How to (Possibly) Foil Multimedia Security?

被引:0
|
作者
Balado, Felix [1 ]
Fournel, Thierry [2 ]
机构
[1] Univ Coll Dublin, Sch Comp Sci & Informat, Belfield Campus, Dublin 4, Ireland
[2] Saint Etienne Univ, CNRS, UMR 5516, Lab Hubert Curien, St Etienne, France
基金
爱尔兰科学基金会;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Multimedia security can be foiled thanks to Slepian's permutation modulation. Originally proposed in 1965 for standard problems of channel and source coding in communications, permutation codes can also provide optimum solutions in two relevant fields: steganography (foiling hidden information detection tests) and counterforensics (foiling forensic detection tests). In the first scenario, permutation codes have been shown to implement optimum perfect universal steganography (that is to say, steganography with maximum information embedding rate, undetectable and only relying on the empirical distribution of the host) for histogram-based hidden information detectors. In the second scenario, permutation codes have been shown to implement minimum-distortion perfect counterforensics (that is to say, forgeries which are undetectable and as close as possible to a target forgery) for histogram-based forensic detectors. Interestingly, both of these developments have revealed connections with compression through theoretical bounds from the mathematical theory of information. In steganography, the long-acknowledged duality between perfect steganography and lossless compression has been made explicit by permutation coding. On the other hand, a connection between counterforensics, lossy compression and histogram specification is also shown.
引用
收藏
页数:3
相关论文
共 50 条
  • [1] How could models possibly provide how-possibly explanations?
    Verreault-Julien, Philippe
    STUDIES IN HISTORY AND PHILOSOPHY OF SCIENCE, 2019, 73 : 22 - 33
  • [2] Multimedia security and multimedia content protection
    Ridzon, Radovan
    Levicky, Dusan
    PROCEEDINGS ELMAR-2009, 2009, : 105 - 108
  • [3] How to Explain How-Possibly
    Brainard, Lindsay
    PHILOSOPHERS IMPRINT, 2020, 20 (13):
  • [4] Multimedia services & security
    Delgado, J
    INTELLIGENCE IN SERVICES AND NETWORKS: PAVING THE WAY FOR AN OPEN SERVICE MARKET, 1999, 1597 : 355 - 356
  • [5] Multimedia and Sensor Security
    Hac, Anna
    ADVANCES IN COMPUTERS, VOL 74: SOFTWARE DEVELOPMENT, 2008, 74 : 19 - 43
  • [6] Security of medical multimedia
    Tzelepi, S
    Pangalos, G
    Nikolacopoulou, G
    MEDICAL INFORMATICS AND THE INTERNET IN MEDICINE, 2002, 27 (03): : 169 - 184
  • [7] Multimedia security and forensics
    Yan, Wei Qi
    Kurugollu, Fatih
    Emmanuel, Sabu
    Kankanhalli, Mohan S.
    International Journal of Digital Crime and Forensics, 2010, 2 (04)
  • [8] Multimedia Data and Security
    Prabhakaran, Balakrishnan
    IEEE MULTIMEDIA, 2024, 31 (01) : 5 - 6
  • [9] Approaches to multimedia and security
    Nahrstedt, K
    Dittmann, J
    Wohlmacher, P
    2000 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, PROCEEDINGS VOLS I-III, 2000, : 1275 - 1278
  • [10] HOW TO FOIL AN ASSASSIN
    KUBIE, J
    NEW SCIENTIST, 1993, 138 (1867) : 30 - 33