Skip to Main content Skip to Navigation
Conference papers

Applied public-key steganography

Abstract : We consider the problem of hiding information in a steganographic framework, i.e. embedding a binary message within an apparently innocuous content, in order to establish a `suspicion-free' digital communication channel. The adversary is passive as no intentional attack is foreseen. The only threat is that she discovers the presence of a hidden communication. The main goal of this article is to find if the calar Costa Scheme, a recently published embedding method exploiting side information at the encoder, is suitable for that framework. We justify its use assessing its security level with respect to the Cachin's criterion. We derive a public-key stegosystem following the ideas of R. Anderson and P. Petitcolas. This technique is eventually applied to PCM audio contents. Experimental performances are detailed in terms of bit-rate and Kullback-Leibler distance.
Document type :
Conference papers
Complete list of metadata
Contributor : Teddy Furon Connect in order to contact the contributor
Submitted on : Tuesday, June 20, 2006 - 4:43:47 PM
Last modification on : Sunday, June 26, 2022 - 11:45:56 AM
Long-term archiving on: : Monday, April 5, 2010 - 11:10:42 PM


  • HAL Id : inria-00080818, version 1



Pierre Guillon, Teddy Furon, Pierre Duhamel. Applied public-key steganography. Security and Watermarking of Multimedia Contents IV, SPIE, 2002, San Jose, CA, United States. ⟨inria-00080818⟩



Record views


Files downloads