IH 2008: Information Hiding pp 118-131 | Cite as

Reversible Watermarking with Subliminal Channel

  • Xianfeng Zhao
  • Ning Li
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5284)

Abstract

With some difficulty in making more redundant capacity, only a symmetrically encrypted hash code is embedded in some reversible watermarking schemes, which makes it possible that a dishonest verifier fabricates legal contents. This paper shows that for reversible watermarking, by exploiting a subliminal channel, only a capacity of several more bytes than the length of a hash code is needed to embed a longer public-key signature. Only 4 bytes more suffices in the research. To exemplify the idea, the paper gives a variant of the R-S watermarking scheme. The variant adopts the broad-band subliminal channel in RSA-PSS signature scheme. The analysis and experiments show that with the aid of the channel it is easier to implement the reversibility, localize the tampering, and so forth.

Keywords

Signature Scheme Watermark Scheme Lossless Compression Legal Content Fragile Watermark 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wong, P.W.: A public key watermarking for image verification and authentication. In: Proc. of ICIP, Chicago, Illinois, vol. 1, pp. 455–459 (October 1998)Google Scholar
  2. 2.
    Fridrich, J., Goljian, M., Du, R.: Lossless data embedding—New paradigm in digital watermarking. EURASIP J. on Applied Signal Processing (2), 185–196 (2002)Google Scholar
  3. 3.
    Shi, Y.Q.: Reversible data hiding. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol. 3304, pp. 1–12. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  4. 4.
    Barton, J.M.: Method and apparatus for embedding authentication information within digital data, U. S. Patent: 5646997, August 7 (1997)Google Scholar
  5. 5.
    Fridrich, J., Goljian, M., Du, R.: Invertible authentication. In: SPIE Conf. Security and Watermarking of Multimedia Contents III. In: Proceedings of SPIE, San Jose, CA, vol. 3971, pp. 197–208 (January 2001)Google Scholar
  6. 6.
    Fridrich, J., Goljian, M., Du, R.: Invertible authentication watermark for JPEG images. In: Proc. of IEEE ITCC 2001, Las Vegas, Nevada, pp. 223–227 (April 2001)Google Scholar
  7. 7.
    Goljan, M., Fridrich, J., Du, R.: Distortion-free data embedding for images. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 27–41. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  8. 8.
    Xuan, G., Zhu, J., Chen, J., Shi, Y.Q., Ni, Z., Su, W.: Distortionless data hiding based on integer wavelet transform. IEE Electronics Letters 38(25), 1646–1648 (2002)CrossRefGoogle Scholar
  9. 9.
    Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C.: Lossless recovery of an original image containing embedded data, U. S. Patent: 6278791, August 21 (2001)Google Scholar
  10. 10.
    Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits and Systems for Video Technology 13(8), 890–896 (2003)CrossRefGoogle Scholar
  11. 11.
    Alattar, A.M.: Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Processing 13(8), 1147–1156 (2004)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Vleeschouwer, C.D., Delaigle, J.F., Macq, B.: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans. Multimedia 5(1), 97–105 (2003)CrossRefGoogle Scholar
  13. 13.
    Ni, Z., Shi, Y.Q., Ansari, N., Wei, S.: Reversible data hiding. In: Proc. of Intern. Symp. on Circuits and Systems, Bangkok, Thailand, May 25-28, vol. 2, pp. 912–915 (2003)Google Scholar
  14. 14.
    RSA Laboratories. RSA Cryptography Standard, PKCS #1 v. 1.5, November 1 (1993)Google Scholar
  15. 15.
    RSA Laboratories. RSA Cryptography Standard, PKCS #1 v. 2.1 June 14 (2002)Google Scholar
  16. 16.
    NIST. Digital Signature Standard (DSS), FIPS PUB 186-2, January 27 (2000) Google Scholar
  17. 17.
    NIST. Secure Hash Standard, FIPS PUB 180-2, August 1 (2002) Google Scholar
  18. 18.
    Simmons, G.J.: Subliminal channels: past and present. European Transactions on Telecommunications 4(4), 459–473 (1994)Google Scholar
  19. 19.
    Simmons, G.J.: The history of subliminal channels. IEEE J. Selected Areas in Communication 16(4), 452–462 (1998)CrossRefGoogle Scholar
  20. 20.
    Anderson, R., Vandeney, S., Preneel, B., Nyberg, K.: The Newton channel. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 151–156. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  21. 21.
    Harn, L., Gong, G.: Digital signature with a subliminal channel. IEE Proceedings - Computers and Digital Techniques 144(6), 387–389 (1997)CrossRefGoogle Scholar
  22. 22.
    Jan, J.-K., Tseng, Y.-M.: New digital signature with subliminal channels based on the discrete logarithm problem. In: Proc. of 1999 Int. Workshops on Parallel Processing, Aizu-Wakamatsu, Japan, September 21-24, pp. 198–203 (1999)Google Scholar
  23. 23.
    Bellare, M., Rogaway, P.: The exact security of digital signatures: How to sign with RSA and Rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399–416. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  24. 24.
    Coron, J.-S.: Optimal security proofs for PSS and other signature schemes. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 272–287. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  25. 25.
    Bao, F., Wang, X.: Steganography of short messages through accessories. In: Proc. of 2002 Pacific Rim Workshop on Digital Steganography (STEG 2002) (2002)Google Scholar
  26. 26.
    Bohli, J.-M., Steinwandt, R.: On subliminal channels in deterministic signature schemes. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 182–194. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  27. 27.
    Barreto, P.S., Kim, H.Y.: Pitfalls in public key watermarking. In: Proc IEEE XII Brazilian Symp. on Comp. Graphics and Image Processing, pp. 241–242. IEEE Press, Los Alamitos (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Xianfeng Zhao
    • 1
  • Ning Li
    • 1
  1. 1.State Key Laboratory of Information SecurityInstitute of Software, Chinese Academy of SciencesBeijingChina

Personalised recommendations