Catálogo de publicaciones - libros

Compartir en
redes sociales


Information Hiding: 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers

Jan L. Camenisch ; Christian S. Collberg ; Neil F. Johnson ; Phil Sallee (eds.)

En conferencia: 8º International Workshop on Information Hiding (IH) . Alexandria, VA, USA . July 10, 2006 - July 12, 2006

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Data Encryption; Management of Computing and Information Systems; Computers and Society; Information Systems Applications (incl. Internet); Systems and Data Security; Computer Communication Networks

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-74123-7

ISBN electrónico

978-3-540-74124-4

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2007

Tabla de contenidos

Modified Matrix Encoding Technique for Minimal Distortion Steganography

Younhee Kim; Zoran Duric; Dana Richards

It is well known that all information hiding methods that modify the least significant bits introduce distortions into the cover objects. Those distortions have been utilized by steganalysis algorithms to detect that the objects had been modified. It has been proposed that only coefficients whose modification does not introduce large distortions should be used for embedding. In this paper we propose an efficient algorithm for information hiding in the LSBs of JPEG coefficients. Our algorithm uses modified matrix encoding to choose the coefficients whose modifications introduce minimal embedding distortion. We derive the expected value of the embedding distortion as a function of the message length and the probability distribution of the JPEG quantization errors of cover images. Our experiments show close agreement between the theoretical prediction and the actual embedding distortion. Our algorithm can be used for both steganography and fragile watermarking as well as in other applications in which it is necessary to keep the distortion as low as possible.

- Video Watermarking by Using Geometic Warping Without Visible Artifacts | Pp. 314-327

Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting

Jae-Min Seol; Seong-Whan Kim

Digital fingerprinting is a technique to prevent customers from redistributing multimedia contents illegally. Main attack for fingerprinting is the collusion attack, where multiple users collude by creating an average or median of their individual fingerprinted copies, and escape identification. Previous research such as ACC (anti-collusion code) cannot support large number of users, and also vulnerable to LCCA (linear combination collusion attack). We present a practical SACC (scalable ACC) scheme to generate codebooks for supporting large number of users; and angular decoding scheme to be robust on LCCA. We implemented the SACC codebook using a Gaussian distributed random variable for various attack robustness, and the fingerprint embedding using human visual system based watermarking scheme. We experimented with standard test images for collusion detection performance, and it shows good collusion detection performance over average, median attacks. For LCCA collusion attack on SACC, our angular decoding scheme identifies the correct colluder set under various WNR (watermark to noise ratio).

- Video Watermarking by Using Geometic Warping Without Visible Artifacts | Pp. 328-342

A Collusion-Resistant Video Watermarking Scheme

Amir Houmansadr; Shahrokh Ghaemmaghami

A video watermarking scheme is proposed in this paper using the concept of the secret sharing scheme. The owner’s mark is split into twin shares, where the shares are inserted into the video frames in the spatial domain in a simple manner. The detection algorithm uses a linear function applied to the twin shares to reconstruct the secret. This makes the watermarked video sequence robust against pirate attacks, such as frame averaging and frame swapping. Due to the compatibility of the exploited secret sharing scheme to geometrical distortions, the watermarking system is also robust to this kind of processing schemes. On account of insertion of various marks into different frames, which are linearly related, the watermarked sequence is robust to collusion attack that is a major concern in the field of video watermarking.

- Video Watermarking by Using Geometic Warping Without Visible Artifacts | Pp. 343-354

An Elliptic Curve Backdoor Algorithm for RSASSA

Adam Young; Moti Yung

We present the first (1,2)-SETUP algorithm for the RSA digital signature scheme with appendix. A SETUP algorithm ′ is an algorithmic modification of algorithm that (1) contains an asymmetric backdoor that can only be used by the designer, even if the backdoor algorithm is fully public, and (2) ensures that the public outputs of and ′ are computationally indistinguishable under black-box queries. The SETUP is presented in RSASSA-PSS and it transmits the RSA private key within two w.l.o.g consecutive digital signatures. This problem has been solved for DSA and other discrete-log based digital signature algorithms, but not RSA. We therefore solve a long-standing problem in kleptography.

- Video Watermarking by Using Geometic Warping Without Visible Artifacts | Pp. 355-374

A Subliminal-Free Variant of ECDSA

Jens-Matthias Bohli; María Isabel González Vasco; Rainer Steinwandt

A mode of operation of the Elliptic Curve Digital Signature Algorithm (ECDSA) is presented which provably excludes subliminal communication through ECDSA signatures. For this, the notion of a signature scheme that is is introduced which can be seen as generalizing and being intermediate to the established concepts of and .

Motivated by the proposed use of ECDSA for signing passports, our focus is not on proving the mere existence of a subliminal-free ECDSA mode of operation, but on demonstrating its practical potential. The proposed construction relies on the availability of a party acting as warden and on a reasonably-sized non-interactive proof of subliminal-freeness. For instance, in the passport scenario, the passport holder plays the role of the warden, and we show that a suitable combination of the pseudo random function of Naor and Reingold with bit commitments and non-interactive zero-knowledge proofs can be used for accomplishing the required proof of subliminal-freeness with acceptable efficiency.

- Video Watermarking by Using Geometic Warping Without Visible Artifacts | Pp. 375-387