## Security of lattice-based data hiding against the Known Message Attack (2006)

### Cached

### Download Links

- [www.irisa.fr]
- [www.gts.tsc.uvigo.es]
- []
- [www.gts.tsc.uvigo.es]
- DBLP

### Other Repositories/Bibliography

Venue: | IEEE Transactions on Information Forensics and Security |

Citations: | 12 - 8 self |

### BibTeX

@ARTICLE{Pérez-freire06securityof,

author = {Luis Pérez-freire and O Pérez-gonzález and Teddy Furon and Pedro Comesaña},

title = {Security of lattice-based data hiding against the Known Message Attack},

journal = {IEEE Transactions on Information Forensics and Security},

year = {2006},

pages = {421--439}

}

### OpenURL

### Abstract

Abstract—Security of quantization index modulation (QIM) watermarking methods is usually sought through a pseudorandom dither signal which randomizes the codebook. This dither plays the role of the secret key (i.e., a parameter only shared by the watermarking embedder and decoder), which prevents unauthorized embedding and/or decoding. However, if the same dither signal is reused, the observation of several watermarked signals can provide sufficient information for an attacker to estimate the dither signal. This paper focuses on the cases when the embedded messages are either known or constant. In the first part of this paper, a theoretical security analysis of QIM data hiding measures the information leakage about the secret dither as the mutual information between the dither and the watermarked signals. In the second part, we show how set-membership estimation techniques successfully provide accurate estimates of the dither from observed watermarked signals. The conclusion of this twofold study is that current QIM watermarking schemes have a relative low security level against this scenario because a small number of observed watermarked signals yields a sufficiently accurate estimate of the secret dither. The analysis presented in this paper also serves as the basis for more involved scenarios. Index Terms—Equivocation, lattice data hiding, mutual information, quantization index modulation, set-membership estimation, watermarking security. I.

### Citations

8563 | Elements of Information Theory - Cover, Thomas - 1991 |

792 |
Communication Theory of Secrecy systems
- Shannon
- 1949
(Show Context)
Citation Context ...t key which leaks from the watermarked content, using the mutual information and conditional entropy as measures, following the information-theoretic approach for cryptosystems proposed by Shannon in =-=[5]-=-—this approach is based on computing the entropy of the key conditioned on the encrypted messages observed by the attacker; when the conditional entropy is null, it means that the attacker has gathere... |

769 | Semidefinite programming - VANDENBERGHE, BOYD - 1996 |

736 | SeDuMi 1.02, a MATLAB toolbox for optimizing over symmetric cones - Sturm - 1999 |

671 | Writing on dirty paper - Costa - 1983 |

356 | Quantization index modulation: A class of provably good methods for digital watermarking and information embedding - Chen, Wornell |

341 | Interior point polynomial algorithms in convex programming - Nesterov, Nemirovskii - 1994 |

265 | Spoken Language Processing – A Guide to Theory - Huang, Acero, et al. - 2001 |

178 | An Introduction to Probability Theory and Its Applications. 3rd ed - Feller - 1968 |

168 | A toolbox for modeling and optimization - Löfberg - 2004 |

91 | Communication theory of secrecy systems. Bell system technical journal - Shannon - 1949 |

89 | A simple converse for broadcast channels with additive white Gaussian noise - Bergmans - 1974 |

88 | Scalar costa scheme for information embedding - Eggers, Bauml, et al. - 2003 |

72 | On lattice quantization noise - Zamir, Feder - 1996 |

68 | The foundations of set theoretic estimation - Combettes - 1993 |

63 | Fast quantizing and decoding algorithms for lattice quantizers and codes - Conway, Sloane - 1982 |

61 | Copy protection for DVD video - Bloom, Cox, et al. - 1999 |

61 | La Cryptographie Militaire”, Journal des Sciences Militaires, vol.9 (February 1883 - Kerckhoffs - 2000 |

56 | Voronoi regions of lattices, second moments of polytopes, and quantization - Conway, Sloane - 1982 |

56 | Lattices which are good for (almost) everything - Erez, Litsyn, et al. - 2005 |

46 |
Watermarking security: Theory and practice
- Cayre, Fontaine, et al.
- 2005
(Show Context)
Citation Context ...d in the projected domain for improving the security of the scheme. Ignorance of the projection matrix invalidates direct application of the estimation algorithms proposed here; however, recent works =-=[2]-=-, [12] have shown that independent component analysis (ICA) may be used for estimating the projection matrix. Thus, if ICA is successful, dither estimators may be applied in a second step. 3) Total ig... |

37 | Blind watermarking applied to image authentication - Eggers, Girod - 2001 |

36 | Dither signals and their effect on quantization noise - Schuchman - 1964 |

31 |
Elements of Information Theory, ser. Wiley series in telecommunications
- Cover, Thomas
- 1991
(Show Context)
Citation Context ... pdf uniformly distributed in , that is where we have made use of the mutual independence between and the embedded messages, also assumed to be mutually independent. Here, is the differential entropy =-=[6]-=- of the random variable , and the second term of (7) is the residual entropy or equivocation of the dither after observations, following Shannon’s nomenclature [5]. The equivocation measures the remai... |

29 | On the existence of similar sublattices - Conway, Rains, et al. - 1999 |

27 | Considerations on watermarking security - Kalker - 2001 |

22 | 1989], ‘Set membership identification in digital signal processing - Deller |

21 |
T.: A general framework for robust watermarking security. Signal Processing, pp. 2069–2084 (2003) In fact, the marking assumption is even stronger than the robustness assumption, as it requires robustness against adversaries in possession of differently m
- Barni, Bartolini, et al.
(Show Context)
Citation Context ...index modulation, set-membership estimation, watermarking security. I. INTRODUCTION RECENTLY, the basis of cryptanalysis has been cast to data hiding to establish the concept of watermarking security =-=[1]-=-–[3]. It assumes that all details of the watermarking technique are publicly known except the so-called secret key parameter of the embedding and decoding processes, according to Kerckhoffs’ principle... |

19 | Fundamentals of data hiding security and their application to spread-spectrum analysis
- Comesaña, Pérez-Freire, et al.
(Show Context)
Citation Context ...x modulation, set-membership estimation, watermarking security. I. INTRODUCTION RECENTLY, the basis of cryptanalysis has been cast to data hiding to establish the concept of watermarking security [1]–=-=[3]-=-. It assumes that all details of the watermarking technique are publicly known except the so-called secret key parameter of the embedding and decoding processes, according to Kerckhoffs’ principle [4]... |

18 |
Security Pitfalls of Frame-by-Frame Approaches toVideo Watermarking
- Doërr, Dugelay
- 2004
(Show Context)
Citation Context .... Watermarking security under this viewpoint is also briefly addressed in [7, Sec. 10]. Other notable works dealing with the security of spread-spectrum schemes concentrate on the practical part [8], =-=[9]-=-. As for quantization-based data hiding, preliminary studies of the theoretical part have shown the existence of information leakages [10], while on the practical part, we are aware of two works: firs... |

18 | Exact recursive polyhedral description of the feasible parameter set for bounded-error models - Walter, Piet-Lahanier |

17 | M.: Cryptanalysis of discrete-sequence spread spectrum watermarks
- Mıhçak, Venkatesan, et al.
- 2002
(Show Context)
Citation Context ...] [3]. Watermarking security under this viewpoint is also briefly addressed in [7, Sec. 10]. Other notable works dealing with the security of spread-spectrum schemes concentrate on the practical part =-=[8]-=-, [9]. As for quantization-based data hiding, preliminary studies of the theoretical part have shown the existence of information leakages [10], while on the practical part, we are aware of two works:... |

17 | An optimal volume ellipsoid algorithm for parameter estimation - Cheung, Yurkovich, et al. - 1993 |

16 | Estimation of amplitude modifications before SCS watermark detection - Eggers, Bäuml, et al. - 2002 |

15 | Multidimensional constellations – Part II: Voronoi constellations - Forney - 1989 |

12 | Data hiding codes - Moulin, Koetter - 2005 |

12 | Informationtheoretic analysis of security in side-informed data hiding
- Pérez-Freire, Comesaña, et al.
(Show Context)
Citation Context ...spread-spectrum schemes concentrate on the practical part [8], [9]. As for quantization-based data hiding, preliminary studies of the theoretical part have shown the existence of information leakages =-=[10]-=-, while on the practical part, we are aware of two works: first, the work by Eggers et al. [11], although their motivation was not the security analysis but the robustness improvement of the scalar co... |

12 | Temporal synchronization in video watermarking - Lin, Delp - 2004 |

8 | La cryptographie militaire,” Journal des sciences militaires 9 - Kerckhoff - 1883 |

8 | On testing convexity and submodularity - Parnas, Ron, et al. - 2003 |

5 | Security of DM quantization watermarking schemes: a practical study for digital images - Bas, Hurri - 2005 |

5 | Spread-spectrum vs. quantization-based data hiding: Misconceptions and implications - Pérez-Freire, Pérez-González - 2005 |

5 | Watermarking Security: A Survey - Perez-Freire, Comesana, et al. - 2006 |

5 | On Distortion-compensated dither modulation datahiding with repetition coding - Comesana, Perez-Gonzalez, et al. - 2006 |

4 | Exploiting security holes in lattice data hiding - Pérez-Freire, Pérez-Gonzales |

3 | Joop Talstra, Geert Depovere, Jaap Haitsma, Digital watermarking for DVD video copy protection - Maes, Kalker, et al. |

3 | Achieving 1 log(1+SNR) over the Additive White Gaussian Noise Channel with Lattice Encoding and Decoding - Erez, Zamir - 2004 |

3 | Speech watermarking with objective fidelity and robustness criteria - Gurijala, Deller - 2003 |

3 | Secret Dither Estimation in Lattice-Quantization Data-Hiding: A Set-Membership Approach - Pérez-Freire, Pérez-González, et al. |

1 |
La cryptographic militaire
- Kerckhoffs
- 1883
(Show Context)
Citation Context ...[3]. It assumes that all details of the watermarking technique are publicly known except the so-called secret key parameter of the embedding and decoding processes, according to Kerckhoffs’ principle =-=[4]-=-. Hence, security only relies on whether (or more realistically, for how long) the secret key will remain secret. This framework for security assessment of watermarking schemes is twofold. We assume t... |