Security of Lattice-Based Data Hiding Against the Known Message Attack
نویسندگان
چکیده
منابع مشابه
Analysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack
Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...
متن کاملWorst-case additive attack against quantization-based data-hiding methods
The main goal of this study consists in the development of the worst case additive attack (WCAA) for quantization-based methods using as design criteria the bit error rate probability and the maximum achievable rate of reliable communications. Our analysis is focused on the practical scheme known as a distortion compensation dither modulation (DC-DM). From the mathematical point of view, the pr...
متن کاملExploiting Security Holes in Lattice Data Hiding
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quantified in an information-theoretic sense by means of the information leakage between the watermarked signals seen by the attacker and the secret key used in the embedding process. The theoretical analysis accomplished in the first ...
متن کاملA Universal Forgery of Hess's Second ID-based Signature against the Known-message Attack
In this paper we propose a universal forgery attack of Hess’s second IDbased signature scheme against the known-message attack.
متن کاملStrengthening of Data Security against its Attack
This paper specifies cryptographic algorithm Hybridizing Traditional Technology (H.T.T) which may be used to protect sensitive data. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. The algorithms uniquely define the mathematical steps required to transform data into a cryptograp...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2006
ISSN: 1556-6013,1556-6021
DOI: 10.1109/tifs.2006.885029