On joint coding for watermarking and encryption

In continuation of earlier work, where the problem of joint information embedding and lossless compression (of the composite signal) was studied in the absence and in the presence of attacks, here we consider the additional ingredient of protecting the secrecy of the watermark against an unauthorized party, which has no access to a secret key shared by the legitimate parties. In other words, we study the problem of joint coding for three objectives: information embedding, compression, and encryption. Our main result is a coding theorem that provides a single-letter characterization of the best achievable tradeoffs among the following parameters: the distortion between the composite signal and the covertext, the distortion in reconstructing the watermark by the legitimate receiver, the compressibility of the composite signal (with and without the key), and the equivocation of the watermark, as well as its reconstructed version, given the composite signal. In the attack-free case, if the key is independent of the covertext, this coding theorem gives rise to a threefold separation principle that tells that asymptotically, for long block codes, no optimality is lost by first applying a rate-distortion code to the watermark source, then encrypting the compressed codeword, and finally, embedding it into the covertext using a previously proposed embedding scheme. In the more general case, however, this separation principle is no longer valid, as the key plays an additional role of side information used by the embedding unit

[1]  Neri Merhav,et al.  On joint information embedding and lossy compression in the presence of a stationary memoryless attack channel , 2004, IEEE Transactions on Information Theory.

[2]  Hirosuke Yamamoto Rate-distortion theory for the Shannon cipher system , 1997, IEEE Trans. Inf. Theory.

[3]  R. A. McDonald,et al.  Noiseless Coding of Correlated Information Sources , 1973 .

[4]  Paul D. Amer,et al.  Progressively authenticated image transmission , 1999, MILCOM 1999. IEEE Military Communications. Conference Proceedings (Cat. No.99CH36341).

[5]  Masakatsu Nishigaki,et al.  A digital watermark using public-key cryptography for open algorithm , 2002 .

[6]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[7]  Sergio Verdú,et al.  Channel simulation and coding with side information , 1994, IEEE Trans. Inf. Theory.

[8]  Stefan Katzenbeisser,et al.  Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure , 2002, 2002 11th European Signal Processing Conference.

[9]  Neri Merhav On the shannon cipher system with a capacity-limited key-distribution channel , 2006, IEEE Transactions on Information Theory.

[10]  Shing-Chi Cheung,et al.  A watermarking infrastructure for enterprise document management , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[11]  Jack K. Wolf,et al.  Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.

[12]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[13]  Neri Merhav,et al.  On joint information embedding and lossy compression , 2005, IEEE Transactions on Information Theory.

[14]  Shlomo Shamai,et al.  On joint source-channel coding for the Wyner-Ziv source and the Gel'fand-Pinsker channel , 2003, IEEE Trans. Inf. Theory.

[15]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[16]  Pierre Moulin,et al.  New results on steganographic capacity , 2004 .

[17]  Vinod M. Prabhakaran,et al.  On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.