Secrecy of Steganographic Matrix Embedding Phillip

نویسنده

  • A. Regalia
چکیده

the secure embedding scheme (see Section II), it is hard to generate a watermarked version of c which has a low correlation with k 0. An estimation attack usually yields a watermarked object that still correlates well with k 0 ; a judge will reject the accusation on such an object, as it can only originate from a malicious seller (k 0 is only available to the seller). • Finally, can attempt to cheat in step 6 by submitting the customer a wrongly encrypted watermark E K (nkw 8 k). However, this is detected by the client in step 7 by checking the integrity of the transaction number contained therein. IV. CONCLUSION In this correspondence, we proposed a buyer–seller protocol that utilizes the concepts of secure watermark embedding. In contrast to the known solutions, which use homomorphic public-key encryption on the content and impose unpractical constraints on computational resources and transmission bandwidth, our protocol is efficient due to the use of recent secure embedding algorithms. REFERENCES [1] N. Memon and P. Wang, " A buyer-seller watermarking protocol, " IEEE Trans. An anonymous buyer-seller watermarking protocol with anonymity control, " in Information Security and Cryptology, ser. Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party, " in Proc. 1st Int. A generalization of an anonymous buyer-seller watermarking protocol and its application to mobile communications , " in Proc. 3rd Int. Workshop Digital Watermarking, ser. Lect. An efficient and anonymous buyer-seller watermarking protocol, " IEEE Trans. Abstract—Some recent information-hiding schemes are scrutinized in terms of their cryptographic secrecy. The schemes under study appeal to the so-called matrix embedding strategy, designed to optimize embedding capacity under distortion constraints, as opposed to any cryptographic measure. Nonetheless, we establish conditions under which a key equivo-cation function is optimal, and show that under reasonable key generation models, a perfect secrecy property is nearly satisfied, limited by a mutual information measure that decreases exponentially with the block length.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Filter Parametric Control Approach to Embedding Capacity in Adaptive Steganography*

Adaptive steganography comes closer to the ideal of steganography since it exploits the natural variations in the pixel intensities of a cover image to better hide the secret message. Most of the adaptive steganographic methods in the literature use local features of an image for embedding the message, which are easily attacked. In this paper a new method of adaptive steganography is proposed, ...

متن کامل

Security Measurements of Steganographic Systems

Different security measurements for a steganographic system, i.e. security (detectability), robustness and secrecy (difficulty of extraction), are discussed in this paper. We propose a new measurement for the security of stegosystems using variational distance which can upper bound the advantage for passive attackers. It is proved that the hiding capacity, which is also the measurement for robu...

متن کامل

Steganalysis of embedding in difference of image pixel pairs by neural network

In this paper a steganalysis method is proposed for pixel value differencing method. This steganographic method, which has been immune against conventional attacks, performs the embedding in the difference of the values of pixel pairs. Therefore, the histogram of the differences of an embedded image is di_erent as compared with a cover image. A number of characteristics are identified in the di...

متن کامل

A Robust Audio Steganographic Scheme in Time Domain (RASSTD)

Digital Steganograpic techniques hide secret messages in a cover media (mostly image, audio or video) in an imperceptible manner which cannot be detected by unintended recipient. In addition to imperceptibility, security, capacity and robustness are the other major challenges for an effective steganographic technique. This article proposes a novel steganographic method, considering maximum secr...

متن کامل

Enhancing and Constructing Two Way Matrix Embedding For Efficient Embedding

In designing steganographic schemes, matrix embedding is an efficient method for increasing the embedding efficiency that is defined as an average number of bits embedded via per change on the cover. Matrix embedding is a previously introduced coding method that is used in steganography to improve the embedding efficiency (increase the number of bits embedded per embedding change). Higher embed...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008