Steganographic protocols enable one to embed covert messages into inconspicuous data over a public communication channel in such a way that no one, aside from the sender and the intended receiver, can even detect the presence of the secret message. In this paper, we provide a new provably-secure, private-key steganographic encryption protocol secure in the framework of Hopper et al. [2]. We first present a "one-time stegosystem" that allows two parties to transmit messages of length at most that of the shared key with information-theoretic security guarantees; employing a pseudorandom generator (PRG) then permits secure transmission of longer messages in a striaghtforward manner. The advantage of our construction in comparison with previous work is key-length efficiency: in the information-theoretic setting our protocol embeds a n bit message using a shared secret key of length (1 + o(1))n while achieving security : this gives a rate of key length over message length that converges to 1 as n → ∞; the previous best result [5] achieved a constant rate > 1 regardless of the security offered. In this sense, our protocol is the first truly key-length efficient steganographic system. Furthermore, in our protocol, we can permit a portion of the shared secret key to be public while retaining precisely n private key bits. In this setting, by separating the public and the private randomness of the shared key, we achieve security of 2- n . Our result comes as an effect of a novel application of randomness extractors to stegosystem design. © 2013 Springer-Verlag.
CITATION STYLE
Kiayias, A., Russell, A., & Shashidhar, N. (2013). Key-efficient steganography. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7692 LNCS, pp. 142–159). https://doi.org/10.1007/978-3-642-36373-3_10
Mendeley helps you to discover research relevant for your work.