Skip to main content

Information-Theoretic Analysis of Security in Side-Informed Data Hiding

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3727))

Abstract

In this paper a novel theoretical security analysis will be presented for data hiding methods with side-information, based on Costa’s dirty paper scheme. We quantify the information about the secret key that leaks from the observation of watermarked signals, using the mutual information as analytic tool for providing a fair comparison between the original Costa’s scheme, Distortion Compensated – Dither Modulation and Spread Spectrum.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Costa, M.H.M.: Writing on dirty paper. IEEE Transactions on Information Theory 29, 439–441 (1983)

    Article  MATH  Google Scholar 

  2. Shannon, C.E.: Communication theory of secrecy systems. Bell system technical journal 28, 656–715 (1949)

    MATH  MathSciNet  Google Scholar 

  3. Cayre, F., Fontaine, C., Furon, T.: Watermarking security: application to a WSS technique for still images. In: Cox, I.J., Kalker, T., Lee, H. (eds.) Third International Workshop on Digital Watermarking, Seoul, Korea, vol. 3304. Springer, Heidelberg (2004)

    Google Scholar 

  4. Comesaña, P., Pérez-Freire, L., Pérez-González, F.: Fundamentals of data hiding security and their application to Spread-Spectrum analysis. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 146–160. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Chen, B., Wornell, G.: Quantization Index Modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 47, 1423–1443 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  6. Eggers, J.J., Bäuml, R., Tzschoppe, R., Girod, B.: Scalar Costa Scheme for information embedding. IEEE Transactions on Signal Processing 51, 1003–1019 (2003)

    Article  MathSciNet  Google Scholar 

  7. Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley series in Telecommunications (1991)

    Google Scholar 

  8. Pérez-Freire, L., Pérez-Gonzalez, F., Voloshinovskiy, S.: Revealing the true achievable rates of Scalar Costa Scheme. In: IEEE Int. Workshop on Multimedia Signal Processing (MMSP), Siena, Italy, pp. 203–206 (2004)

    Google Scholar 

  9. Erez, U., Zamir, R.: Achieving \(\frac{1}{2}\)log(1+SNR) over the Additive White Gaussian Noise Channel with Lattice Encoding and Decoding. IEEE Transactions on Information Theory 50, 2293–2314 (2004)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pérez-Freire, L., Comesaña, P., Pérez-González, F. (2005). Information-Theoretic Analysis of Security in Side-Informed Data Hiding. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds) Information Hiding. IH 2005. Lecture Notes in Computer Science, vol 3727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558859_11

Download citation

  • DOI: https://doi.org/10.1007/11558859_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29039-1

  • Online ISBN: 978-3-540-31481-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics