Abstract
The paper is structured into three main parts. In the first part, we focus on information leakage through new covert channels, we term oracle channels, which occur in case oracle attacks are performed on watermarked digital media or multimedia. In the second part, we show how to counteract oracle channels without resorting to protection tools that are quite demanding for communication networks. In the third part, we follow the information-theoretic approach to show that the countermeasures proposed in the second part do reduce the secret information leakage that flows through oracle channels, without sensibly compromising the detector reliability in case no oracle attack is performed.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Simmons, G.J.: Subliminal Channels: Past and Present. European Trans. on Telecommunications 5(4), 459–473 (1994)
Millen, J.: 20 years of covert channel modeling and analysis. In: Proceedings of Symposium on Security and Privacy, pp. 113–114. IEEE Computer Society Press, Los Alamitos (1999)
Moskowitz, I., Kang, M.: Covert channels - here to stay. In: Proceedings of COMPASS 1994, pp. 235–243. IEEE, Los Alamitos (1994)
Lampson, B.W.: A Note on the Confinment Problem. Comm. ACM 16, 613–615 (1973)
Provos, N., Honeyman, P.: Detecting Steganographic Content on the Internet. IEEE Trans. on Information Theory 49(3), 563–593 (2003)
Tumoian, E., Anikeev, M.: Network Based Detection of Passive Covert Channels in TCP/IP. In: Proceedings of the IEEE Conference on Local Computer Networks 30th Anniversary, pp. 802–809. IEEE, Los Alamitos (2005)
Ahsan, K., Kundur, D.: Practical Data hiding in TCP/IP. In: Proceedings of Workshop on multimedia Security at ACM Multimedia 2002, ACM Press, New York (2002)
Servetto, S.D., Vetterli, M.: Communication Using Phantoms: Covert Channels in the Internet. In: Proceedings IEEE International Symposium on Information Theory (ISIT), USA (2001)
Li, S., Ephremides, A.: A Network Layer Covert Channel in Ad-hoc Wireless Networks. In: Proceedings of Int. Conf. on Image Processing 1998 (ICIP 1998), vol. 1, pp. 88–96. IEEE, Los Alamitos (2004)
Shnayder, V.: Opportunities for Language Based Information Flow Security in Sensor Networks (2004)
Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)
Jajodia, S., Meadows, C.: Inference Problems in Multilevel Secure Database Management Systems. Information Security 570–585 (1991)
Zeng, W., Lan, J., Zhuang, X.: Network friendly media security: rationales, solutions and open issues. In: Proceedings IEEE Int. Conf. on Image Processing (ICIP 2004), IEEE, Singapore (2004)
Barni, M., Bartolini, F., Furon, T.: A general framework for robust watermarking security. Signal Processing, Elsevier, special issue on Security of Data Hiding Technologies, vol. 83, pp. 2069–2084 (invited paper) (2003)
Barni, M., Bartolini, F.: Watermarking Systems Engineering: Enabling Digital Assets Security and other Applications. Dekker Inc (2004)
Cayre, F., Fontaine, C., Furon, T.: Watermarking security part I: Theory. In: Delp, E.J., Wong, P.W. (eds.) Proc. SPIE-IS&T Electronic Imaging. SPIE, San Jose, CA, USA (2005)
Cayre, F., Fontaine, C., Furon, T.: Watermarking security part II: Practice. In: Delp, E.J., Wong, P.W. (eds.) Proc. SPIE-IST Electronic Imaging. SPIE, San Jose, CA, USA (2005)
Furon, T.: A survey of watermarking security. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 201–215. Springer, Heidelberg (2005)
Fridrich, J., Goljan, M.: Practical steganalysis of digital images: state of the art. In: Proceedings of SPIE Photonics West, vol. 4675, pp. 1–13 (2002)
Linnartz, J.-P., van Dijk, M.: Analysis of the sensitivity attack against electronic watermarks in images. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 258–272. Springer, Heidelberg (1998)
Kalker, T., Linnartz, J.-P., van Dijk, M.: Watermark estimation through detector analysis. In: Proc. of Int. Conf. on Image Processing 1998 (ICIP 1998), vol. 1, pp. 425–429. IEEE, Los Alamitos (1998)
Choubassi, M.E., Moulin, P.: New sensitivity analysis attack. In: Proceedings of International Symposium on Electronic Imaging, Security and Watermarking of Multimedia Contents VII. IS&T/SPIE, pp. 734–745 (2005)
Comesana, P., Perez-Freire, L., Perez-Gonzalez, F.: The Return of the Sensitivity Attack. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 260–274. Springer, Heidelberg (2005)
Perez-Freire, L., Comesana-Alfaro, P., Perez-Gonzales, F.: Detection in quantization-based watermarking: performance and security issues. In: Proceedings of International Symposium on Electronic Imaging, Security and Watermarking of Multimedia Contents VII. IS&T/SPIE, pp. 721–733 (2005)
Venturini, I.: Counteracting oracle attacks. In: Proc. of the Multimedia and Security Work. 2004 (MM and Sec 2004), pp. 187–192. ACM Press, Magdeburg, Germany (2004)
Venturini, I.: Oracle attacks and covert channels. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 171–185. Springer, Heidelberg (2005)
Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann Pub., Academic Press (2002)
Moulin, P., O’Sullivan, J.: Information-theoretic analysis of watermarking. In: Proc. of Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP 2000), IEEE, Los Alamitos (2000)
Moulin, P., O’Sullivan, J.: Information-theoretic analysis of information hiding. IEEE Trans. on Information Theory 49(3), 563–593 (2003)
Furon, T., Venturini, I., Duhamel, P.: An unified approach of asymmetric watermarking schemes. In: Proceedings of International Symposium on Electronic Imaging, Security and Watermarking of Multimedia Contents III. IS&T/SPIE, pp. 269–279 (2001)
Furon, T., Macq, B., Hurley, B., Silvestre, G.: JANIS: Just Another N-order side-Informed watermarking Scheme. In: Proceedings of IEEE International Conf. on Image Processing, ICIP 2002, vol. 3, pp. 153–156. IEEE, NY, USA (2002)
Tewfik, A., Mansour, M.: Secure watermark detection with non-parametric decision boundaries. In: Proc. of Int. Conf. on Acoustics, Speech and Signal Processing 2002 (ICASSP 2002), pp. 2089–2092. IEEE, Los Alamitos (2002)
Kalker, T., Haitsma, J., Oosteveen, J.: Issues with digital watermarking and perceptual hashing (2001)
Charikar, M.: Similarity estimation techniques from rounding algorithms. In: Proceedings of STOC 2002, pp. 380–388. ACM, New York (2002)
Kulyukin, V.A., Bookstein, A.: Integrated Object Recognition with Extended Hamming Distance (2000)
Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn. MIT Press and McGraw Hill (2001)
Mittelholzer, T.: An information-theoretic approach to steganography and watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 1–17. Springer, Heidelberg (2000)
Fabris, F.: Teoria dell’informazione, codici, cifrari. Boringhieri (2001)
Cover, T., Thomas, J.: Elements of Information Theory. John Wiley and Sons, New York (1991)
Maurer, U.M.: Authentication Theory and Hypothesis Testing. IEEE Transactions on Information Theory 46(4), 1350–1356 (2000)
Cachin, C.: An Information-Theoretic Model for Steganography. Information and Computation 192, 41–56 (2004)
Chandramouli, R., Subbalakshmi, K.P.: Current Trends in Steganalysis: A Critical Survey (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Venturini, I. (2008). Oracle Channels. In: Shi, Y.Q. (eds) Transactions on Data Hiding and Multimedia Security III. Lecture Notes in Computer Science, vol 4920. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69019-1_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-69019-1_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69016-0
Online ISBN: 978-3-540-69019-1
eBook Packages: Computer ScienceComputer Science (R0)