Skip to main content

Oracle Channels

  • Chapter
  • 373 Accesses

Part of the book series: Lecture Notes in Computer Science ((TDHMS,volume 4920))

Abstract

The paper is structured into three main parts. In the first part, we focus on information leakage through new covert channels, we term oracle channels, which occur in case oracle attacks are performed on watermarked digital media or multimedia. In the second part, we show how to counteract oracle channels without resorting to protection tools that are quite demanding for communication networks. In the third part, we follow the information-theoretic approach to show that the countermeasures proposed in the second part do reduce the secret information leakage that flows through oracle channels, without sensibly compromising the detector reliability in case no oracle attack is performed.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Simmons, G.J.: Subliminal Channels: Past and Present. European Trans. on Telecommunications 5(4), 459–473 (1994)

    Google Scholar 

  2. Millen, J.: 20 years of covert channel modeling and analysis. In: Proceedings of Symposium on Security and Privacy, pp. 113–114. IEEE Computer Society Press, Los Alamitos (1999)

    Google Scholar 

  3. Moskowitz, I., Kang, M.: Covert channels - here to stay. In: Proceedings of COMPASS 1994, pp. 235–243. IEEE, Los Alamitos (1994)

    Google Scholar 

  4. Lampson, B.W.: A Note on the Confinment Problem. Comm. ACM 16, 613–615 (1973)

    Article  Google Scholar 

  5. Provos, N., Honeyman, P.: Detecting Steganographic Content on the Internet. IEEE Trans. on Information Theory 49(3), 563–593 (2003)

    Article  Google Scholar 

  6. Tumoian, E., Anikeev, M.: Network Based Detection of Passive Covert Channels in TCP/IP. In: Proceedings of the IEEE Conference on Local Computer Networks 30th Anniversary, pp. 802–809. IEEE, Los Alamitos (2005)

    Chapter  Google Scholar 

  7. Ahsan, K., Kundur, D.: Practical Data hiding in TCP/IP. In: Proceedings of Workshop on multimedia Security at ACM Multimedia 2002, ACM Press, New York (2002)

    Google Scholar 

  8. Servetto, S.D., Vetterli, M.: Communication Using Phantoms: Covert Channels in the Internet. In: Proceedings IEEE International Symposium on Information Theory (ISIT), USA (2001)

    Google Scholar 

  9. Li, S., Ephremides, A.: A Network Layer Covert Channel in Ad-hoc Wireless Networks. In: Proceedings of Int. Conf. on Image Processing 1998 (ICIP 1998), vol. 1, pp. 88–96. IEEE, Los Alamitos (2004)

    Google Scholar 

  10. Shnayder, V.: Opportunities for Language Based Information Flow Security in Sensor Networks (2004)

    Google Scholar 

  11. Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)

    Google Scholar 

  12. Jajodia, S., Meadows, C.: Inference Problems in Multilevel Secure Database Management Systems. Information Security 570–585 (1991)

    Google Scholar 

  13. Zeng, W., Lan, J., Zhuang, X.: Network friendly media security: rationales, solutions and open issues. In: Proceedings IEEE Int. Conf. on Image Processing (ICIP 2004), IEEE, Singapore (2004)

    Google Scholar 

  14. Barni, M., Bartolini, F., Furon, T.: A general framework for robust watermarking security. Signal Processing, Elsevier, special issue on Security of Data Hiding Technologies, vol. 83, pp. 2069–2084 (invited paper) (2003)

    Google Scholar 

  15. Barni, M., Bartolini, F.: Watermarking Systems Engineering: Enabling Digital Assets Security and other Applications. Dekker Inc (2004)

    Google Scholar 

  16. Cayre, F., Fontaine, C., Furon, T.: Watermarking security part I: Theory. In: Delp, E.J., Wong, P.W. (eds.) Proc. SPIE-IS&T Electronic Imaging. SPIE, San Jose, CA, USA (2005)

    Google Scholar 

  17. Cayre, F., Fontaine, C., Furon, T.: Watermarking security part II: Practice. In: Delp, E.J., Wong, P.W. (eds.) Proc. SPIE-IST Electronic Imaging. SPIE, San Jose, CA, USA (2005)

    Google Scholar 

  18. Furon, T.: A survey of watermarking security. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 201–215. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  19. Fridrich, J., Goljan, M.: Practical steganalysis of digital images: state of the art. In: Proceedings of SPIE Photonics West, vol. 4675, pp. 1–13 (2002)

    Google Scholar 

  20. Linnartz, J.-P., van Dijk, M.: Analysis of the sensitivity attack against electronic watermarks in images. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 258–272. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  21. Kalker, T., Linnartz, J.-P., van Dijk, M.: Watermark estimation through detector analysis. In: Proc. of Int. Conf. on Image Processing 1998 (ICIP 1998), vol. 1, pp. 425–429. IEEE, Los Alamitos (1998)

    Google Scholar 

  22. Choubassi, M.E., Moulin, P.: New sensitivity analysis attack. In: Proceedings of International Symposium on Electronic Imaging, Security and Watermarking of Multimedia Contents VII. IS&T/SPIE, pp. 734–745 (2005)

    Google Scholar 

  23. Comesana, P., Perez-Freire, L., Perez-Gonzalez, F.: The Return of the Sensitivity Attack. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 260–274. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  24. Perez-Freire, L., Comesana-Alfaro, P., Perez-Gonzales, F.: Detection in quantization-based watermarking: performance and security issues. In: Proceedings of International Symposium on Electronic Imaging, Security and Watermarking of Multimedia Contents VII. IS&T/SPIE, pp. 721–733 (2005)

    Google Scholar 

  25. Venturini, I.: Counteracting oracle attacks. In: Proc. of the Multimedia and Security Work. 2004 (MM and Sec 2004), pp. 187–192. ACM Press, Magdeburg, Germany (2004)

    Chapter  Google Scholar 

  26. Venturini, I.: Oracle attacks and covert channels. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 171–185. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  27. Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann Pub., Academic Press (2002)

    Google Scholar 

  28. Moulin, P., O’Sullivan, J.: Information-theoretic analysis of watermarking. In: Proc. of Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP 2000), IEEE, Los Alamitos (2000)

    Google Scholar 

  29. Moulin, P., O’Sullivan, J.: Information-theoretic analysis of information hiding. IEEE Trans. on Information Theory 49(3), 563–593 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  30. Furon, T., Venturini, I., Duhamel, P.: An unified approach of asymmetric watermarking schemes. In: Proceedings of International Symposium on Electronic Imaging, Security and Watermarking of Multimedia Contents III. IS&T/SPIE, pp. 269–279 (2001)

    Google Scholar 

  31. Furon, T., Macq, B., Hurley, B., Silvestre, G.: JANIS: Just Another N-order side-Informed watermarking Scheme. In: Proceedings of IEEE International Conf. on Image Processing, ICIP 2002, vol. 3, pp. 153–156. IEEE, NY, USA (2002)

    Google Scholar 

  32. Tewfik, A., Mansour, M.: Secure watermark detection with non-parametric decision boundaries. In: Proc. of Int. Conf. on Acoustics, Speech and Signal Processing 2002 (ICASSP 2002), pp. 2089–2092. IEEE, Los Alamitos (2002)

    Google Scholar 

  33. Kalker, T., Haitsma, J., Oosteveen, J.: Issues with digital watermarking and perceptual hashing (2001)

    Google Scholar 

  34. Charikar, M.: Similarity estimation techniques from rounding algorithms. In: Proceedings of STOC 2002, pp. 380–388. ACM, New York (2002)

    Google Scholar 

  35. Kulyukin, V.A., Bookstein, A.: Integrated Object Recognition with Extended Hamming Distance (2000)

    Google Scholar 

  36. Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn. MIT Press and McGraw Hill (2001)

    Google Scholar 

  37. Mittelholzer, T.: An information-theoretic approach to steganography and watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 1–17. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  38. Fabris, F.: Teoria dell’informazione, codici, cifrari. Boringhieri (2001)

    Google Scholar 

  39. Cover, T., Thomas, J.: Elements of Information Theory. John Wiley and Sons, New York (1991)

    MATH  Google Scholar 

  40. Maurer, U.M.: Authentication Theory and Hypothesis Testing. IEEE Transactions on Information Theory 46(4), 1350–1356 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  41. Cachin, C.: An Information-Theoretic Model for Steganography. Information and Computation 192, 41–56 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  42. Chandramouli, R., Subbalakshmi, K.P.: Current Trends in Steganalysis: A Critical Survey (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Yun Q. Shi

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Venturini, I. (2008). Oracle Channels. In: Shi, Y.Q. (eds) Transactions on Data Hiding and Multimedia Security III. Lecture Notes in Computer Science, vol 4920. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69019-1_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69019-1_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69016-0

  • Online ISBN: 978-3-540-69019-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics