On Reversibility of Random Binning Techniques: Multimedia Perspectives

In this paper, we analyze a possibility of reversibility of data-hiding techniques based on random binning from multimedia perspectives. We demonstrate the capabilities of unauthorized users to perform hidden data removal using solely a signal processing approach based on optimal estimation as well as consider reversibility on the side of authorized users who have the knowledge of key used for the message hiding.

[1]  Fernando Pérez-González,et al.  Revealing the true achievable rates of scalar Costa scheme , 2004, IEEE 6th Workshop on Multimedia Signal Processing, 2004..

[2]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[3]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[4]  Bernd Girod,et al.  Inverse mapping of SCS-Watermarked Data , 2002, 2002 11th European Signal Processing Conference.

[5]  Sailes K. Sengijpta Fundamentals of Statistical Signal Processing: Estimation Theory , 1995 .

[6]  Thierry Pun,et al.  Visual communications with side information via distributed printing channels: extended multimedia and security perspectives , 2004, IS&T/SPIE Electronic Imaging.

[7]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[8]  Joseph A. O'Sullivan,et al.  Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.