20944/preprints201802.0143.v1
Chicago/Turabian Style
Korzhik, V., Ivan Fedyanin and Guillermo Morales-Luna. 2018 "Side Attacks on Stegosystems Executing Message Encryption Previous to Embedding" Preprints. https://doi.org/10.20944/preprints201802.0143.v1
Abstract
There are introduced two new steganalytic methods not depending on the statistics of the cover objects, namely side attacks stegosystems. The first one assumes that the plaintext, encrypted before embedding, is known by the attacker. In this case, the stegosystem’s detection is based on the calculation of mutual information between message and extracted encrypted data. For this calculation, a notion of the k-nearest neighbor distance is applied. The second method is applied to HUGO, one of the most efficient steganographic algorithms. In this case the stegosystem’s detection is based on a verification of the NIST tests to the extracted encrypted messages. Moreover, we show that the problem to find a submatrix of the embedding matrix determining a trellis code structure in the HUGO algorithm provides a search of the stegokey of the proposed stegosystem.
Computer Science and Mathematics, Information Systems
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.