Abstract
In this paper a novel theoretical security analysis will be presented for data hiding methods with side-information, based on Costa’s dirty paper scheme. We quantify the information about the secret key that leaks from the observation of watermarked signals, using the mutual information as analytic tool for providing a fair comparison between the original Costa’s scheme, Distortion Compensated – Dither Modulation and Spread Spectrum.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Costa, M.H.M.: Writing on dirty paper. IEEE Transactions on Information Theory 29, 439–441 (1983)
Shannon, C.E.: Communication theory of secrecy systems. Bell system technical journal 28, 656–715 (1949)
Cayre, F., Fontaine, C., Furon, T.: Watermarking security: application to a WSS technique for still images. In: Cox, I.J., Kalker, T., Lee, H. (eds.) Third International Workshop on Digital Watermarking, Seoul, Korea, vol. 3304. Springer, Heidelberg (2004)
Comesaña, P., Pérez-Freire, L., Pérez-González, F.: Fundamentals of data hiding security and their application to Spread-Spectrum analysis. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 146–160. Springer, Heidelberg (2005)
Chen, B., Wornell, G.: Quantization Index Modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 47, 1423–1443 (2001)
Eggers, J.J., Bäuml, R., Tzschoppe, R., Girod, B.: Scalar Costa Scheme for information embedding. IEEE Transactions on Signal Processing 51, 1003–1019 (2003)
Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley series in Telecommunications (1991)
Pérez-Freire, L., Pérez-Gonzalez, F., Voloshinovskiy, S.: Revealing the true achievable rates of Scalar Costa Scheme. In: IEEE Int. Workshop on Multimedia Signal Processing (MMSP), Siena, Italy, pp. 203–206 (2004)
Erez, U., Zamir, R.: Achieving \(\frac{1}{2}\)log(1+SNR) over the Additive White Gaussian Noise Channel with Lattice Encoding and Decoding. IEEE Transactions on Information Theory 50, 2293–2314 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pérez-Freire, L., Comesaña, P., Pérez-González, F. (2005). Information-Theoretic Analysis of Security in Side-Informed Data Hiding. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds) Information Hiding. IH 2005. Lecture Notes in Computer Science, vol 3727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558859_11
Download citation
DOI: https://doi.org/10.1007/11558859_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29039-1
Online ISBN: 978-3-540-31481-3
eBook Packages: Computer ScienceComputer Science (R0)