Abstract
In this paper, we analyze a possibility of reversibility of data-hiding techniques based on random binning from multimedia perspectives. We demonstrate the capabilities of unauthorized users to perform hidden data removal using solely a signal processing approach based on optimal estimation as well as consider reversibility on the side of authorized users who have the knowledge of key used for the message hiding.
Chapter PDF
Similar content being viewed by others
References
Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann Publishers, Inc., San Francisco (2001)
Gel’fand, S., Pinsker, M.: Coding for channel with random parameters. Probl. Control and Inf. Theory 9, 19–31 (1980)
Costa, M.: Writing on dirty paper. IEEE Trans. on Inf. Th. 29, 439–441 (1983)
Perez-Freire, L., Perez-Gonzalez, F., Voloshynovskiy, S.: Revealing the true achievable rates of Scalar Costa Scheme. In: IEEE International Workshop on Multimedia Signal Processing (MMSP), Siena, Italy, pp. 235–238 (2004)
Eggers, J., Bäuml, R., Tzschoppe, R., Girod, B.: Inverse mapping of scs-watermarked data. In: Eleventh European Signal Processing Conference (EUSIPCO 2002), Toulouse, France (2002)
Moulin, P., O’Sullivan, J.: Information-theoretic analysis of information hiding. IEEE Trans. on Information Theory 49, 563–593 (2003)
Voloshynovskiy, S., Koval, O., Deguillaume, F., Pun, T.: Visual communications with side information via distributed printing channels: extended multimedia and security perspectives. In: Proceedings of the SPIE Int. Conf. on Security and Watermarking of Multimedia Contents III, San Jose, CA, USA (2004)
Kay, S.M.: Fundamentals of Statistical Signal Processing: Estimation Theory. Prentice Hall Signal Processing Series (1993)
Cover, T., Thomas, J.: Elements of Information Theory. Wiley and Sons, New York (1991)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 IFIP International Federation for Information Processing
About this paper
Cite this paper
Voloshynovskiy, S., Koval, O., Topak, E., Vila-Forcén, J.E., Alfaro, P.C., Pun, T. (2005). On Reversibility of Random Binning Techniques: Multimedia Perspectives. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds) Communications and Multimedia Security. CMS 2005. Lecture Notes in Computer Science, vol 3677. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552055_11
Download citation
DOI: https://doi.org/10.1007/11552055_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28791-9
Online ISBN: 978-3-540-31978-8
eBook Packages: Computer ScienceComputer Science (R0)