Game theory could be used to analyze the conflicted issues in the field of information hiding. In this paper, 2-phase game can be used to build the embedder-attacker system to analyze the limits of hiding capacity of embedding algorithms: the embedder minimizes the expected damage and the attacker maximizes it. In the system, the embedder first consumes its resource to build embedded units (EU) and insert the secret information into EU. Then the attacker distributes its resource evenly to the attacked EU. The expected equilibrium damage, which is maximum damage in value from the point of view of the attacker and minimum from the embedder against the attacker, is evaluated by the case when the attacker attacks a subset from all the EU. Furth...
Fingerprinting,which is an important part of reconnaissance,the first stage of network attack killin...
In an accumulation game a Hider secretly distributes his given total wealth h>1 among n locations wh...
International audienceIn the inference attacks studied in Quantitative Information Flow (QIF), the a...
Abstract—Game theory could be used to analyze the conflicted issues in the field of information hidi...
International audienceWe consider a game-theoretic setting to model the interplay between attacker a...
Journal version of GameSec'17 paper (arXiv:1705.05030)International audienceA common goal in the are...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer En...
Today, information security in defender-attacker game models is getting more attention from the rese...
Abstract—Recently, content-adaptive steganography was mod-eled by Johnson et al. as a stochastic, tw...
Stackelberg security games have been widely deployed to protect real-word assets. The main solution ...
Today, people rely heavily on infrastructure networks. Attacks on infrastructure networks can lead t...
Abstract—Choosing a hard-to-guess secret is a prerequisite in many security applications. Whether it...
Abstract. We analyze a two-player zero-sum game between a steganographer, Alice, and a steganalyst, ...
International audienceIn the inference attacks studied in Quantitative Information Flow (QIF), the a...
Fingerprinting,which is an important part of reconnaissance,the first stage of network attack killin...
In an accumulation game a Hider secretly distributes his given total wealth h>1 among n locations wh...
International audienceIn the inference attacks studied in Quantitative Information Flow (QIF), the a...
Abstract—Game theory could be used to analyze the conflicted issues in the field of information hidi...
International audienceWe consider a game-theoretic setting to model the interplay between attacker a...
Journal version of GameSec'17 paper (arXiv:1705.05030)International audienceA common goal in the are...
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer En...
Today, information security in defender-attacker game models is getting more attention from the rese...
Abstract—Recently, content-adaptive steganography was mod-eled by Johnson et al. as a stochastic, tw...
Stackelberg security games have been widely deployed to protect real-word assets. The main solution ...
Today, people rely heavily on infrastructure networks. Attacks on infrastructure networks can lead t...
Abstract—Choosing a hard-to-guess secret is a prerequisite in many security applications. Whether it...
Abstract. We analyze a two-player zero-sum game between a steganographer, Alice, and a steganalyst, ...
International audienceIn the inference attacks studied in Quantitative Information Flow (QIF), the a...
Fingerprinting,which is an important part of reconnaissance,the first stage of network attack killin...
In an accumulation game a Hider secretly distributes his given total wealth h>1 among n locations wh...
International audienceIn the inference attacks studied in Quantitative Information Flow (QIF), the a...