Abstract—Game theory could be used to analyze the conflicted issues in the field of information hiding. In this paper, 2-phase game can be used to build the embedder-attacker system to analyze the limits of hiding capacity of embedding algorithms: the embedder minimizes the expected damage and the attacker maximizes it. In the system, the embedder first consumes its resource to build embedded units (EU) and insert the secret information into EU. Then the attacker distributes its resource evenly to the attacked EU. The expected equilibrium damage, which is maximum damage in value from the point of view of the attacker and minimum from the embedder against the attacker, is evaluated by the case when the attacker attacks a subset from all the ...
Abstract—Choosing a hard-to-guess secret is a prerequisite in many security applications. Whether it...
Abstract. We analyze a two-player zero-sum game between a steganographer, Alice, and a steganalyst, ...
Most models of Stackelberg security games assume that the attacker only knows the defender’s mixed s...
Game theory could be used to analyze the conflicted issues in the field of information hiding. In th...
A common goal in the areas of secure information flow and privacy is to build effective defenses aga...
International audienceWe consider a game-theoretic setting to model the interplay between attacker a...
Today, information security in defender-attacker game models is getting more attention from the rese...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer En...
Today, people rely heavily on infrastructure networks. Attacks on infrastructure networks can lead t...
Abstract—Recently, content-adaptive steganography was mod-eled by Johnson et al. as a stochastic, tw...
Stackelberg security games have been widely deployed to protect real-word assets. The main solution ...
In an accumulation game a Hider secretly distributes his given total wealth h>1 among n locations wh...
In the inference attacks studied in Quantitative Information Flow (QIF), the attacker typically trie...
International audienceIn the inference attacks studied in Quantitative Information Flow (QIF), the a...
Abstract—Choosing a hard-to-guess secret is a prerequisite in many security applications. Whether it...
Abstract. We analyze a two-player zero-sum game between a steganographer, Alice, and a steganalyst, ...
Most models of Stackelberg security games assume that the attacker only knows the defender’s mixed s...
Game theory could be used to analyze the conflicted issues in the field of information hiding. In th...
A common goal in the areas of secure information flow and privacy is to build effective defenses aga...
International audienceWe consider a game-theoretic setting to model the interplay between attacker a...
Today, information security in defender-attacker game models is getting more attention from the rese...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer En...
Today, people rely heavily on infrastructure networks. Attacks on infrastructure networks can lead t...
Abstract—Recently, content-adaptive steganography was mod-eled by Johnson et al. as a stochastic, tw...
Stackelberg security games have been widely deployed to protect real-word assets. The main solution ...
In an accumulation game a Hider secretly distributes his given total wealth h>1 among n locations wh...
In the inference attacks studied in Quantitative Information Flow (QIF), the attacker typically trie...
International audienceIn the inference attacks studied in Quantitative Information Flow (QIF), the a...
Abstract—Choosing a hard-to-guess secret is a prerequisite in many security applications. Whether it...
Abstract. We analyze a two-player zero-sum game between a steganographer, Alice, and a steganalyst, ...
Most models of Stackelberg security games assume that the attacker only knows the defender’s mixed s...