Abstract
In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name oracle channels. By exploiting information-theoretic notions, we show how to modify detection/authentication watermarking algorithms in order to counteract oracle attacks. We present three proposals, one based on randomization, another one based on time delay and a third one based on both randomization and delay.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Charikar, M.: Similarity estimation techniques from rounding algorithms. In: Proceedings of STOC 2002, pp. 380–388. ACM, New York (2002)
Choubassi, M.E., Moulin, P.: New sensitivity analysis attack. In: Proceedings of International Symposium on Electronic Imaging, Security and Watermarking of Multimedia Contents VII, March 2005, pp. 734–745. IS&T/SPIE (2005)
Cover, T., Thomas, J.: Elements of Information Theory. John Wiley and Sons, New York (1991)
Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann Pub., Academic Press (2002)
Furon, T., Venturini, I., Duhamel, P.: An unified approach of asymmetric watermarking schemes. In: Proceedings of International Symposium on Electronic Imaging, Security and Watermarking of Multimedia Contents III, January 2001, pp. 269–279. IS&T/SPIE (2001)
Kalker, T., Linnartz, J.-P., van Dijk, M.: Watermark estimation through detector analysis. In: Proceedings of ICIP 1998, vol. 1, pp. 425–429. IEEE, Los Alamitos (1998)
Kalker, T., Haitsma, J., Oosteveen, J.: Issues with digital watermarking and perceptual hashing (2001)
Linnartz, J.-P., van Dijk, M.: Analysis of the sensitivity attack against electronic watermarks in images. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 258–272. Springer, Heidelberg (1998)
Millen, J.: 20 years of covert channel modeling and analysis. In: Proceedings of Symposium on Security and Privacy, pp. 113–114. IEEE, Los Alamitos (1999)
Moskowitz, I., Kang, M.: Covert channels - here to stay? In: Proceedings of COMPASS 1994, pp. 235–243. IEEE, Los Alamitos (1994)
Moulin, P., O’Sullivan, J.: Information-theoretic analysis of watermarking. In: Proceedings of ICASSP 2000, June 2000. IEEE, Los Alamitos (2000)
Moulin, P., O’Sullivan, J.: Information-theoretic analysis of information hiding. IEEE Trans. on Information Theory 49(3), 563–593 (2003)
Perez-Freire, L., Comesana-Alfaro, P., Perez-Gonzales, F.: Detection in quantization-based watermarking: performance and security issues. In: Proceedings of International Symposium on Electronic Imaging, Security and Watermarking of Multimedia Contents VII, March 2005, pp. 721–733. IS&T/SPIE (2005)
Simmons, G.J.: Subliminal channels; past and present. European Trans. on Telecommunications 5(4), 459–473 (1994)
Tewfik, A., Mansour, M.: Secure watermark detection with non-parametric decision boundaries. In: Proceedings of ICASSP 2002, May 2002, pp. 2089–2092 (2002)
Venturini, I.: Counteracting oracle attacks. In: Proceedings of MM&Sec 2004, pp. 187–192. ACM, New York (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Venturini, I. (2005). Oracle Attacks and Covert Channels. In: Barni, M., Cox, I., Kalker, T., Kim, HJ. (eds) Digital Watermarking. IWDW 2005. Lecture Notes in Computer Science, vol 3710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11551492_14
Download citation
DOI: https://doi.org/10.1007/11551492_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28768-1
Online ISBN: 978-3-540-32052-4
eBook Packages: Computer ScienceComputer Science (R0)