IH 2008: Information Hiding pp 118-131 | Cite as
Reversible Watermarking with Subliminal Channel
Abstract
With some difficulty in making more redundant capacity, only a symmetrically encrypted hash code is embedded in some reversible watermarking schemes, which makes it possible that a dishonest verifier fabricates legal contents. This paper shows that for reversible watermarking, by exploiting a subliminal channel, only a capacity of several more bytes than the length of a hash code is needed to embed a longer public-key signature. Only 4 bytes more suffices in the research. To exemplify the idea, the paper gives a variant of the R-S watermarking scheme. The variant adopts the broad-band subliminal channel in RSA-PSS signature scheme. The analysis and experiments show that with the aid of the channel it is easier to implement the reversibility, localize the tampering, and so forth.
Keywords
Signature Scheme Watermark Scheme Lossless Compression Legal Content Fragile WatermarkPreview
Unable to display preview. Download preview PDF.
References
- 1.Wong, P.W.: A public key watermarking for image verification and authentication. In: Proc. of ICIP, Chicago, Illinois, vol. 1, pp. 455–459 (October 1998)Google Scholar
- 2.Fridrich, J., Goljian, M., Du, R.: Lossless data embedding—New paradigm in digital watermarking. EURASIP J. on Applied Signal Processing (2), 185–196 (2002)Google Scholar
- 3.Shi, Y.Q.: Reversible data hiding. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol. 3304, pp. 1–12. Springer, Heidelberg (2005)CrossRefGoogle Scholar
- 4.Barton, J.M.: Method and apparatus for embedding authentication information within digital data, U. S. Patent: 5646997, August 7 (1997)Google Scholar
- 5.Fridrich, J., Goljian, M., Du, R.: Invertible authentication. In: SPIE Conf. Security and Watermarking of Multimedia Contents III. In: Proceedings of SPIE, San Jose, CA, vol. 3971, pp. 197–208 (January 2001)Google Scholar
- 6.Fridrich, J., Goljian, M., Du, R.: Invertible authentication watermark for JPEG images. In: Proc. of IEEE ITCC 2001, Las Vegas, Nevada, pp. 223–227 (April 2001)Google Scholar
- 7.Goljan, M., Fridrich, J., Du, R.: Distortion-free data embedding for images. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 27–41. Springer, Heidelberg (2001)CrossRefGoogle Scholar
- 8.Xuan, G., Zhu, J., Chen, J., Shi, Y.Q., Ni, Z., Su, W.: Distortionless data hiding based on integer wavelet transform. IEE Electronics Letters 38(25), 1646–1648 (2002)CrossRefGoogle Scholar
- 9.Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C.: Lossless recovery of an original image containing embedded data, U. S. Patent: 6278791, August 21 (2001)Google Scholar
- 10.Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits and Systems for Video Technology 13(8), 890–896 (2003)CrossRefGoogle Scholar
- 11.Alattar, A.M.: Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans. Image Processing 13(8), 1147–1156 (2004)MathSciNetCrossRefGoogle Scholar
- 12.Vleeschouwer, C.D., Delaigle, J.F., Macq, B.: Circular interpretation of bijective transformations in lossless watermarking for media asset management. IEEE Trans. Multimedia 5(1), 97–105 (2003)CrossRefGoogle Scholar
- 13.Ni, Z., Shi, Y.Q., Ansari, N., Wei, S.: Reversible data hiding. In: Proc. of Intern. Symp. on Circuits and Systems, Bangkok, Thailand, May 25-28, vol. 2, pp. 912–915 (2003)Google Scholar
- 14.RSA Laboratories. RSA Cryptography Standard, PKCS #1 v. 1.5, November 1 (1993)Google Scholar
- 15.RSA Laboratories. RSA Cryptography Standard, PKCS #1 v. 2.1 June 14 (2002)Google Scholar
- 16.NIST. Digital Signature Standard (DSS), FIPS PUB 186-2, January 27 (2000) Google Scholar
- 17.NIST. Secure Hash Standard, FIPS PUB 180-2, August 1 (2002) Google Scholar
- 18.Simmons, G.J.: Subliminal channels: past and present. European Transactions on Telecommunications 4(4), 459–473 (1994)Google Scholar
- 19.Simmons, G.J.: The history of subliminal channels. IEEE J. Selected Areas in Communication 16(4), 452–462 (1998)CrossRefGoogle Scholar
- 20.Anderson, R., Vandeney, S., Preneel, B., Nyberg, K.: The Newton channel. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 151–156. Springer, Heidelberg (1996)CrossRefGoogle Scholar
- 21.Harn, L., Gong, G.: Digital signature with a subliminal channel. IEE Proceedings - Computers and Digital Techniques 144(6), 387–389 (1997)CrossRefGoogle Scholar
- 22.Jan, J.-K., Tseng, Y.-M.: New digital signature with subliminal channels based on the discrete logarithm problem. In: Proc. of 1999 Int. Workshops on Parallel Processing, Aizu-Wakamatsu, Japan, September 21-24, pp. 198–203 (1999)Google Scholar
- 23.Bellare, M., Rogaway, P.: The exact security of digital signatures: How to sign with RSA and Rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399–416. Springer, Heidelberg (1996)CrossRefGoogle Scholar
- 24.Coron, J.-S.: Optimal security proofs for PSS and other signature schemes. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 272–287. Springer, Heidelberg (2002)CrossRefGoogle Scholar
- 25.Bao, F., Wang, X.: Steganography of short messages through accessories. In: Proc. of 2002 Pacific Rim Workshop on Digital Steganography (STEG 2002) (2002)Google Scholar
- 26.Bohli, J.-M., Steinwandt, R.: On subliminal channels in deterministic signature schemes. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 182–194. Springer, Heidelberg (2005)CrossRefGoogle Scholar
- 27.Barreto, P.S., Kim, H.Y.: Pitfalls in public key watermarking. In: Proc IEEE XII Brazilian Symp. on Comp. Graphics and Image Processing, pp. 241–242. IEEE Press, Los Alamitos (1999)Google Scholar