The Realizations of Steganography in Encrypted Domain

Yan Ke,Minqing Zhang,Jia Liu,Xiaoyuan Yang
2023-03-13
Abstract:With the popularization and application of privacy protection technologies in cloud service and social network, ciphertext has been gradually becoming a common platform for public to exchange data. Under the cover of such a plat-form, we propose steganography in encrypted domain (SIED) in this paper to re-alize a novel method to realize secret communication Based on Simmons' model of prisoners' problems, we discuss the application scenarios of SIED. According to the different accesses to the encryption key and decryption key for secret mes-sage sender or receiver, the application modes of SIED are classified into four modes. To analyze the security requirments of SIED, four levels of steganalysis attacks are introduced based on the prior knowledge about the steganography system that the attacker is assumed to obtain in advance. Four levels of security standards of SIED are defined correspondingly. Based on the existing reversible data hiding techniques, we give four schemes of SIED as practical instances with different security levels. By analyzing the embedding and extraction characteris-tics of each instance, their SIED modes, application frameworks and security lev-els are discussed in detail.
Cryptography and Security
What problem does this paper attempt to address?
The paper primarily explores the issue of implementing steganography in the encrypted domain, especially in the context of the widespread application of modern privacy protection technologies, and how to use the ciphertext environment for secret communication. Specifically, the paper attempts to address the following key issues: 1. **Definition of Steganography in the Encrypted Domain (SIED)**: Based on the prisoner problem model proposed by Simmons, the paper first clarifies the basic concepts, elements, and application scenarios of implementing steganography in an encrypted communication environment. 2. **Classification of SIED Application Modes**: According to whether the sender (Alice) and the receiver (Bob) possess the encryption or decryption keys, the application modes of SIED are divided into four categories: All Controlled (AC), Extraction Controlled (EXC), Embedding Controlled (EMC), and All Free (AF). 3. **Analysis of SIED Security Requirements**: From the perspective of indistinguishability, the paper discusses the security requirements of SIED under different levels of attacks (such as ciphertext-only attacks, known ciphertext attacks, etc.). It particularly emphasizes that the random uniform distribution characteristics of ciphertext in the encrypted domain help ensure the security of steganography. 4. **Proposing Specific Implementation Schemes for SIED**: For different security level requirements, four implementation schemes for SIED are proposed: - A scheme resistant to ciphertext-only attacks (SCOA), based on the Fully Homomorphic Encryption Encapsulation Differential Expansion (FHEE-DE) algorithm. - A scheme resistant to known ciphertext attacks (KCA), utilizing the controllable redundancy of the LWE cryptosystem for embedding. - A scheme resistant to chosen ciphertext attacks (CCA), proposing a method based on Encryption Variable Refresh (EVR). Each scheme is described in detail, including its workflow, framework, and security analysis, aiming to achieve steganography applications at different security levels through these methods.