Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30169
Random Oracle Model of Information Hiding System

Authors: Nan Jiang, Jian Wang

Abstract:

Random Oracle Model (ROM) is an effective method for measuring the practical security of cryptograph. In this paper, we try to use it into information hiding system (IHS). Because IHS has its own properties, the ROM must be modified if it is used into IHS. Firstly, we fully discuss why and how to modify each part of ROM respectively. The main changes include: 1) Divide the attacks that IHS may be suffered into two phases and divide the attacks of each phase into several kinds. 2) Distinguish Oracles and Black-boxes clearly. 3) Define Oracle and four Black-boxes that IHS used. 4) Propose the formalized adversary model. And 5) Give the definition of judge. Secondly, based on ROM of IHS, the security against known original cover attack (KOCA-KOCA-security) is defined. Then, we give an actual information hiding scheme and prove that it is KOCA-KOCA-secure. Finally, we conclude the paper and propose the open problems of further research.

Keywords: Attack, Information Hiding, Provable Security, Random Oracle Model.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1059583

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1026

References:


[1] Francois Cayre, Caroline Fontaine, and Teddy Furon, "Watermarking security: theory and practice," IEEE Transactions on Signal Processing, vol. 53, pp. 3976-3987, Oct. 2005.
[2] C. Cachin, "An information-theoretic model for steganography," in Information Hiding: Second International Workshop, vol. 1525 of LNCS: Springer, 1998, pp. 306-318.
[3] J. Zöllner, "Modeling the security of steganogrpahic systems," in Information Hiding: Second International Workshop, vol. 1525 of LNCS: Springer, 1998, pp. 344-354.
[4] Stefan Katzenbeisser, Fabien A.P. Petitcolas. Defining security in steganographic systems. in E. Delp, P. Wong. Proceedings of SPIE, Vortrag: Conference Security and Watermarking of Multimedia Contents IV. San Jose, USA, 2002, pp. 50-56.
[5] Jiang Nan, Wang Jian, Niu Xinxin, and Yang Yixian, "Symmetric steganography secure against chosen message and original cover attacks," in 2006 International Conference on Innovative Computing, Information and Control, vol. 3, pp. 661-664, Aug. 2006.
[6] Bellare M, and Rogaway P, "Random oracles are practical: a paradigm for designing efficient protocols," in Proceedings of the 1st ACM Conference on Computer and Communications Security, New York: ACM Press, 1993, pp. 62-77.
[7] Fiat A., and Shamir A, "How to prove yourself: practical solutions to identification and signature problems," in Proc. CRYPTO-86, vol. 286, Lecture Notes in Computer Science, Springer-Verlag, 1986, pp. 186-194.
[8] Feng Dengguo, "Research on theory and approach of provable security," Journal of Software, vol. 16, pp. 1743-1756, Oct. 2005.
[9] Barthe G., Cederquist J., and Tarento S, "A machine-checked formalization of the generic model and the random oracle model," in Proceedings of IJCAR-04, vol. 3097, Lecture Notes in Computer Science, 2004, pp. 385-399.
[10] Bellare M., Boldyreva A., and Palacio A, "An uninstantiable random-oracle-model scheme for a hybrid-encryption problem," in Advances in Cryptology, EUROCRYPT'04, Lecture Notes in Computer Science, Cachin C. and Camenisch J. ed., Springer-Verlag, 2004.
[11] Canetti R, Goldreich O, and Halevi S, "The random oracle methodology, revisited," Journal of the ACM, vol. 51, pp. 557-594, 2004.
[12] Goldwasser S., Micali S., and Rivest R. L., "A digital signature scheme secure against adaptive chosen-message attacks," SIAM Journal of Computing, vol. 17, pp. 281-308, 1998.
[13] Jiang Nan, Wang Jian, Yang Yixian, "A new method for blind image steganalysis," Journal of Beijing University of Posts and Telecommunications, vol. 29, no. 2, pp. 1-4, 2006.
[14] Fridrich J., Goljan M., Du R., "Detecting LSB steganography in color and gray-scale images," Magazine of IEEE Multimedia, Special Issue on Security, October-November issue, pp. 22-28, 2001.
[15] Lin Guo-Shiang, Lie Wen-Nung, "A study on detecting image hiding by feature analysis," in The 2001 IEEE International Symposium on Circuits and Systems, vol. 2, pp. 149-152, 2001.
[16] Sorina Dumitrescu, Xiaolin Wu, "Steganalysis of LSB embedding in multimedia signals," in 2002 IEEE International Conference on Multimedia and Expo, vol. 1, pp. 581-584, 2002.
[17] Ismail Avcibas, Nair Memon, Bulent Sankur, "Steganalysis based on image quality metrics," in 2001 IEEE Fourth Workshop on Multimedia Signal Processing, pp. 517-522, 2001.