Information-theoretic analysis of electronic and printed document authentication

In this paper we consider the problem of document authentication in electronic and printed forms. We formulate this problem from the information-theoretic perspectives and present the joint source-channel coding theorems showing the performance limits in such protocols. We analyze the security of document authentication methods and present the optimal attacking strategies with corresponding complexity estimates that, contrarily to the existing studies, crucially rely on the information leaked by the authentication protocol. Finally, we present the results of experimental validation of the developed concept that justifies the practical efficiency of the elaborated framework.

[1]  Fernando Pérez-González,et al.  Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis , 2005, Information Hiding.

[2]  Thierry Pun,et al.  Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management , 2006, IEEE Trans. Inf. Forensics Secur..

[3]  Jessica J. Fridrich Visual hash for oblivious watermarking , 2000, Electronic Imaging.

[4]  Thierry Pun,et al.  Protocols for data-hiding based text document security and automatic processing , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[5]  Thierry Pun,et al.  A Theoretical Framework for Data-Hiding in Digital and Printed Text Documents , 2005, Communications and Multimedia Security.

[6]  Giorgio Bonmassar,et al.  Space-Variant Fourier Analysis: The Exponential Chirp Transform , 1997, IEEE Trans. Pattern Anal. Mach. Intell..

[7]  Min Wu,et al.  Watermarking for image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[8]  Min Wu,et al.  Security of feature extraction in image hashing , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[9]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[10]  Thierry Pun,et al.  Multilevel 2-D Bar Codes: Toward High-Capacity Storage Modules for Multimedia Security and Management , 2005, IEEE Transactions on Information Forensics and Security.

[11]  Sushil K. Bhattacharjee,et al.  Compression tolerant image authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[12]  Ueli Maurer A Unified and Generalized Treatment of Authentification Theory , 1996, STACS.

[13]  Ying Wang,et al.  Steganalysis of block-structured stegotext , 2004, IS&T/SPIE Electronic Imaging.

[14]  Thierry Pun,et al.  Secure hybrid robust watermarking resistant against tampering and copy attack , 2003, Signal Process..

[15]  C. Fontaine,et al.  Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.

[16]  Toby Berger,et al.  Rate distortion theory : a mathematical basis for data compression , 1971 .

[17]  Bernd Girod,et al.  Blind watermarking applied to image authentication , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[18]  Sviatoslav Voloshynovskiy,et al.  Watermark copy attack , 2000, Electronic Imaging.

[19]  Thierry Pun,et al.  On Reversibility of Random Binning Techniques: Multimedia Perspectives , 2005, Communications and Multimedia Security.

[20]  Min Wu,et al.  Image hashing resilient to geometric and filtering operations , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..

[21]  James H. Burrows,et al.  Secure Hash Standard , 1995 .

[22]  Fernando Pérez-González,et al.  Information-Theoretic Analysis of Security in Side-Informed Data Hiding , 2005, Information Hiding.

[23]  Deepa Kundur,et al.  Analysis and design of authentication watermarking , 2004, IS&T/SPIE Electronic Imaging.

[24]  Dirk Fox,et al.  Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.

[25]  U. Maurer A Uniied and Generalized Treatment of Authentication Theory , 1996 .

[26]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[27]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.

[28]  Xuejia Lai,et al.  A Proposal for a New Block Encryption Standard , 1991, EUROCRYPT.

[29]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..