How to (Possibly) Foil Multimedia Security?

被引:0
|
作者
Balado, Felix [1 ]
Fournel, Thierry [2 ]
机构
[1] Univ Coll Dublin, Sch Comp Sci & Informat, Belfield Campus, Dublin 4, Ireland
[2] Saint Etienne Univ, CNRS, UMR 5516, Lab Hubert Curien, St Etienne, France
来源
2014 13TH WORKSHOP ON INFORMATION OPTICS (WIO) | 2014年
基金
爱尔兰科学基金会;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Multimedia security can be foiled thanks to Slepian's permutation modulation. Originally proposed in 1965 for standard problems of channel and source coding in communications, permutation codes can also provide optimum solutions in two relevant fields: steganography (foiling hidden information detection tests) and counterforensics (foiling forensic detection tests). In the first scenario, permutation codes have been shown to implement optimum perfect universal steganography (that is to say, steganography with maximum information embedding rate, undetectable and only relying on the empirical distribution of the host) for histogram-based hidden information detectors. In the second scenario, permutation codes have been shown to implement minimum-distortion perfect counterforensics (that is to say, forgeries which are undetectable and as close as possible to a target forgery) for histogram-based forensic detectors. Interestingly, both of these developments have revealed connections with compression through theoretical bounds from the mathematical theory of information. In steganography, the long-acknowledged duality between perfect steganography and lossless compression has been made explicit by permutation coding. On the other hand, a connection between counterforensics, lossy compression and histogram specification is also shown.
引用
收藏
页数:3
相关论文
共 50 条
  • [21] Multimedia in Forensics, Security, and Intelligence
    Battiato, Sebastiano
    Emmanuel, Sabu
    Ulges, Adrian
    Worring, Marcel
    IEEE MULTIMEDIA, 2012, 19 (01) : 17 - 19
  • [22] Firewalls and security in multimedia systems
    Kohl, U
    MULTIMEDIA COMPUTING AND NETWORKING 2000, 2000, 3969 : 289 - 290
  • [23] Multimedia security in the distributed environment
    Liu, YL
    Gao, W
    Liu, SH
    2004 JOINT CONFERENCE OF THE 10TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS AND THE 5TH INTERNATIONAL SYMPOSIUM ON MULTI-DIMENSIONAL MOBILE COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 639 - 642
  • [24] SECURITY IN WIRELESS MULTIMEDIA COMMUNICATIONS
    Hu, Rose Qingyang
    Rong, Bo
    Wang, Chonggang
    Qian, Yi
    Chen, Hsiao-Hwa
    IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (03) : 56 - 57
  • [25] Security Requirements for Multimedia Archives
    Park, Sang Bae
    ADVANCES IN MULTIMEDIA, 2015, 2015
  • [26] Security and Privacy in Networks and Multimedia
    Rak, Tomasz
    Rzonca, Dariusz
    ELECTRONICS, 2024, 13 (15)
  • [27] Workshop on Multimedia Privacy and Security
    Hallman, Roger
    Rohloff, Kurt
    Chang, Victor
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2645 - 2646
  • [28] On the security of multimedia video information
    Shieh, JRJ
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 51 - 56
  • [29] Multimedia Security Perspectives in IoT
    Shifa, Amna
    Asghar, Mamoona N.
    Fleury, Martin
    2016 SIXTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2016, : 550 - 555
  • [30] Multimedia security and rights management
    Wu, M
    Memon, N
    Ebrahimi, T
    Cox, IJ
    EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2004, 2004 (14) : 2077 - 2080