Abstract
In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name oracle channels. By exploiting information-theoretic notions, we show how to modify detection/authentication watermarking algorithms in order to counteract oracle attacks. We present three proposals, one based on randomization, another one based on time delay and a third one based on both randomization and delay.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Charikar, M.: Similarity estimation techniques from rounding algorithms. In: Proceedings of STOC 2002, pp. 380–388. ACM, New York (2002)
Choubassi, M.E., Moulin, P.: New sensitivity analysis attack. In: Proceedings of International Symposium on Electronic Imaging, Security and Watermarking of Multimedia Contents VII, March 2005, pp. 734–745. IS&T/SPIE (2005)
Cover, T., Thomas, J.: Elements of Information Theory. John Wiley and Sons, New York (1991)
Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann Pub., Academic Press (2002)
Furon, T., Venturini, I., Duhamel, P.: An unified approach of asymmetric watermarking schemes. In: Proceedings of International Symposium on Electronic Imaging, Security and Watermarking of Multimedia Contents III, January 2001, pp. 269–279. IS&T/SPIE (2001)
Kalker, T., Linnartz, J.-P., van Dijk, M.: Watermark estimation through detector analysis. In: Proceedings of ICIP 1998, vol. 1, pp. 425–429. IEEE, Los Alamitos (1998)
Kalker, T., Haitsma, J., Oosteveen, J.: Issues with digital watermarking and perceptual hashing (2001)
Linnartz, J.-P., van Dijk, M.: Analysis of the sensitivity attack against electronic watermarks in images. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 258–272. Springer, Heidelberg (1998)
Millen, J.: 20 years of covert channel modeling and analysis. In: Proceedings of Symposium on Security and Privacy, pp. 113–114. IEEE, Los Alamitos (1999)
Moskowitz, I., Kang, M.: Covert channels - here to stay? In: Proceedings of COMPASS 1994, pp. 235–243. IEEE, Los Alamitos (1994)
Moulin, P., O’Sullivan, J.: Information-theoretic analysis of watermarking. In: Proceedings of ICASSP 2000, June 2000. IEEE, Los Alamitos (2000)
Moulin, P., O’Sullivan, J.: Information-theoretic analysis of information hiding. IEEE Trans. on Information Theory 49(3), 563–593 (2003)
Perez-Freire, L., Comesana-Alfaro, P., Perez-Gonzales, F.: Detection in quantization-based watermarking: performance and security issues. In: Proceedings of International Symposium on Electronic Imaging, Security and Watermarking of Multimedia Contents VII, March 2005, pp. 721–733. IS&T/SPIE (2005)
Simmons, G.J.: Subliminal channels; past and present. European Trans. on Telecommunications 5(4), 459–473 (1994)
Tewfik, A., Mansour, M.: Secure watermark detection with non-parametric decision boundaries. In: Proceedings of ICASSP 2002, May 2002, pp. 2089–2092 (2002)
Venturini, I.: Counteracting oracle attacks. In: Proceedings of MM&Sec 2004, pp. 187–192. ACM, New York (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Venturini, I. (2005). Oracle Attacks and Covert Channels. In: Barni, M., Cox, I., Kalker, T., Kim, HJ. (eds) Digital Watermarking. IWDW 2005. Lecture Notes in Computer Science, vol 3710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11551492_14
Download citation
DOI: https://doi.org/10.1007/11551492_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28768-1
Online ISBN: 978-3-540-32052-4
eBook Packages: Computer ScienceComputer Science (R0)