Share Email Print
cover

Proceedings Paper

Protocols for data hiding in pseudo-random state
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

An emerging form of steganographic communication uses ciphertext to replace the output of a random or strong pseudo-random number generator. PRNG-driven media, for example computer animated backdrops in video-conferencing channels, can then be used as a covert channel, if the PRNG bits that generated a piece of content can be estimated by the recipient. However, all bits sent over such a channel must be computationally indistinguishable from i.i.d. coin flips. Ciphertext messages and even key exchange datagrams are easily shaped to match this distribution; however, when placing these messages into a continous stream of PRNG bits, the sender is unable to provide synchronization markers, metadata, or error correction to ensure the message's location and proper decoding. In this paper we explore methods for message transmission and steganographic key exchange in such a "coin flip" channel. We establish that key exchange is generally not possible in this channel if an adversary possesses even a modest noise budget. If the warden is not vigilant in adding noise, however, communication is very simple.

Paper Details

Date Published: 4 February 2009
PDF: 10 pages
Proc. SPIE 7254, Media Forensics and Security, 72540W (4 February 2009); doi: 10.1117/12.806254
Show Author Affiliations
Scott Craver, Binghamton Univ., SUNY (United States)
Enping Li, Binghamton Univ., SUNY (United States)
Jun Yu, Binghamton Univ., SUNY (United States)


Published in SPIE Proceedings Vol. 7254:
Media Forensics and Security
Edward J. Delp; Jana Dittmann; Nasir D. Memon; Ping Wah Wong, Editor(s)

© SPIE. Terms of Use
Back to Top