Skip to Main content Skip to Navigation
Journal articles

Security of Lattice-Based Data Hiding Against the Known Message Attack

Abstract : Security of quantization index modulation (QIM) watermarking methods is usually sought through a pseudorandom dither signal which randomizes the codebook. This dither plays the role of the secret key (i.e., a parameter only shared by the watermarking embedder and decoder), which prevents unauthorized embedding and/or decoding. However, if the same dither signal is reused, the observation of several watermarked signals can provide sufficient information for an attacker to estimate the dither signal. This paper focuses on the cases when the embedded messages are either known or constant. In the first part of this paper, a theoretical security analysis of QIM data hiding measures the information leakage about the secret dither as the mutual information between the dither and the watermarked signals. In the second part, we show how set-membership estimation techniques success- fully provide accurate estimates of the dither from observed wa- termarked signals. The conclusion of this twofold study is that cur- rent QIM watermarking schemes have a relative low security level against this scenario because a small number of observed water- marked signals yields a sufficiently accurate estimate of the secret dither. The analysis presented in this paper also serves as the basis for more involved scenarios.
Complete list of metadata

Cited literature [39 references]  Display  Hide  Download
Contributor : Teddy Furon Connect in order to contact the contributor
Submitted on : Tuesday, March 29, 2011 - 3:26:02 PM
Last modification on : Thursday, January 20, 2022 - 4:18:40 PM
Long-term archiving on: : Thursday, June 30, 2011 - 2:49:31 AM


Files produced by the author(s)


  • HAL Id : inria-00580872, version 1


Luis Pérez-Freire, Fernando Perez-Gonzalez, Teddy Furon, Pedro Comesana. Security of Lattice-Based Data Hiding Against the Known Message Attack. IEEE Transactions on Information Forensics and Security, Institute of Electrical and Electronics Engineers, 2006, 1 (4), pp.421-439. ⟨inria-00580872⟩



Les métriques sont temporairement indisponibles