DocumentCode
130587
Title
How to (possibly) foil multimedia security?
Author
Balado, Felix ; Fournel, Thierry
Author_Institution
Sch. of Comput. Sci. & Inf., Univ. Coll. Dublin, Dublin, Ireland
fYear
2014
fDate
7-11 July 2014
Firstpage
1
Lastpage
3
Abstract
Multimedia security can be foiled thanks to Slepian´s permutation modulation. Originally proposed in 1965 for standard problems of channel and source coding in communications, permutation codes can also provide optimum solutions in two relevant fields: steganography (foiling hidden information detection tests) and counterforensics (foiling forensic detection tests). In the first scenario, permutation codes have been shown to implement optimum perfect universal steganography (that is to say, steganography with maximum information embedding rate, undetectable and only relying on the empirical distribution of the host) for histogram-based hidden information detectors. In the second scenario, permutation codes have been shown to implement minimum-distortion perfect counterforensics (that is to say, forgeries which are undetectable and as close as possible to a target forgery) for histogram-based forensic detectors. Interestingly, both of these developments have revealed connections with compression through theoretical bounds from the mathematical theory of information. In steganography, the long-acknowledged duality between perfect steganography and lossless compression has been made explicit by permutation coding. On the other hand, a connection between counterforensics, lossy compression and histogram specification is also shown.
Keywords
data compression; digital forensics; multimedia systems; steganography; Slepian permutation modulation; channel coding; communications; duality; foiling; forensic detection tests; forgeries; hidden information detection tests; histogram specification; histogram-based hidden information detectors; lossless compression; lossy compression; mathematical theory; maximum information embedding rate; minimum-distortion perfect counterforensics; multimedia security; optimum perfect universal steganography; optimum solutions; perfect steganography; permutation codes; source coding; Decoding; Educational institutions; Encoding; Forensics; Histograms; Security; Vectors;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Optics (WIO), 2014 13th Workshop on
Conference_Location
Neuchatel
Type
conf
DOI
10.1109/WIO.2014.6933295
Filename
6933295
Link To Document