You are here

Information Hiding

Title: Information Hiding.
28 views
10 downloads
Name(s): Van Le, Tri, author
Desmedt, Yvo, professor directing dissertation
Mott, Joe, outside committee member
Burmester, Mike, committee member
Gallivan, Kyle, committee member
Mascagni, Michael, committee member
Department of Computer Science, degree granting department
Florida State University, degree granting institution
Type of Resource: text
Genre: Text
Issuance: monographic
Date Issued: 2004
Publisher: Florida State University
Place of Publication: Tallahassee, Florida
Physical Form: computer
online resource
Extent: 1 online resource
Language(s): English
Abstract/Description: The Prisoners' Problem can be stated as follows: Two prisoners, Alice and Bob, want to communicate a secret escape plan under the surveillance of a warden, Wendy. To be indiscernible, the communication must appear to Wendy to be ``innocent'. If a traditional cryptographic mechanism (such as encryption) is used to protect their secret plan, Alice and Bob will be caught by Wendy because of the visible randomness of the ciphertexts. Therefore a new approach must be used in which information is hidden, not just encrypted. Information hiding, and more specifically steganography deals with such problems. This dissertation investigates the Prisoners' Problem in a game theoretic setting in which Alice plays against Wendy. The objective of Alice is to encode her secret messages so that they are indistinguishable from innocent messages. The goal of Wendy is to distinguish Alice's messages with concealed information from innocent messages. We study this game theoretic problem in three security models: perfect, statistical and computational security. These models correspond to three adversarial models of Wendy, namely: unbounded; polynomial number of queries; polynomial time. We show that under very general conditions, efficient and secure steganography can be achieved. In each of the three models, we give necessary and sufficient conditions for the existence of secure steganography. Our proofs yield efficient and proven secure steganographic systems. In almost all of the cases, these constructions are also optimal. We then extend these models to introduce the novel concepts of invisible steganography and steganographic secret sharing.
Identifier: FSU_migr_etd-3214 (IID)
Submitted Note: A Dissertation submitted to the Department of Computer Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy.
Degree Awarded: Spring Semester, 2004.
Date of Defense: April 5, 2004.
Keywords: steganography, conditional security, information hiding, unconditional security, entropy
Bibliography Note: Includes bibliographical references.
Advisory Committee: Yvo Desmedt, Professor Directing Dissertation; Joe Mott, Outside Committee Member; Mike Burmester, Committee Member; Kyle Gallivan, Committee Member; Michael Mascagni, Committee Member.
Subject(s): Computer science
Persistent Link to This Record: http://purl.flvc.org/fsu/fd/FSU_migr_etd-3214
Owner Institution: FSU

Choose the citation style.
Van Le, T. (2004). Information Hiding. Retrieved from http://purl.flvc.org/fsu/fd/FSU_migr_etd-3214