Security Analysis of Scalar Costa Scheme Against Known Message Attack in DCT-Domain Image Watermarking

Journal Title: Journal of Information Systems and Telecommunication - Year 2014, Vol 2, Issue 4

Abstract

This paper proposes an accurate information-theoretic security analysis of Scalar Costa Scheme (SCS) when the SCS is employed in the embedding layer of digital image watermarking. For this purpose, Discrete Cosine Transform (DCT) coefficients are extracted from the cover images. Then, the SCS is used to embed watermarking messages into mid-frequency DCT coefficients. To prevent unauthorized embedding and/or decoding, the SCS codebook is randomized using the pseudorandom dither signal which plays the role of the secret key. A passive attacker applies Known Message Attack (KMA) on the watermarked messages to practically estimate the secret key. The security level is measured using residual entropy (equivocation) of the secret key provided that the attacker’s observations are available. It can be seen that the practical security level of the SCS depends on the host statistics which has contradiction with previous theoretical result. Furthermore, the practical security analysis of the SCS leads to the different values of the residual entropy in comparison with previous theoretical equation. It will be shown that these differences are mainly due to existence of uniform regions in images that cannot be captured by previous theoretical analysis. Another source of such differences is ignoring the dependencies between the observations of non-uniform regions in previous theoretical analysis. To provide an accurate reformulation, the theoretical equation for the uniform regions and the empirical equation for the non-uniform regions are proposed. Then, by combining these equations a new equation is presented for the whole image which considers both host statistics and observations dependencies. Finally, accuracy of the proposed formulations is examined through exhaustive simulations.

Authors and Affiliations

Reza Samadi, Seyed Alireza Seyedin

Keywords

Related Articles

A Study on Clustering for Clustering Based Image De-noising

In this paper, the problem of de-noising of an image contaminated with Additive White Gaussian Noise (AWGN) is studied. This subject is an open problem in signal processing for more than 50 years. In the present paper, w...

An Approach to Compose Viewpoints of Different Stakeholders in the Specification of Probabilistic Systems

Developing large and complex systems often involves many stakeholders each of which has her own expectations from the system; hence, it is difficult to write a single formal specification of the system considering all of...

Effects of Wave Polarization on Microwave Imaging Using Linear Sampling Method

Linear Sampling Method (LSM) is a simple and effective method for the shape reconstruction of unknown objects. It is also a fast and robust method to find the location of an object. This method is based on far field oper...

Blog feed search in Persian Blogosphere

Blogs are one of the main user generated content on the web. So, it is necessary to present retrieval algorithms to the meet information need of weblog users. The goal of blog feed search is to rank blogs regarding their...

A New Approach to Overcome the Count to Infinity Problem in DVR Protocol Based on HMM Modelling

Due to low complexity, power and bandwidth saving Distance Vector Routing has been introduced as one of the most popular dynamic routing protocol. However, this protocol has a serious drawback in practice called Count To...

Download PDF file
  • EP ID EP185877
  • DOI 10.7508/jist.2014.04.006
  • Views 94
  • Downloads 0

How To Cite

Reza Samadi, Seyed Alireza Seyedin (2014). Security Analysis of Scalar Costa Scheme Against Known Message Attack in DCT-Domain Image Watermarking. Journal of Information Systems and Telecommunication, 2(4), 242-250. https://europub.co.uk/articles/-A-185877