skip to main content
10.1145/2037252.2037270acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenario

Published:29 September 2011Publication History

ABSTRACT

The primary goal in this paper is to adapt and extend a recent concept and prototypical framework for (semi-)automated security verification of watermarking-based communication protocols based on the CASPER protocol modeling language and the FRD model checker. Therefore our paper extends the scope of watermarking research beyond signal processing and information theory investigations to include also protocol verification considerations as known e.g. from the field of cryptographic research. To be able to establish a clear picture of the potential prospects and the current restrictions of such a verification framework for watermarking-based communication protocols, we conceptualize, model, generate and (partially) verify an exemplary protocol for a complex watermarking-based application scenario that combines a multi-level data access structure and the assurance of the security aspects of confidentiality, authenticity and integrity. Our results show that, while the security aspects of communication confidentiality and entity-authenticity can actually be verified with the introduced approach, other security aspects which might be similarly verified are still lacking corresponding support in protocol modeling languages like CASPER.

References

  1. J. C. L. Pimental and R. Monroy: Formal support to security protocol development: A survey. Computacion y Sistemas, 12(1), 2008.Google ScholarGoogle Scholar
  2. J. Dittmann, S. Katzenbeisser, C. Schallhart, and H. Veith: Provably Secure Authentication of Digital Media Through Invertible Watermarks. Cryptology ePrint Archive, Report 2004/293, 2004. http://eprint.iacr.org/.Google ScholarGoogle Scholar
  3. C. Kraetzer, R. Merkel, R. Altschaffel, E. Clausing, M. Schott, J. Dittmann: Modelling Watermark Communication Protocols using the CASPER Modelling Language. Proc. of the ACM Workshop on Multimedia and Security, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. G. Lowe: CASPER: A Compiler for the Analysis of Security Protocols. J. of Computer Security, Society Press, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. FDR user manual. Formal Systems (Europe) Ltd., http://www.fsel.com/documentation/fdr2/html/, May, 7th 2011.Google ScholarGoogle Scholar
  6. N.P. Sheppard, R. Safavi-Naini, P. Ogumbona: On Multiple Watermarking, Proc. of the ACM Workshop on Multimedia and Security, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. NIST Special Publication 800--67 v1.1: Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, 2008.Google ScholarGoogle Scholar
  8. A. S. Tanenbaum: Computer Networks. 4th ed., Prentice Hall, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. P. Ryan, S. Schneider: Modelling and analysis of security protocols, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. K. Solanki, A. Sarkar, B. Manjunath: YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis. In Proc. of Information Hiding '07. Lecture Notes in Computer Science, Volume: 4567, Springer Berlin / Heidelberg, pp.16--31, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Lang: Audio Watermarking Benchmarking -- A Profile Based Approach. PhD Thesis. Otto-von-Guericke-University Magdeburg, Germany, Dept. of Computer Science, ISBN: 978--3--940961--22--8, 2007.Google ScholarGoogle Scholar
  12. D. X. Song: Athena: a new efficient automatic checker for security protocol analysis. In Proceedings of the Twelth IEEE Computer Security Foundations Workshop, pp. 192--202, IEEE Computer Society Press, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. D. E. Bell and L. J. LaPadula: Secure Computer Systems: Mathematical Foundations, MITRE Technical Report MTR-2547, Volume I, The Mitre Corporation, 1973.Google ScholarGoogle Scholar
  14. K. J. Biba: Integrity Considerations for Secure Computer Systems, MITRE Technical Report MTR-3153, The Mitre Corporation, 1977.Google ScholarGoogle Scholar
  15. D. F.C. Brewer and M. J. Nash: The Chinese wall security policy. In Proc. of the 1989 IEEE Computer Society Symposium on Security and Privacy, pp. 206--214, May 1989.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenario

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            MM&Sec '11: Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
            September 2011
            140 pages
            ISBN:9781450308069
            DOI:10.1145/2037252

            Copyright © 2011 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 29 September 2011

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate128of318submissions,40%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader