Information Hiding and Multimedia Security Workshop最新文献

筛选
英文 中文
Forensic identification of GSM mobile phones GSM移动电话的法医鉴定
Information Hiding and Multimedia Security Workshop Pub Date : 2013-06-17 DOI: 10.1145/2482513.2482529
Jakob Hasse, Thomas Gloe, Martin Beck
{"title":"Forensic identification of GSM mobile phones","authors":"Jakob Hasse, Thomas Gloe, Martin Beck","doi":"10.1145/2482513.2482529","DOIUrl":"https://doi.org/10.1145/2482513.2482529","url":null,"abstract":"With the rapid growth of GSM telecommunication, special requirements arise in digital forensics to identify mobile phones operating in a GSM network. This paper introduces a novel method to identify GSM devices based on physical characteristics of the radio frequency hardware. An implementation of a specialised receiver software allows passive monitoring of GSM traffic along with physical layer burst extraction even for handover and frequency hopping techniques. We introduce time-based patterns of modulation errors as a unique device-dependent feature and carefully remove random effects of the wireless communication channel. Using our characteristics, we could distinguish 13 mobile phones at an overall success rate of 97.62% under real-world conditions. This work proves practical feasibility of physical layer identification scenarios capable of tracking or authenticating GSM-based devices.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115180251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Watermarking road maps against crop and merge attacks 水印地图防止裁剪和合并攻击
Information Hiding and Multimedia Security Workshop Pub Date : 2013-06-17 DOI: 10.1145/2482513.2482526
Kai-Ming Jiang, Kenny Q. Zhu, Yan Huang, Xiaobin Ma
{"title":"Watermarking road maps against crop and merge attacks","authors":"Kai-Ming Jiang, Kenny Q. Zhu, Yan Huang, Xiaobin Ma","doi":"10.1145/2482513.2482526","DOIUrl":"https://doi.org/10.1145/2482513.2482526","url":null,"abstract":"Past research on watermarking digital road maps has been focused on deterring common attacks such as adding noise to the whole map so as to destroy the embedded watermarks. This paper focuses on two less common but increasingly used types of attack: crop attacks and merge attacks. Crop attack crops a fragment of the original map and uses the fragment as a new map. When the new map is much smaller than the original map, it is called massive cropping. Merge attack merges maps from various sources together to form a new map. Conventional watermarking techniques fail against these attacks either because they require global information from the whole map or they must add too many local watermarks and affect the usability of the maps. This paper proposes a novel quad-tree based blind watermarking scheme that partitions the original map according to the quad-tree and plants just one single bit in each sub-region of the map. The approach achieves almost 100% detection accuracy for moderate crop and merge attacks, and over 80% accuracy with more than 95% of the original map cropped and removed. Furthermore, the method introduces very little distortion to the original map: to effectively protect a 23.5MB Minneapolis-St.Paul map against crop and merge as well as other common attacks, only 423 bits or 53 bytes of watermark is required.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121301192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarking 一种用于抗合谋买卖水印的非对称指纹编码
Information Hiding and Multimedia Security Workshop Pub Date : 2013-06-17 DOI: 10.1145/2482513.2482525
Serdar Pehlivanoglu
{"title":"An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarking","authors":"Serdar Pehlivanoglu","doi":"10.1145/2482513.2482525","DOIUrl":"https://doi.org/10.1145/2482513.2482525","url":null,"abstract":"A buyer seller watermarking protocol is intended to ensure copyright protection, privacy and security for both the buyer and seller simultaneously in an e-commerce application. A traitor should not be able to deny his responsibility of a copyright violation caused by him in such protocols. This feature is identified as non-repudiation in the literature. An efficient approach taken is through secure embedding of watermarks in an encrypted domain by using dither modulation and homomorphic encryption. To support non-repudiation along with collusion resistance, one needs an asymmetric collusion resistant fingerprinting code that is compatible with the watermarking technique. The design of such codes has not yet studied thoroughly with an exception of a recent work by Charpentier et. al. in [4].\u0000 In this paper, we propose an asymmetric binary fingerprinting code based on Boneh-Shaw code. When applied to the secure embedding of watermarks, we show that our code outperforms the code introduced by [4]: (i) we achieve constant communication round, (ii) we do not require any oblivious transfer protocol and (iii) we do not require any public Write Once Read Many (WORM) directory.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130444861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
First investigation of latent fingerprints long-term aging using chromatic white light sensors 彩色白光传感器对指纹长期老化的初步研究
Information Hiding and Multimedia Security Workshop Pub Date : 2013-06-17 DOI: 10.1145/2482513.2482519
R. Merkel, K. Otte, R. Clausing, J. Dittmann, C. Vielhauer, Anja Bräutigam
{"title":"First investigation of latent fingerprints long-term aging using chromatic white light sensors","authors":"R. Merkel, K. Otte, R. Clausing, J. Dittmann, C. Vielhauer, Anja Bräutigam","doi":"10.1145/2482513.2482519","DOIUrl":"https://doi.org/10.1145/2482513.2482519","url":null,"abstract":"Non-invasive high-resolution Chromatic White Light (CWL) measurement devices offer great potential for solving the challenge of latent fingerprints age determination. In this paper, we place 40 prints from different subjects on hard disk platters and capture them from three different indoor locations every week over 1.5 years, acquiring high-resolution time series (10 μm and 20 μm). In contrast to prior findings from Popa et al. (using glass substrates) we show that the ridge thickness of our very precise images does not significantly decrease over time (test goal 1). We furthermore show that pores exhibit a significant loss in contrast and contour, which might lead to the impression of becoming bigger and fewer (test goal 2). Computing the contrast based Binary Pixel aging feature (test goal 3), we observe very characteristic results, leading to the conclusion that the dominant aging property seems to be an overall loss of image contrast rather than a specific change of ridge thickness or pore size. Comparing our findings between three different indoor locations (test goal 4) and discussing them from a police point of view, we conclude that sweat composition, environmental influences and scan parameters have a significant impact on fingerprints long-term aging.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115445314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
Moving steganography and steganalysis from the laboratory into the real world 将隐写术和隐写分析从实验室搬到现实世界
Information Hiding and Multimedia Security Workshop Pub Date : 2013-06-17 DOI: 10.1145/2482513.2482965
Andrew D. Ker, P. Bas, Rainer Böhme, R. Cogranne, S. Craver, Tomás Filler, J. Fridrich, T. Pevný
{"title":"Moving steganography and steganalysis from the laboratory into the real world","authors":"Andrew D. Ker, P. Bas, Rainer Böhme, R. Cogranne, S. Craver, Tomás Filler, J. Fridrich, T. Pevný","doi":"10.1145/2482513.2482965","DOIUrl":"https://doi.org/10.1145/2482513.2482965","url":null,"abstract":"There has been an explosion of academic literature on steganography and steganalysis in the past two decades. With a few exceptions, such papers address abstractions of the hiding and detection problems, which arguably have become disconnected from the real world. Most published results, including by the authors of this paper, apply \"in laboratory conditions\" and some are heavily hedged by assumptions and caveats; significant challenges remain unsolved in order to implement good steganography and steganalysis in practice. This position paper sets out some of the important questions which have been left unanswered, as well as highlighting some that have already been addressed successfully, for steganography and steganalysis to be used in the real world.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131355762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 249
Distortion function designing for JPEG steganography with uncompressed side-image 未压缩侧像JPEG隐写的失真函数设计
Information Hiding and Multimedia Security Workshop Pub Date : 2013-06-17 DOI: 10.1145/2482513.2482517
Fangjun Huang, Weiqi Luo, Jiwu Huang, Y. Shi
{"title":"Distortion function designing for JPEG steganography with uncompressed side-image","authors":"Fangjun Huang, Weiqi Luo, Jiwu Huang, Y. Shi","doi":"10.1145/2482513.2482517","DOIUrl":"https://doi.org/10.1145/2482513.2482517","url":null,"abstract":"In this paper, we present a new framework for designing distortion functions of joint photographic experts group (JPEG) steganography with uncompressed side-image. In our framework, the discrete cosine transform (DCT) coefficients, including all direct current (DC) coefficients and alternating current (AC) coefficients, are divided into two groups: first-priority group (FPG) and second-priority group (SPG). Different strategies are established to associate the distortion values to the coefficients in FPG and SPG, respectively. In this paper, three scenarios for dividing the coefficients into FPG and SPG are exemplified, which can be utilized to form a series of new distortion functions. Experimental results demonstrate that while applying these generated distortion functions to JPEG steganography, the intrinsic statistical characteristics of the carrier image will be preserved better than the prior-art, and consequently the security performance of the corresponding JPEG steganography can be improved significantly.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128230948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Non-invertible and revocable iris templates using key-dependent wavelet transforms 基于键相关小波变换的不可逆和可撤销虹膜模板
Information Hiding and Multimedia Security Workshop Pub Date : 2013-06-17 DOI: 10.1145/2482513.2482532
Jutta Hämmerle-Uhl, E. Pschernig, A. Uhl
{"title":"Non-invertible and revocable iris templates using key-dependent wavelet transforms","authors":"Jutta Hämmerle-Uhl, E. Pschernig, A. Uhl","doi":"10.1145/2482513.2482532","DOIUrl":"https://doi.org/10.1145/2482513.2482532","url":null,"abstract":"A technique to generate non-invertible and revocable iris templates is proposed employing key-dependent wavelet transforms. In particular, parametrised wavelet-filters and wavelet packets are used in feature extraction in replacement of a pyramidal D4 wavelet transform. Since the template generation process is non-invertible by design, the overall scheme is non-invertible as well. Recognition accuracy is found to be high as long as personal tokens remain secret, templates can be revoked by simply exchanging the wavelet transform applied in the feature extraction process.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129840039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Region of interest signalling for encrypted JPEG images 加密JPEG图像的感兴趣区域信号
Information Hiding and Multimedia Security Workshop Pub Date : 2013-06-17 DOI: 10.1145/2482513.2482518
D. Engel, A. Uhl, A. Unterweger
{"title":"Region of interest signalling for encrypted JPEG images","authors":"D. Engel, A. Uhl, A. Unterweger","doi":"10.1145/2482513.2482518","DOIUrl":"https://doi.org/10.1145/2482513.2482518","url":null,"abstract":"We propose and evaluate different methods to signal position and size of encrypted RoIs (Regions of Interest) in JPEG images. After discussing various design choices regarding the encoding of RoI coordinates with a minimal amount of bits, we discuss both, existing and newly proposed approaches to signal the encoded coordinates inside JPEG images. By evaluating the different signalling methods on various data sets, we show that several of our proposed encoding methods outperform JBIG in this special use case. Furthermore, we show that one of our proposed signalling methods allows length-preserving lossless signalling, i.e., storing RoI coordinates in a format-compliant way inside the JPEG images without quality loss or change of file size.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116368177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Joint watermarking and progressive geometric compression of 3D meshes 三维网格的联合水印和渐进几何压缩
Information Hiding and Multimedia Security Workshop Pub Date : 2013-06-17 DOI: 10.1145/2482513.2482530
I. Bouzidi, A. O. Zaid, M. Hachani, W. Puech
{"title":"Joint watermarking and progressive geometric compression of 3D meshes","authors":"I. Bouzidi, A. O. Zaid, M. Hachani, W. Puech","doi":"10.1145/2482513.2482530","DOIUrl":"https://doi.org/10.1145/2482513.2482530","url":null,"abstract":"With the ever-increasing development of digital technologies and digital 3D models, the question of 3D mesh protection has becoming more and more important. One of the problems in digital watermarking is to decide how to embed in a 3D mesh as many bits of information as possible while ensuring that the hidden information can be correctly retrieved after 3D mesh compression. This paper describes a hybrid watermarking/compression system, adapted to semi-regular 3D meshes. The central contribution is to integrate blind watermarking, to geometric progressive compression algorithm. The latter consists on semi-regular wavelet transform and zerotree coding approach. The proposed embedding method operates in the discrete wavelet transform domain using dither modulation principal. This work shows the ability of joint watermarking/compression scheme to guarantee watermark robustness against compression attacks while inducing a low quality degradation.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128700631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimal suspicion functions for tardos traitor tracing schemes 塔多斯叛徒追踪方案的最优怀疑函数
Information Hiding and Multimedia Security Workshop Pub Date : 2013-06-17 DOI: 10.1145/2482513.2482527
Jan-Jaap Oosterwijk, B. Škorić, J. Doumen
{"title":"Optimal suspicion functions for tardos traitor tracing schemes","authors":"Jan-Jaap Oosterwijk, B. Škorić, J. Doumen","doi":"10.1145/2482513.2482527","DOIUrl":"https://doi.org/10.1145/2482513.2482527","url":null,"abstract":"We investigate alternative suspicion functions for Tardos traitor tracing schemes. In the simple decoder approach (computation of a score for every user independently) we derive suspicion functions that optimize a performance indicator related to the sufficient code length l in the limit of large coalition size c. Our results hold for the Restricted-Digit Model as well as the Combined-Digit Model. The scores depend on information that is usually not available to the tracer -- the attack strategy or the tallies of the symbols received by the colluders. We discuss how such results can be used in realistic contexts.\u0000 We study several combinations of coalition attack strategy versus suspicion function optimized against some attack (another attack or the same). In many of these combinations the usual scaling l propto c2 is replaced by a lower power of c, e.g. c3/2. We find that the interleaving strategy is an especially powerful attack, and the suspicion function tailored against interleaving is effective against all considered attacks.","PeriodicalId":243756,"journal":{"name":"Information Hiding and Multimedia Security Workshop","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127571751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信