Title :
How to (possibly) foil multimedia security?
Author :
Balado, Felix ; Fournel, Thierry
Author_Institution :
Sch. of Comput. Sci. & Inf., Univ. Coll. Dublin, Dublin, Ireland
Abstract :
Multimedia security can be foiled thanks to Slepian´s permutation modulation. Originally proposed in 1965 for standard problems of channel and source coding in communications, permutation codes can also provide optimum solutions in two relevant fields: steganography (foiling hidden information detection tests) and counterforensics (foiling forensic detection tests). In the first scenario, permutation codes have been shown to implement optimum perfect universal steganography (that is to say, steganography with maximum information embedding rate, undetectable and only relying on the empirical distribution of the host) for histogram-based hidden information detectors. In the second scenario, permutation codes have been shown to implement minimum-distortion perfect counterforensics (that is to say, forgeries which are undetectable and as close as possible to a target forgery) for histogram-based forensic detectors. Interestingly, both of these developments have revealed connections with compression through theoretical bounds from the mathematical theory of information. In steganography, the long-acknowledged duality between perfect steganography and lossless compression has been made explicit by permutation coding. On the other hand, a connection between counterforensics, lossy compression and histogram specification is also shown.
Keywords :
data compression; digital forensics; multimedia systems; steganography; Slepian permutation modulation; channel coding; communications; duality; foiling; forensic detection tests; forgeries; hidden information detection tests; histogram specification; histogram-based hidden information detectors; lossless compression; lossy compression; mathematical theory; maximum information embedding rate; minimum-distortion perfect counterforensics; multimedia security; optimum perfect universal steganography; optimum solutions; perfect steganography; permutation codes; source coding; Decoding; Educational institutions; Encoding; Forensics; Histograms; Security; Vectors;
Conference_Titel :
Information Optics (WIO), 2014 13th Workshop on
Conference_Location :
Neuchatel
DOI :
10.1109/WIO.2014.6933295