Oracle Attacks and Covert Channels

In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name oracle channels. By exploiting information-theoretic notions, we show how to modify detection/authentication watermarking algorithms in order to counteract oracle attacks. We present three proposals, one based on randomization, another one based on time delay and a third one based on both randomization and delay.

[1]  Pierre Duhamel,et al.  Unified approach of asymmetric watermarking schemes , 2001, IS&T/SPIE Electronic Imaging.

[2]  Ingemar J. Cox,et al.  8 – Robust Watermarking , 2002 .

[3]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[4]  I. S. Moskowitz,et al.  Covert channels-here to stay? , 1994, Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance.

[5]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[6]  Moses Charikar,et al.  Similarity estimation techniques from rounding algorithms , 2002, STOC '02.

[7]  Ilaria Venturini Counteracting Oracle attacks , 2004, MM&Sec '04.

[8]  Pedro Comesaña Alfaro,et al.  Detection in quantization-based watermarking: performance and security issues , 2005, IS&T/SPIE Electronic Imaging.

[9]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[10]  Jonathan K. Millen 20 years of covert channel modeling and analysis , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[11]  Ton Kalker,et al.  Issues with digital watermarking and perceptual hashing , 2001, SPIE ITCom.

[12]  Gustavus J. Simmons,et al.  Subliminal channels; past and present , 2010, Eur. Trans. Telecommun..

[13]  Pierre Moulin,et al.  New sensitivity analysis attack , 2005, IS&T/SPIE Electronic Imaging.

[14]  Jean-Paul M. G. Linnartz,et al.  Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[15]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of watermarking , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).

[16]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[17]  Mohamed F. Mansour,et al.  Secure watermark detection with nonparametric decision boundaries , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.