Security Analysis of Scalar Costa Scheme Against Known Message Attack in DCT-Domain Image Watermarking

Journal Title: Journal of Information Systems and Telecommunication - Year 2014, Vol 2, Issue 4

Abstract

This paper proposes an accurate information-theoretic security analysis of Scalar Costa Scheme (SCS) when the SCS is employed in the embedding layer of digital image watermarking. For this purpose, Discrete Cosine Transform (DCT) coefficients are extracted from the cover images. Then, the SCS is used to embed watermarking messages into mid-frequency DCT coefficients. To prevent unauthorized embedding and/or decoding, the SCS codebook is randomized using the pseudorandom dither signal which plays the role of the secret key. A passive attacker applies Known Message Attack (KMA) on the watermarked messages to practically estimate the secret key. The security level is measured using residual entropy (equivocation) of the secret key provided that the attacker’s observations are available. It can be seen that the practical security level of the SCS depends on the host statistics which has contradiction with previous theoretical result. Furthermore, the practical security analysis of the SCS leads to the different values of the residual entropy in comparison with previous theoretical equation. It will be shown that these differences are mainly due to existence of uniform regions in images that cannot be captured by previous theoretical analysis. Another source of such differences is ignoring the dependencies between the observations of non-uniform regions in previous theoretical analysis. To provide an accurate reformulation, the theoretical equation for the uniform regions and the empirical equation for the non-uniform regions are proposed. Then, by combining these equations a new equation is presented for the whole image which considers both host statistics and observations dependencies. Finally, accuracy of the proposed formulations is examined through exhaustive simulations.

Authors and Affiliations

Reza Samadi, Seyed Alireza Seyedin

Keywords

Related Articles

SIP Vulnerability Scan Framework

The purpose of this paper is to provide a framework for detecting vulnerabilities in SIP (Session Initiation Protocol) networks. We try to find weaknesses in SIP enabled entities that an attacker by exploiting them is ab...

A New Architecture for Intrusion-Tolerant Web Services Based on Design Diversity Techniques

Web services are the realization of service-oriented architecture (SOA). Security is an important challenge of SOAP-based Web services. So far, several security techniques and standards based on traditional security mech...

Quality Assessment Based Coded Apertures for Defocus Deblurring

A conventional camera with small size pixels may capture images with defocused blurred regions. Blurring, as a low-pass filter, attenuates or drops details of the captured image. This fact makes deblurring as an ill-pose...

A New Approach to Overcome the Count to Infinity Problem in DVR Protocol Based on HMM Modelling

Due to low complexity, power and bandwidth saving Distance Vector Routing has been introduced as one of the most popular dynamic routing protocol. However, this protocol has a serious drawback in practice called Count To...

Coverage Improving with Energy Efficient in Wireless Sensor Networks

Wireless sensor networks (WSNs) are formed by numerous sensors nodes that are able to sense different environmental phenomena and to transfer the collected data to the sink. The coverage of a network is one of the main d...

Download PDF file
  • EP ID EP185877
  • DOI 10.7508/jist.2014.04.006
  • Views 107
  • Downloads 0

How To Cite

Reza Samadi, Seyed Alireza Seyedin (2014). Security Analysis of Scalar Costa Scheme Against Known Message Attack in DCT-Domain Image Watermarking. Journal of Information Systems and Telecommunication, 2(4), 242-250. https://europub.co.uk/articles/-A-185877