Analysis of Information Hiding Based on False Objects versus Attack Strategies

Ziquan Hu,Kun She,Shahzad Ali,Kai Yan
2012-01-01
Abstract:There are false objects in the information hiding field. The embedder can deploy false objects into digital signal to increase the hiding capability per embedded unit, protect its embedded secret information and minimize the expected damage, while the attacker hopes to maximize it. In this paper, 2-phase game can be applied to build the embedder-attacker system to analyze this conflicted issue. In the system, the embedder consumes its resource to build embedded units (EU) and insert secret information or false objects into EU. The attacker distributes its resource evenly to the attacked EU. The expected equilibrium damage, which is maximum damage in value from the point of the view of the attacker and minimum from the embedder, is evaluated by 2-phase game theory. Finally, compute the expected equilibrium damage, the optimal number of building EU and the optimal number of EU with the embedded secret information (ESI). The optimal equilibrium capacity of hiding information on the basis of false objects and attack strategies is calculated through the optimal number of EU with ESI. Keywords—2-Phase Game, Attack Strategies, Expected Equilibrium damage, False Objects, Information Hiding, Optimal Equilibrium Capacity.
What problem does this paper attempt to address?