Skip to main content

Oracle Attacks and Covert Channels

  • Conference paper
Digital Watermarking (IWDW 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3710))

Included in the following conference series:

Abstract

In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name oracle channels. By exploiting information-theoretic notions, we show how to modify detection/authentication watermarking algorithms in order to counteract oracle attacks. We present three proposals, one based on randomization, another one based on time delay and a third one based on both randomization and delay.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Charikar, M.: Similarity estimation techniques from rounding algorithms. In: Proceedings of STOC 2002, pp. 380–388. ACM, New York (2002)

    Google Scholar 

  2. Choubassi, M.E., Moulin, P.: New sensitivity analysis attack. In: Proceedings of International Symposium on Electronic Imaging, Security and Watermarking of Multimedia Contents VII, March 2005, pp. 734–745. IS&T/SPIE (2005)

    Google Scholar 

  3. Cover, T., Thomas, J.: Elements of Information Theory. John Wiley and Sons, New York (1991)

    Book  MATH  Google Scholar 

  4. Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann Pub., Academic Press (2002)

    Google Scholar 

  5. Furon, T., Venturini, I., Duhamel, P.: An unified approach of asymmetric watermarking schemes. In: Proceedings of International Symposium on Electronic Imaging, Security and Watermarking of Multimedia Contents III, January 2001, pp. 269–279. IS&T/SPIE (2001)

    Google Scholar 

  6. Kalker, T., Linnartz, J.-P., van Dijk, M.: Watermark estimation through detector analysis. In: Proceedings of ICIP 1998, vol. 1, pp. 425–429. IEEE, Los Alamitos (1998)

    Google Scholar 

  7. Kalker, T., Haitsma, J., Oosteveen, J.: Issues with digital watermarking and perceptual hashing (2001)

    Google Scholar 

  8. Linnartz, J.-P., van Dijk, M.: Analysis of the sensitivity attack against electronic watermarks in images. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 258–272. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  9. Millen, J.: 20 years of covert channel modeling and analysis. In: Proceedings of Symposium on Security and Privacy, pp. 113–114. IEEE, Los Alamitos (1999)

    Google Scholar 

  10. Moskowitz, I., Kang, M.: Covert channels - here to stay? In: Proceedings of COMPASS 1994, pp. 235–243. IEEE, Los Alamitos (1994)

    Google Scholar 

  11. Moulin, P., O’Sullivan, J.: Information-theoretic analysis of watermarking. In: Proceedings of ICASSP 2000, June 2000. IEEE, Los Alamitos (2000)

    Google Scholar 

  12. Moulin, P., O’Sullivan, J.: Information-theoretic analysis of information hiding. IEEE Trans. on Information Theory 49(3), 563–593 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  13. Perez-Freire, L., Comesana-Alfaro, P., Perez-Gonzales, F.: Detection in quantization-based watermarking: performance and security issues. In: Proceedings of International Symposium on Electronic Imaging, Security and Watermarking of Multimedia Contents VII, March 2005, pp. 721–733. IS&T/SPIE (2005)

    Google Scholar 

  14. Simmons, G.J.: Subliminal channels; past and present. European Trans. on Telecommunications 5(4), 459–473 (1994)

    Article  Google Scholar 

  15. Tewfik, A., Mansour, M.: Secure watermark detection with non-parametric decision boundaries. In: Proceedings of ICASSP 2002, May 2002, pp. 2089–2092 (2002)

    Google Scholar 

  16. Venturini, I.: Counteracting oracle attacks. In: Proceedings of MM&Sec 2004, pp. 187–192. ACM, New York (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Venturini, I. (2005). Oracle Attacks and Covert Channels. In: Barni, M., Cox, I., Kalker, T., Kim, HJ. (eds) Digital Watermarking. IWDW 2005. Lecture Notes in Computer Science, vol 3710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11551492_14

Download citation

  • DOI: https://doi.org/10.1007/11551492_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28768-1

  • Online ISBN: 978-3-540-32052-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics