ORIGINAL_ARTICLE
A survey on digital data hiding schemes: principals, algorithms, and applications
>This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, or video and the final receiver, which is Human Auditory System (HAS) or Human Visual System (HVS), is also beneficial. For the speech/audio case, HAS will be briefly reviewed to find out how to make the most of its weaknesses for embedding as much data as possible. The same discussion also holds for the image watermarking. Although several audio and image data hiding schemes have been proposed so far, they can be divided into a few categories. Hence, conventional schemes along with their recently published extensions are introduced. Besides, a general comparison is made among these methods leading researchers/designers to choose the appropriate schemes based on their applications. Regarding the old scenario of the prisoner-warden and the evil intention of the warden to eavesdrop and/or destroy the data that Alice sends to Bob, there are both intentional and unintentional attacks to digital information hiding systems, which have the same effect based on our definition. These attacks can also be considered for testing the performance or benchmarking, of the watermarking algorithm. They are also known as steganalysis methods which will be discussed at the end of the paper.
http://www.isecure-journal.com/article_39134_fa8d8264a6ef71d410a75af0365ec2fe.pdf
2013-01-01T11:23:20
2017-09-22T11:23:20
5
36
10.22042/isecure.2013.5.1.2
Data hiding
Watermarking
Capacity
Robustness
security
Steganalysis
M. A.
Akhaee
akhaee@ut.ac.ir
true
1
LEAD_AUTHOR
F.
Marvasti
marvasti@sharif.edu
true
2
AUTHOR
[1] C. S. Lu, Multimedia security: steganography and digital watermarking techniques for protection of intellectual property, Idea Group Publishing, 2004.
1
[2] J. Seitz, Digital watermarking for digital media, Information Science Publishing, 2005.
2
[3] G. C. Langelaar, I. Setyawan, and R.L. Lagendijk, Watermarking digital image and video data: A state-of-the-art overview, IEEE Trans. Signal Process. Magazine, vol. 17, no. 5, pp. 20-46, 2000.
3
[4] S. Katzenbeisser, and F. A. Petitcolas, Information hiding techniques for steganography and digital watermarking, Artech House, Boston, 2000.
4
[5] I. J. Cox, M. L. Miller, and J. A. Bloom,. Digital watermarking, first edition, San Francisco: Morgan Kaufmann, 2002.
5
[6] M. Barni and F. Bartolini, Watermarking systems engineering: Enabling Digital Assets Security and Other Applications, CRC, 2008.
6
[7] A. B. Watson, Handbook of human perception and performance, in Temporal Sensitivity, K. Boff, L. Kaufmann, and J. Thomas, Eds. New York: Wiley, 1986.
7
[8] A. B. Watson, M. Taylor, and R. Borthwick, Image quality and entropy masking, Proc. SPIE, Human Vision, Visual Processing, and Digital Display VIII, 1997, vol. 3016, pp. 2-12.
8
[9] A. B. Watson, J. Y. Yang, J. A. Solomon, and J. Villasenor, Visibility of wavelet quantization noise, IEEE Trans. on Image Process., vol. 6, no. 8, pp. 1164-1175, Oct. 1997.
9
[10] J. R. Deller, J. H. L. Hansen, and J. G. Proakis, Discrete- Time Processing of Speech Signals, 2nd edition, IEEE Press, 2000.
10
[11] SQAM - Sound Quality Assessment Material, http://sound.media.mit.edu/mpeg4/audio/sqam/,2006.
11
[12] K. Brandenburg, T. Sporer, NMR and masking flag: Evaluation of quality using perceptual criteria, Proceedings of the International Audio Engineering Society Conference on Audio Test and Measurement, pp.169-179, Sept, 1992.
12
[13] Z. Wang, and A. C. Bovik, Image quality assessment: from error visibility to structural similarity, IEEE Trans. on Image Process., vol. 13, no. 4, pp. 600-612, 2004.
13
[14] Z. Wang, and A. C. Bovik, A universal image quality index, IEEE Signal Processing Letters, vol. 9,no.3,pp.81-84,2002.
14
[15] P. Kabal, An Examination and Interpretation of ITU-R BS.1387: Perceptual evaluation of audio quality, Technical Report of Telecom. Signal Process. Lab., version 2, (http://www.tsp.ece.mcgill.ca/), McGill University, 2003.
15
[16] Q. Cheng, and T. S. Huang, Robust optimum detection of transform domain multiplicative watermarks, IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 906-924, 2003.
16
[17] S. Wu, J. Huang, D. Huang, Y. Q. Shi, Efficiently self-synchronized audio watermarking for assured audio data, IEEE Transmissions on Broadcast., vol.51, no. 1, pp. 69-76, Mar. 2005.
17
[18] E. T. Lin and E. J. Delp, A review of fragile image watermarks, Proc. Multimedia and Security Workshop on Multimedia Contents, Orlando, pp. 25-29, Oct. 1999.
18
[19] L. M. Marvel, G. W. Hartwig, and C. Boncelet, Compression compatible fragile and semi fragile tamper detection, Proc. SPIE, vol. 39, no 71, 131-139 ,2002.
19
[20] O. Ekici, B. Sankur, B. Coskun, U. Naci, M. Akcay, Comparative assessment of semi fragile watermarking methods, Journal of Electronic Imaging, vol. 13, no. 1, pp. 209-216, Jan. 2004.
20
[21] C. Lu and H. M. Liao, Multipurpose watermarking for image authentication and protection, IEEE Trans. Image Process., vol. 10, no. 10, pp.1579-1592, Oct., 2001.
21
[22] J. Fridrich, Security of fragile authentication watermarks with localization, Proc. SPIE, vol. 46, no. 75, 691-700, 2002.
22
[23] G. W. Yu, C. S. Lu, and H. Y. M. Liao, Mean quantization-based fragile watermarking for image authentication, Opt. Eng. vol. 40, no. 7, 1396-1408, 2004.
23
[24] H. Yuan, and X. P. Zhang, Multiscale fragile watermarking based on the Gaussian mixture model, IEEE Trans. on Image Process., vol. 15, no. 10, pp. 3189-3200, Oct. 2006.
24
[25] E. T. Lin, C. I. Podilchuk, and E. J. Delp, Detection of image alterations using semi-fragile watermarks, Proc. SPIE, vol. 39, no. 71, pp. 152-163, 2000.
25
[26] Z. M. Lu, C. H. Liu, D. G. Xu, and S. H. Sun, Semi-fragile image watermarking method based on index constrained vector quantization, Electronic Letter, vol. 39, no. 7, pp. 35-36. Jan. 2003.
26
[27] D. Zou, Y. Q. Shi, Z. Ni, and W. Su, A semi-fragile lossless digital watermarking scheme, IEEE Trans. on Circuit and Systems for Video Tech., vol. 16, no. 10, pp. 1294-1300, Oct. 2006.
27
[28] J. Chou, K. Ramchandran, and A. Ortega, High capacity audio data hiding for noisy channels, Proc. of the International Conference on Information Technology: Coding and Computing, pp.108-111, 2001.
28
[29] K. Hofbauer and G. Kubin, High-rate data embedding in unvoiced speech, Proc. International Conference on Spoken Language Processing, pp.176-180, 2006.
29
[30] D. C. Wu and W. H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognition Letters, vol. 24, no. 910, pp.1613 - 1626, 2003.
30
[31] X. Zhang and S. Wang, Vulnerability of pixel- value differencing steganography to histogram analysis and modification for enhanced security, Pattern Recognition Letters, vol. 25, no. 3, pp.331 - 339, 2004.
31
[32] C. H. Yang, C. Y. Weng, S. J. Wang, and H.M. Sun, Adaptive data hiding in edge areas of images with spatial lsb domain systems, IEEE Trans. on Info. Forensics and Security, vol. 3, no. 3, pp. 488 -497, Sept. 2008.
32
[33] H. C.Wu, N. I.Wu, C. S. Tsai, and M. S. Hwang, Image steganographic scheme based on pixel-value differencing and lsb replacement methods, Vision, Image and Signal Processing, IEE Proc., vol. 152, no. 5, pp. 611- 615, Oct. 2005.
33
[34] H. Hering and M. Hagmuller, Safety and security increase for air traffic management through unnoticeable watermark aircraft identification tag transmitted with the VHF voice communication, Proc. of International Conference on Digital Avionic Systems, pp. 202 - 206, 2003.
34
[35] J. Mielikainen, LSB Matching Revisited, IEEE Signal Processing Letters, vol. 13, no. 5., May, 2006.
35
[36] S. Sarreshtedari, M. Ghotbi, and S. Ghaemmaghami, One-third probability embedding: Less detectable LSB steganography, Proc. of International Conference on Multimedia and Expo (ICME), pp. 1002-1005, 2009.
36
[37] X. Li, B. Yang, D. Cheng, and T. Zeng, A generalization of lsb matching, Signal Processing Letters, IEEE, vol. 16, no. 2, Feb. 2009.
37
[38] N. Khademi-kalantari, M. A. Akhaee, and S. M. Ahadi, and S. M. R. Amindavar, Robust multiplicative patchwork method for audio watermarking, IEEE Trans. on Audio, Speech, and Language Processing, vol. 17, no. 6, pp. 1133-1141, 2009.
38
[39] A. Westfeld, F5-A Steganographic algorithm, in Lecture Notes in Computer Science. Springer, 2001, vol. 2137, pp. 289-302.
39
[40] J. Fridrich, T. Pevny, and J. Kodovsky, Statistically undetectable JPEG steganography: dead ends challenges, and opportunities, Proc. of 9th workshop on Multimedia & security, New York, NY, USA: ACM, 2007, pp. 3-14.
40
[41] J. Fridrich and M. Goljan, Images with self-correcting capabilities, Proc. of International Conference on Image Processing, vol. 3, pp. 792-796, 1999.
41
[42] H. J. He, J. S. Zhang, and F. Chen, Adjacent-block based statistical detection method for self-embedding watermarking techniques, Signal Processing, vol. 89, no. 8, pp. 1557 - 1566, 2009.
42
[43] S. H. Liu, H. X. Yao, W. Gao, and Y.-L. Liu, An image fragile watermark scheme based on chaotic image pattern and pixel-pairs, Applied Mathematics and Computation, vol. 185, no. 2, pp. 869-882, 2007.
43
[44] V. Mall, K. Bhatt, S. Mitra, and A. Roy, Exposing structural tampering in digital images, Proc. International Conference Signal Processing, Computing and Control (ISPCC), pp. 1-6.2012.
44
[45] R. Chamlawi, A. Khan, and I. Usman, Authentication and recovery of images using multiple watermarks, Computers and Electrical Engineering, vol. 36, no. 3, pp. 578 - 584, 2010.
45
[46] C. W. Yang and J. J. Shen, Recover the tampered image based on vq indexing, Signal Processing, vol. 90, no. 1, pp. 331 - 343, 2010.
46
[47] A. Cheddad, J. Condell, K. Curran, and P. M. Kevitt, A secure and improved self-embedding algorithm to combat digital document forgery, Signal Processing, vol. 89, no. 12, pp. 2324 - 2332,2009.
47
[48] X. Zhang and S. Wang, Statistical fragile watermarking capable of locating individual tampered pixels, Signal Processing Letters, IEEE, vol. 14, no. 10, pp. 727-730, 2007.
48
[49] X. Zhang and S. Wang, Fragile watermarking with error-free restoration capability, IEEE Transactions on Multimedia, vol. 10, no. 8, pp.1490-1499, 2008.
49
[50] X. Zhang and S. Wang, Fragile watermarking scheme using a hierarchical mechanism, Signal Processing, vol. 89, no. 4, pp. 675 - 679, 2009.
50
[51] X. Zhang, S. Wang, and G. Feng, Fragile watermarking scheme with extensive content restoration capability, in Digital Watermarking, ser. Lecture Notes in Computer Science. Springer Berlin Heidelberg, vol. 5703, pp. 268-278. 2009.
51
[52] X. Zhang, S. Wang, Z. Qian, and G. Feng, Self- embedding watermark with flexible restoration quality, Multimedia Tools and Applications, vol. 54, no. 2, pp. 385-395, 2011.
52
[53] Z. Qian, G. Feng, X. Zhang, and S. Wang, Image self-embedding with high-quality restoration capability, Digital Signal Processing, vol. 21, no.2, pp. 278 - 286, 2011.
53
[54] P. Korus and A. Dziech, A novel approach to adaptive image authentication, Proc. International Conference on Image Processing (ICIP), pp. 2765-2768. 2011.
54
[55] X. Zhang, Z. Qian, Y. Ren, and G. Feng, Watermarking with flexible self-recovery quality based on compressive sensing and composite re- construction, IEEE Transactions on Information Forensics and Security, vol. 6, no. 4, pp. 1223-1232, 2011.
55
[56] P. Korus and A. Dziech, Efficient method for con- tent reconstruction with self-embedding, IEEE Transactions on Image Processing, vol. 22, no. 3, pp. 1134-1147, 2013.
56
[57] D. J. C. MacKay, Fountain codes, Communications, IEE Proceedings, vol. 152, no. 6, pp. 1062-1068, 2005.
57
[58] S. Sarreshtedari, M. Akhaee, On source channel coding for image tampering protection and self- recovery, submitted to IEEE Transactions on Image Processing, 2013.
58
[59] A. Said and W. Pearlman, A new, fast, and efficient image codec based on set partitioning in hierarchical trees, IEEE Transactions on Circuits and Systems for Video Technology, vol. 6, no. 3, pp. 243-250, 1996.
59
[60] S. B. Wicker, Reed-Solomon Codes and Their Applications. Piscataway, NJ, USA: IEEE Press, 1994.
60
[61] J. Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications, 1st Edition, Cambridge University Press, NY, 2010.
61
[62] M. Parvaix, L. Girin, Informed Source Separation of Linear Instantaneous Under-Determined Audio Mixtures by Source Index Embedding, IEEE Transactions on Audio, Speech, and Language Processing, vol.19, no.6, pp.1721,1733, Aug. 2011.
62
[63] P. H. W. Wong, O. C. Au, A capacity estimation technique for JPEG-to-JPEG image watermarking, IEEE Transactions on Circuits and Systems for Video Technology, vol.13, no.8, pp.746,752, Aug. 2003.
63
[64] E. Zwicker and H. Fastl, Psychoacoustics: Facts and models, 2nd edition, Springer-Verlag, 1999.
64
[65] V. Schyndel, R. G., A. Z. Tirkel, and C. F. Osborne, A digital watermark, International Conference on Image Processing (ICIP), Austin, pp. 86-90. 1994.
65
[66] R. Crandall, Some Notes on Steganography, posted on Steganography Mailing List. 1998.
66
[67] A. Westfeld and A. Pfitzmann, Attacks on steganographic systems, in Proc. 3rd Int. Work- shop on Information Hiding, vol. 1768, pp. 61-76. 1999.
67
[68] J. Fridrich, M. Goljan, and R. Du, Detecting lsb steganography in color, and gray-scale images, IEEE, Multimedia, vol. 8, no. 4, pp. 22-28, Oct. 2001.
68
[69] A. Latham, JPEG Hide and Seek. 1999. Available: linux01.gwdg.de/alatham/stego.
69
[70] N. Provos, Outguess. [Online]. Available: www.outguess.org.
70
[71] J. Fridrich, M. Goljan, and D. Soukal, Perturbed quantization steganography, Multimedia Syst., vol. 11, no. 2, pp. 98-107, Dec. 2005.
71
[72] K. S. Wong, X. Qi, and K. Tanaka, A DCT-based Mod4 steganographic method, Signal Processing, vol. 87, pp. 1251-1263, 2007.
72
[73] C. K. Chan and L. Cheng, Hiding data in images by simple lsb substitution, Pattern Recognition, vol. 37, no. 3, pp. 469 - 474, 2004.
73
[74] C. H. Yang, Inverted pattern approach to improve image quality of information hiding by lsb substitution, Pattern Recognition, vol. 41, no. 8, pp. 2674 - 2683, 2008.
74
[75] X. Zhang and S. Wang, Efficient steganographic embedding by exploiting modification direction, Communications Lett., IEEE, vol. 10, no. 11, pp.
75
781 -783, Nov. 2006.
76
[76] R. M. Chao, H. C. Wu, C. C. Lee, and Y. P. Chu, A novel image data hiding scheme with diamond encoding, EURASIP J. Inf. Security, vol. 4, 2009.
77
[77] W. Hong and T. S. Chen, A novel data embedding method using adaptive pixel pair matching, IEEE Trans. on Info. Forensics and Security, vol. 7, no. 1, pp. 176 -184, Feb. 2012.
78
[78] C. F. Lee, C. C. Chang, and K. H. Wang, An improvement of EMD embedding method for large payloads by pixel segmentation strategy, Image and Vision Computing, vol. 26, no. 12, pp. 1670 - 1676, 2008.
79
[79] W. Hong, T. S. Chen, and C. W. Shiu, A minimal Euclidean distance searching technique for sudoku steganography, in International Symposium Info. Science and Engineering, vol. 1, pp. 515 -518. 2008.
80
[80] J. Wang, Y. Sun, H. Xu, K. Chen, H. J. Kim, and S. H. Joo, An improved section-wise exploiting modification direction method, Signal Processing, vol. 90, no. 11, pp. 2954 - 2964, 2010.
81
[81] B. Chen and G. Wornell, Quantization index modulation: A class of provably good methods for digital watermarking and information embed- ding, IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
82
[82] T. H. Lan, A. H. Tewfik, A novel high-capacity data-embedding system, IEEE Trans. On Image Process., vol. 15, no. 8, , pp. 2431-2440, Aug. 2006.
83
[83] J. J. Eggers, R. Buml, R. Tzschoppe, and B. Girod, Scalar costa scheme for information embedding, IEEE Trans. Signal Process., vol. 4, no. 51, pp. 1003-1019, Apr. 2003.
84
[84] R. Zamir, S. Shamai, and U. Erez, Nested linear/lattice codes for structured multi-terminal binning, IEEE Trans. Inf. Theory, vol. 48, no. 6, pp. 1250-1276, Jul. 2002.
85
[85] J. J. Eggers, J. K. Su, B. Girod, A blind watermarking scheme based on structured code-books, In Secure Images and Image Authentication, Proc. IEE Colloquium, pp. 4/1-4/6, Lon- don, UK, Apr. 2000.
86
[86] Q. Zhang, and N. Boston, Quantization index modulation using E8 lattice, Proc. of 41th Annual Allerton Conf. on Communication, Control and Computing, Allerton, IL, USA, 2003.
87
[87] R. Fischer, R. Tzschoppe, and R. Buhamel, Lattice costa schemes using subspace projection for digital watermarking, European Trans. Telecommunications, vol. 15, no. 4, pp. 51-362, Aug. 2004.
88
[88] A. Abrardo and M. Barni, Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding, IEEE Trans. Signal Processing, vol. 53, no. 2, pp. 824-833, 2005.
89
[89] M. A. Akhaee, M. J. Saberian, S. Feizi, and F. Marvasti, Robust audio data hiding using correlated quantization with histogram based detector, IEEE Trans. on Multimedia, vol. 11, no. 5, pp. 834-842, Aug. 2009.
90
[90] J. J. Eggers, R. Buml, and B. Girod, Estimation of amplitude modifications before SCS watermark detection, Proc. SPIE Security Watermarking Multimedia Contents, vol. 46 no. 75, pp. 387-398, Jan. 2002.
91
[91] M. L. Miller, G. J. Doerr, and I. J. Cox, Applying informed coding and embedding to design a robust high capacity watermark, IEEE Trans. Image Process., vol. 13, no. 6, pp. 792-807, Jun. 2004.
92
[92] F. Perz-Gonzalez, C. Mosquera, M. Barni, and A. Abrado, Rational dither modulation: A high rate data-hiding method invariant to gain attacks, IEEE Trans. Signal Process., vol. 53, no. 10, pp. 3960-3975, Oct. 2005.
93
[93] A. Abrardo, M. Barni, F. Perez-Gonzallez and C. Mosquera, Improving the performance of RDM watermarking by means of trellis coded quantization, IEE Proc. Inf. Security, vol. 153, no. 3, pp. 107-114, Sept. 2006.
94
[94] P. Guccione, M. Scagliola, Hyperbolic RDM for nonlinear volumetric distortions, IEEE Trans. Inf. Forensics and Security, vol. 4, no. 2, pp. 25-35, March 2009.
95
[95] F. Perz-Gonzalez, C. Mosquera, Quantization-based data hiding robust to linear-time-invariant filtering, IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 137-152, June 2008.
96
[96] M. A. Akhaee, A. Amini, G. Ghorbani, and F. Marvasti, A solution to gain attack on water marking systems: Logarithmic homogeneous rational dither modulation, Proc. of International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1312-1316, 2010.
97
[97] P. Comesaa and F. Perez-Gonalez, Dither modulation in the logarithmic domain, Proc. of International Workshop in Digital Watermarking (IWDW’07), Guangzhou, China, Dec. 2007.
98
[98] P. Comesata and F. Perez-Gonzalez, On a watermarking scheme in the logarithmic domain and its perceptual advantages, Proc. of International Conference on Image Processing (ICIP’07), pp. 2036-2039, 2007.
99
[99] U. Erez and R. Zamir, Achieving (1=2log(1+SNR) on the AWGN channel with lattice encoding and decoding, IEEE Trans. on Inf. Theory, vol. 50, no. 10, pp. 2293-2314, Oct. 2004.
100
[100] P. Moulin and R. Koetter, Data-hiding codes, IEEE Trans. on Signal Process., vol. 93, no. 12, pp. 2081-2127, Dec. 2005.
101
[101] R. Tzschoppe, R. Bahml, R. Fischer, A. Kaup, and J. Huber, Additive non-Gaussian attacks on the scalar costa scheme, in Proc. SPIE, San Jose, CA, Jan. 2005.
102
[102] P. Moulin, and A. K. Goteti, Block QIM watermarking games, IEEE Trans. on Inf. Forensics and Security, vol. 1, no. 3, pp. 293-310, Sept. 2006.
103
[103] N. K. Kalantari, S. M. Ahadi, A logarithmic quantization index modulation for perceptually better data hiding, Image Processing, IEEE Transactions on, vol. 19, no. 6, pp. 1504,1517, June 2010.
104
[104] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, Techniques for data hiding, IBM Systems, vol. 35, no. 3, pp. 313-336, 1996.
105
[105] M. Arnold, Audio watermarking: Features, applications and algorithms, IEEE International Conference Multimedia and Expo, vol. 2, pp. 1013-1016, 2008.
106
[106] I. K. Yeo and H. J. Kim, Modified patchwork algorithm: A novel audio watermarking scheme, IEEE Trans. on Speech, Audio, and Language Process., vol. 11, no. 4, pp. 381-386, Jul. 2003.
107
[107] I. K. Yeo, H. J. Kim Generalized patchwork algorithm for image watermarking, Multimedia Systems, vol. 9, no. 3, pp. 261-265, 2003.
108
[108] H. Malik, R. Ansari, and A. Khokhar, Robust data hiding in audio using allpass filters, IEEE Trans. on Audio, Speech, and Language Process., vol. 15, no. 4, pp. 1296-1304, May 2007.
109
[109] A. Takahashi, R. Nishimura, Y. Suzuki, Multiple watermarks for stereo audio signals using phase-modulation techniques, IEEE Trans. on Signal Process., vol. 53, no. 2 , pp. 806-815, Feb. 2005.
110
[110] D. Gruhl and W. Bender, Echo hiding, Proc. of Information Hiding Workshop, pp. 295-315, 1996.
111
[111] H. O. Oh, J. W. Seok, J. W. Hong, and D. H. Youn, New echo embedding technique for robust and imperceptible audio watermarking, Proc. of International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2011-2014, 2001.
112
[112] C. Xu, J. Wu, Q. Sun, and K. Xin, Applications of digital watermarking technology in audio signals, J. Audio Eng. Soc., vol. 47, no. 10, Oct. 1999.
113
[113] B. S. Ko, R. Nishimura, and Y. Suzuki, Time-spread echo method for digital audio watermarking, IEEE Trans. on Multimedia, vol. 7 , no. 2 , pp. 212-221, Apr. 2005.
114
[114] O. T. C. Chen, W. C. Wu, Highly Robust, Secure, and Perceptual-Quality Echo Hiding Scheme, IEEE Trans. on Audio, Speech, and Language Process., vol. 16, no. 3, pp. 629-638, Mar. 2008.
115
[115] I. J. Cox, M. L. Miller, and A. L. McKellips, Watermarking as communications with side information, Proceeding of the IEEE, 87, pp. 1127-1141, July 1999.
116
[116] A. B. Watson, J. Hu, and J. F. McGowan, III, DVQ: A digital video quality metric based on human vision, Journal Electronic Imaging, vol. 10, pp. 20-29, Jan. 2001.
117
[117] A. B. Watson, J. Y. Yang, J. A. Solomon, and J. Villasenor, Visibility of wavelet quantization noise, IEEE Trans. on Image Process., vol. 6, no. 8, pp. 1164-1175, Oct. 1997.
118
[118] I. J. Cox, J. Kilian, F.T. Leighton, and T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, 1997.
119
[119] Q. Cheng and T.S. Huang, An additive approach to transform-domain information hiding and optimum detection structure, IEEE Trans. Multimedia, vol. 3, no. 3, pp. 273-284, 2001.
120
[120] P. Moulin and A. Ivanovic The zero-rate spread spectrum watermarking game, IEEE Trans. on Signal Process., vol. 51, no. 4, pp. 1098-1117, Apr. 2003.
121
[121] H. O. Altun, A. Orsdemir, G. Sharma, and M. F. Bocko, Optimal spread spectrum watermark embedding via a multi-step feasibility formulation, IEEE Trans. Image Process., vol. 18, no. 2, pp. 371-386, Aug. 1999.
122
[122] L. M. Marvel, C. G. Boncelet, and C. T. Retter, Spread spectrum image steganography, IEEE Trans. on Signal Process., vol. 8, no. 8, pp. 1285-1293, Aug. 1999.
123
[123] S. P. Maity, and S. Maity, Multistage spread spectrum watermark detection, IEEE Signal Processing Lett., vol. 16, no. 4, Apr. 2009.
124
[124] M. Barni, F. Bartolini, A. De Rosa, and A. Piva, A new decoder for the optimum recovery of non-additive watermarks, IEEE Trans. Image Process., vol. 10, no. 5, pp. 755-766, 2001.
125
[125] Q. Cheng, and T. S. Huang, Robust optimum detection of transform domain multiplicative watermarks, IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 906-924, 2003.
126
[126] M. Barni, F. Bartolini, A. De Rosa, and A. Piva, Optimum decoding and detection of multiplicative watermarks, IEEE Trans. on Signal Process., vol. 51, no. 4, pp.1118-1123, 2003.
127
[127] T. M. Ng, H. Garg, Maximum likelihood detection in image watermarking using generalized gamma model, Proc. of 39th Asilomar Conference on Signals, Systemsand Computer, pp. 1680-1684, 2005.
128
[128] V. Solachidis, and I. Pitas, Optimal detector for multiplicative watermarks embedded in the DFT domain of non-white signals, EURASIP Journal on Applied Signal Processing, vol. 16, pp. 522-532, 2004.
129
[129] J. Wang, G. Liu, Y. Dai, and J. Sun, Locally optimum detection for Barni multiplicative watermarking in DWT domain, Signal Processing, vol. 88, pp. 117-130. 2008.
130
[130] M. N. Do, and M. Vetterli, The contourlet transform: An efficient directional multi-resolution image representation, IEEE Trans. on Image Process. vol. 14, no. 12, pp. 2091-2106, 2005.
131
[131] M. N. Do, and M. Vetterli, Framing pyramids, IEEE Trans. on Signal Process., pp. 23292342, Sep. 2003.
132
[132] M. A. Akhaee, N. Khademi-Kalantari, and F. Marvasti, Robust Multiplicative Audio and Speech Watermarking Using Statistical Modeling, Proc. of International Conference on Communications (ICC), 2009.
133
[133] M. A. Akhaee, N. K. Kalantari, F. Marvasti, Robust audio and speech watermarking using Gaussian and Laplacian modeling, Signal Processing, vol. 90, no. 8, pp. 2487-2497, August 2010.
134
[134] M. A. Akhaee, S. M. E. Sahraeian, F. Marvasti, and B. Sankur, Robust scaling-based image multiplicative watermarking technique using maximum likelihood decoder with optimum strength factor, IEEE Trans. on Multimedia, vol. 11, no 5, pp. 822-833, Aug. 2009.
135
[135] M. A. Akhaee, S. M. E. Sahraeian, F. Marvasti, Contourlet-based image watermarking using optimum detector in a noisy environment, IEEE Trans. on Image Process., vol.19, no.4, pp. 967-980, Apr 2010.
136
[136] N. K. Kalantari, S. M. Ahadi, M. Vafadust, M., A robust image watermarking in the ridgelet domain using universally optimum decoder, IEEE Trans. on Circuits and Systems for Video Technology, vol. 20, no. 3, pp. 396 -406, March 2010.
137
[137] M. A. Akhaee, S. M. E. Sahraeian, F. Marvasti, Universal optimum blind scaling based Watermarking using maximum likelihood decoder, Proc. of International Conference on Image Processing (ICIP), pp. 765-768, 2009.
138
[138] S. M. E. Sahraeian, M. A. Akhaee, F. Marvasti, Information hiding with optimal detector for highly correlated signals, Proc. of International Conference on Communications (ICC), 2009.
139
[139] J. J. Harmsen and W. A. Pearlman, Steganalysis of additive-noise modelable information hiding, in Society of Photo-Optical Instrumentation Engineers (SPIE) Conf., vol. 5020, pp. 131-142, 2003.
140
[140] A. D. Ker, Steganalysis of lsb matching in grayscale images, IEEE Signal Process. Lett., vol. 12, no. 6, pp. 441 - 444, Jun. 2005.
141
[141] X. Li, T. Zeng, and B. Yang, Detecting lsb matching by applying calibration technique for difference image, Proc. of the 10th ACM workshop on Multimedia and security, pp. 133-138, 2008.
142
[142] T. Pevny, P. Bas, and J. Fridrich, Steganalysis by subtractive pixel adjacency matrix, IEEE Trans. on Information Forensics and Security, vol. 5, no. 2, pp. 215 -224, Jun. 2010.
143
[143] H. Farid, Detecting hidden messages using higher-order statistical models, International Conference on Image Processing, vol. 2, pp. 905-908, 2002.
144
[144] I. Avcibas, N. Memon, and B. Sankur, Steganalysis using image quality metrics, IEEE Transactions on Image Process., vol. 12, no. 2, pp. 221-229, 2003.
145
[145] F. Huang, B. Li, and J. Huang, Attack lsb matching steganography by counting alteration rate of the number of neighborhood gray levels, Proc. of International Conference on Image Processing, pp. 401-404, 2007.
146
[146] Y. Wang and P. Moulin, Optimized feature extraction for learning-based image steganalysis, IEEE Trans. on Info. Forensics and Security, vol. 2, no. 1, pp. 31 -45, Mar. 2007.
147
[147] T. Pevny, P. Bas, and J. Fridrich, Steganalysis by subtractive pixel adjacency matrix, IEEE Transactions on Info. Forensics and Security, vol. 5, no. 2, pp. 215-224, 2010.
148
[148] Y. Q. Shi, C. Chen, and W. Chen, A markov process based approach to effective attacking jpeg steganography, in Information Hiding. Springer, pp. 249-264, 2007.
149
[149] C. Chen and Y. Shi, Jpeg image steganalysis utilizing both intrablock and interblock correlations, Proc. of International Symposium on Circuits and Systems, pp. 3029-3032, 2008.
150
[150] T. Pevny and J. Fridrich, Merging Markov and DCT features for multi-class JPEG steganalysis, Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents, vol. 3, pp. 1117-1126 2007.
151
[151] J. Kodovsky, J. Fridrich, Steganalysis in high dimensions: fusing classifiers built on random subspaces, Proc. of SPIE Media Watermarking, Security, and Forensics III, pp. 23-26, 2011.
152
[152] Y. Shi, G. Xuan, D. Zou, J. Gao, C. Yang, Z. Zhang, P. Chai, W. Chen, and C. Chen, Image steganalysis based on moments of characteristic functions using wavelet decomposition, prediction-error image, and neural network, Proc. of International Conference on Multimedia and Expo(ICME), 2005.
153
[153] C. C. Chang and C. J. Lin, Libsvm: a library for support vector machines, 2001, software available at http://www.csie.ntu.edu.tw/cjlin/libsvm.
154
[154] J. Kodovsky, J. Fridrich, and V. Holub, Ensemble classifiers for steganalysis of digital media, IEEE Trans. on Info. Forensics and Security, vol. 7, no. 2, pp. 432-444, 2012.
155
ORIGINAL_ARTICLE
Design and formal verification of DZMBE+
>In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature of our scheme is collusion resistance. Using secure multiparty computation, a traitor needs k cooperators in order to create a decryption machine. The broadcaster can choose the value of k as he decides to make a trade-off between communication complexity and collusion resistance. Comparison with other Broadcast Encryption schemes indicates enhanced performance and complexity on the part of the proposed scheme (in terms of message encryption and decryption, key storage requirements, and ciphertext size) relative to similar schemes. In addition, the scheme is modeled using applied pi calculus and its security is verified by means of an automated verification tool, i.e., ProVerif.
http://www.isecure-journal.com/article_39135_a837619ce7b3e26f5d6110ab1d021d6d.pdf
2013-01-01T11:23:20
2017-09-22T11:23:20
37
53
10.22042/isecure.2013.5.1.3
Broadcast Encryption
Secure Multiparty Computation
Threshold Secret Sharing
Formal Methods
Applied pi Calculus
M.
Soodkhah Mohammadi
xemailpro@yahoo.co.uk
true
1
LEAD_AUTHOR
A.
Ghaemi Bafghi
ghaemib@ferdowsi.um.ac.ir
true
2
AUTHOR
[1] Shimshon Berkovits. How to broadcast a secret. In DonaldW. Davies, editor, Advances in Cryptology EUROCRYPT 91, volume 547 of Lecture Notes in Computer Science, pages 535-541. Springer Berlin Heidelberg, 1991. ISBN 978-3-540-54620-7.
1
[2] Amos Fiat and Moni Naor. Broadcast encryption. In DouglasR. Stinson, editor, Advances in Cryptology CRYPTO 93, volume 773 of Lecture Notes in Computer Science, pages 480-491. Springer Berlin Heidelberg, 1994. ISBN 978-3-540 57766-9. doi: 10.1007/3-540-48329-2-40.
2
[3] Paolo DArco and DouglasR. Stinson. Fault tolerant and distributed broadcast encryption. In Marc Joye, editor, Topics in Cryptology CTRSA 2003, volume 2612 of Lecture Notes in Computer Science, pages 263-280. Springer Berlin Heidelberg, 2003. ISBN 978-3-540-00847-7. doi:10.1007/3-540-36563-X-18.
3
[4] Jung Hee Cheon, Nam-Su Jho, Myung-Hwan Kim, and Eun Sun Yoo. Skipping, cascade, and combined chain schemes for broadcast encryption. IEEE Transactions on Information Theory, 54(11):5155-5171, 2008.
4
[5] Yanli Chen and Geng Yang. An efficient broadcast encryption scheme for wireless sensor network. pages 3138-3141. IEEE Press, 2009.
5
[6] In Tae Kim and Seong Oun Hwang. An efficient identity-based broadcast signcryption scheme for wireless sensor networks. In Wireless and Pervasive Computing (ISWPC), 2011 6th International Symposium on, pages 1-6. 2011. doi:10.1109/ISWPC.2011.5751323.
6
[7] Jeffrey B. Lotspiech. Broadcast encryption versus public key cryptography in content protection systems. In Proceedings of the ninth ACM workshop on Digital rights management, DRM'09, pages 39-46. ACM, New York, NY, USA, 2009. ISBN 978-1-60558-779-0. doi:10.1145/1655048.1655055.
7
[8] Hongxia Jin and Jeffrey Lotspiech. Efficient traitor tracing for clone attack in content protection. In Proceedings of the 2011 ACM Symposium on Applied Computing, SAC '11, pages 1544-1549. ACM, New York, NY, USA, 2011. ISBN 978-1-4503-0113-8. doi: 10.1145/1982185.1982513.
8
[9] Ccile Delerable, Pascal Paillier, and David Pointcheval. Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Cipher-texts or Decryption Keys, volume 4575 of Lecture Notes in Computer Science, pages 39-59. Springer Berlin Heidelberg, 2007. ISBN 978-3-540-73488-8.
9
[10] Dan Boneh and Brent Waters. A fully collusion resistant broadcast, trace, and revoke system. In Proceedings of the 13th ACM conference on Computer and communications security, CCS'06, pages 211-220. ACM, New York, NY, USA, 2006. ISBN 1-59593-518-5. doi: 10.1145/1180405.
10
[11] Ik Rae Jeong. Efficient secret broadcast in the broadcasting networks. Communications Letters, IEEE, 13(12):1001-1003, 2009.
11
[12] Nelly Fazio and IrippugeMilinda Perera. Outsider-anonymous broadcast encryption with sub-linear ciphertexts. In Marc Fischlin, Johannes Buchmann, and Mark Manulis, editors, Public Key Cryptography PKC 2012, volume 7293 of Lecture Notes in Computer Science, pages 225-242. Springer Berlin Heidelberg, 2012. ISBN 978-3-642-30056-1. doi:10.1007/978-3-642-30057-8-14.
12
[13] Benot Libert, KennethG. Paterson, and Eliza bethA. Quaglia. Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model. In Marc Fischlin, Johannes Buchmann, and Mark Manulis, editors, Public Key Cryptography PKC 2012, volume 7293 of Lecture Notes in Computer Science, pages 206-224. Springer Berlin Heidelberg, 2012. ISBN 978-3-642-30056-1. doi: 10.1007/978-3-642-30057-8-13.
13
[14] Xinjun Du, Ying Wang, Jianhua Ge, and Yumin Wang. An id-based broadcast encryption scheme for key distribution. Broadcasting, IEEE Transactions on, 51(2):264-266, 2005.
14
[15] Wu Danfei and Zhang Weimin. Authenticated broadcast encryption with short ciphertexts and private keys. In Multimedia Technology (ICMT), 2011 International Conference on, pages 218-221. 2011. doi:10.1109/ICMT.2011.6001984.
15
[16] Dalit Naor, Moni Naor, and Jeff Lotspiech. Revocation and tracing schemes for stateless receivers. In Joe Kilian, editor, Advances in Cryptology CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 41-62. Springer Berlin Heidelberg, 2001. ISBN 978-3-540-42456-7. doi:10.1007/3-540-44647-8-3.
16
[17] Xiaoming Wang and Zhiwei Liao. A secure encryption protocol for ad hoc networks. In Information Science and Engineering (ISISE), 2010 International Symposium on, pages 578-581. 2010. doi: 10.1109/ISISE.2010.144.
17
[18] Wenliang Du and Mikhail J. Atallah. Secure multi-party computation problems and their applications: a review and open problems. In Proceedings of the 2001 workshop on New security paradigms, NSPW '01, pages 13-22. ACM, New York, NY, USA, 2001. ISBN 1-58113-457-6. doi:10.1145/508171.508174.
18
[19] Andrew C. Yao, Andrew C. Yao, Andrew C. Yao, and Andrew C. Yao. Protocols for secure computations. In Foundations of Computer Science, 1982. SFCS '08. 23rd Annual Symposium on, pages 160-164. 1982. doi:10.1109/SFCS.1982.38.
19
[20] N. Maheshwari and K. Kiyawat. Structural framing of protocol for secure multiparty cloud computation. In Modeling Symposium (AMS), 2011 Fifth Asia, pages 187-192.
20
[21] Ueli Maurer. Secure multi-party computation made simple. In Stelvio Cimato, Giuseppe Persiano, and Clemente Galdi, editors, Security in Communication Networks, volume 2576 of Lecture Notes in Computer Science, pages 14-28. Springer Berlin Heidelberg, 2003. ISBN 978-3-540-00420-2. doi:10.1007/3-540-36413-7-2.
21
[22] Ronald Cramer, Ivan Damgrd, Stefan Dziembowski, Martin Hirt, and Tal Rabin. Efficient multiparty computations secure against an adaptive adversary. In Jacques Stern, editor, Advances in Cryptology EUROCRYPT 99, volume 1592 of Lecture Notes in Computer Science, pages 311-326. Springer Berlin Heidelberg, 1999. ISBN 978-3-540-65889-4. doi: 10.1007/3-540-48910-X 22.
22
[23] R. Canetti. Universally composable security: a new paradigm for cryptographic protocols. In Foundations of Computer Science, 2001. Proceedings. 42nd IEEE Symposium on, pages 136-145. 2001. doi:10.1109/SFCS.2001.959888.
23
[24] B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Security and Privacy, 2001. S P 2001. Proceedings. 2001 IEEE Symposium on, pages 184-200. 2001. doi:10. 1109/SECPRI.2001.924298.
24
[25] Ran Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology: the journal of the International Association for Cryptologic Research, 13(1):143-202, 2000.
25
[26] Mikhail J. Atallah and Keith B. Frikken. Securely outsourcing linear algebra computations. In Proceedings of the 5th ACM Symposium on
26
Information, Computer and Communications Security, ASIACCS '10, pages 48-59. ACM, New York, NY, USA, 2010. ISBN 978-1-60558-936-7. doi:10.1145/1755688.1755695.
27
[27] Adi Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
28
[28] Ronald Cramer, Ivan Damgrd, and JesperB. Nielsen. Multiparty computation from threshold homomorphic encryption. In Birgit Pfitzmann, editor, Advances in Cryptology EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 280-300. Springer Berlin Heidelberg, 2001. ISBN 978-3-540-42070-5. doi:10.1007/3-540-44987-6-18.
29
[29] Moni Naor and Benny Pinkas. Efficient oblivious transfer protocols. In Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms, SODA '01, pages 448-457. Society for Industrial and Applied Mathematics, Philadelphia, PA, USA, 2001. ISBN 0-89871-490-7.
30
[30] Lin Keng-Pei and Chen Ming-Syan. On the design and analysis of the privacy-preserving svm classifier. Knowledge and Data Engineering, IEEE Transactions on, 23(11):1704-1717, 2011.
31
[31] Dung Luong The, Bao Ho Tu, Binh Nguyen The, and Hoang Tuan-Hao. Privacy preserving classification in two-dimension distributed data. In Knowledge and Systems Engineering (KSE), 2010 Second International Conference on, pages 96-103.
32
[32] Z. Yu and N. Zhang. Achieving privacy preserving computation on data grids. In Computers and Communications, 2007. ISCC 2007. 12th IEEE Symposium on, pages 763-768.
33
[33] Yang Piyi, Cao Zhenfu, Dong Xiaolei, and T. A. Zia. An efficient privacy preserving data aggregation scheme with constant communication overheads for wireless sensor networks. Communications Letters, IEEE, 15(11):1205-1207, 2011.
34
[34] D. K. Mishra and M. Chandwani. A zero-hacking protocol for secure multiparty computation using multiple ttp. In TENCON 2008 - 2008 IEEE Region 10 Conference, pages 1-6.
35
[35] Gavin Lowe. Breaking and fixing the Needham Schroeder Public-Key Protocol using FDR, volume 1055 of Lecture Notes in Computer Science, chapter 10, pages 147-166. Springer Berlin Heidelberg, 1996.
36
[36] Martín Abadi and Andrew D. Gordon. A calculus for cryptographic protocols: the spi calculus. In Proceedings of the 4th ACM conference on Computer and communications security, CCS '97, pages 36-47. ACM, New York, NY, USA, 1997. ISBN 0-89791-912-2. doi:10.1145/266420.266432.
37
[37] Martín Abadi and Bruno Blanchet. Computer Assisted Verification of a Protocol for Certified Email, volume 2694 of Lecture Notes in Computer Science, chapter 17, pages 316-335. Springer Berlin Heidelberg, 2003.
38
[38] B. Blanchet. An efficient cryptographic protocol verifier based on prolog rules. In Computer Security Foundations Workshop, 2001. Proceedings. 14th IEEE, pages 82-96. 2001. doi:10.1109/CSFW.2001.930138.
39
[39] Steve Kremer and Mark Ryan. Analysis of an electronic voting protocol in the applied pi calculus. In Mooly Sagiv, editor, Programming Languages and Systems, volume 3444 of Lecture Notes in Computer Science, pages 186-200. Springer Berlin Heidelberg, 2005. ISBN 978-3-540-25435-5. doi:10.1007/978-3-540-31987-0-14.
40
[40] Atsushi Fujioka, Tatsuaki Okamoto, and Kazuo Ohta. A practical secret voting scheme for large scale elections. In Jennifer Seberry and Yu-liang Zheng, editors, Advances in Cryptology - AUSCRYPT '92, volume 718 of Lecture Notes in Computer Science, pages 244-251. Springer Berlin Heidelberg, 1993. ISBN 978-3-540-57220-6. doi:10.1007/3-540-57220-1-66.
41
[41] Stphanie Delaune, Steve Kremer, and Mark Ryan. Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster, volume 6000 of Lecture Notes in Computer Science, chapter 18, pages 289-309. Springer Berlin Heidelberg, 2010.
42
[42] R. Kusters and T. Truderung. An epistemic-approach to coercion resistance for electronic voting protocols. In Security and Privacy, 2009 30th IEEE Symposium on, pages 251-266. 2009. doi:10.1109/SP.2009.13.
43
[43] Steve Kremer, Mark Ryan, and Ben Smyth. Election verifiability in electronic voting protocols. In Dimitris Gritzalis, Bart Preneel, and Marianthi Theoharidou, editors, Computer Security ESORICS 2010, volume 6345 of Lecture Notes in Computer Science, pages 389-404. Springer
44
Berlin Heidelberg, 2010. ISBN 978-3-642-15496-6. doi:10.1007/978-3-642-15497-3-24.
45
[44] Ben Adida. Helios: web-based open-audit voting. pages 335-348. USENIX Association, 2008.
46
[45] M.R. Clarkson, S. Chong, and A.C. Myers. Civitas: Toward a secure voting system. In Security and Privacy, 2008. SP 2008. IEEE Symposium on, pages 354-368. 2008. doi:10.1109/SP.2008.32.
47
[46] Ben Smyth, Mark Ryan, Steve Kremer, and Mounira Kourjieh. Towards automatic analysis of election verifiability properties. In Alessandro Armando and Gavin Lowe, editors, Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, volume 6186 of Lecture Notes in Computer Science, pages 146-163. Springer Berlin Heidelberg, 2011. ISBN 978-3-642-16073-8. doi:10.1007/978-3-642-16074-5-11.
48
[47] Liqun Chen and Mark Ryan. Attack, solution and verification for shared authorisation data in tcg tpm. In Pierpaolo Degano and JoshuaD.
49
Guttman, editors, Formal Aspects in Security and Trust, volume 5983 of Lecture Notes in Computer Science, pages 201-216. Springer Berlin
50
Heidelberg, 2010. ISBN 978-3-642-12458-7. doi:10.1007/978-3-642-12459-4-15.
51
[48] M. Backes, M. Maffei, and D. Unruh. Zero-knowledge in the applied pi calculus and automated verification of the direct anonymous attestation protocol. In Security and Privacy, 2008. SP 2008. IEEE Symposium on, pages 202-215. 2008. doi:10.1109/SP.2008.23.
52
[49] Bruno Blanchet and Avik Chaudhuri. Automated formal analysis of a protocol for secure file sharing on untrusted storage. In Proceedings of the 29th IEEE Symposium on Security and Privacy (S&P'08), pages 417-431. IEEE, 2008.
53
[50] Martín Abadi, Bruno Blanchet, and Cedric Four-net. Just fast keying in the pi calculus. ACM Trans. Inf. Syst. Secur., 10(3):9, 2007.
54
[51] Chetan Bansal, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, and Sergio Maffeis. Keys to the cloud: formal analysis and concrete attacks on encrypted web storage. In Proceedings of the Second international conference on Principles of Security and Trust, POST'13, pages 126-146. Springer-Verlag, Berlin, Heidelberg, 2013. ISBN 978-3-642-36829-5. doi:10.1007/978-3-642-36830-1-7.
55
[52] Jannik Dreier, Pascal Lafourcade, and Yassine Lakhnech. Formal Verification of e-Auction Protocols, volume 7796 of Lecture Notes in Computer Science, chapter 13, pages 247-266. Springer Berlin Heidelberg, 2013.
56
[53] Myrto Arapinis, Vronique Cortier, Steve Kremer, and Mark Ryan. Practical Everlasting Privacy, volume 7796 of Lecture Notes in Computer Science, chapter 2, pages 21-40. Springer Berlin Heidelberg, 2013.
57
[54] Denise Demirel, Jeroen Van De Graaf, and Roberto Arajo. Improving helios with everlasting privacy towards the public. In Proceedings of the 2012 international conference on Electronic Voting Technology/Workshop on Trustworthy Elections, EVT/WOTE'12, pages 8-8. USENIX Association, Berkeley, CA, USA, 2012.
58
[55] Tal Moran and Moni Naor. Receipt-Free Universally-Verifiable Voting with Everlasting Privacy, volume 4117 of Lecture Notes in Computer Science, chapter 22, pages 373-392. Springer Berlin Heidelberg, 2006.
59
[56] Martín Abadi and Cedric Fournet. Mobile values, new names, and secure communication. SIGPLAN Not., 36(3):104-115, 2001.
60
[57] Robin Milner. Communicating and mobile systems: the pi-calculus.
61
Cambridge University Press, 1999.
62
[58] Danny Dolev and Andrew C. Yao. On the security of public key protocols. Technical report, Stanford University, 1981.
63
[59] M. S. Mohammadi and A. G. Bafghi. A dynamic, zero-message broadcast encryption scheme based on secure multiparty computation. In Information Security and Cryptology (ISCISC), 2012 9th International ISC Conference on, pages 12-17.
64
[60] V. I. Nechaev. Complexity of a determinate algorithm for the discrete logarithm. Mathematical Notes, 55(2):165-172, 1994.
65
[61] Hung-Yu Lin and Lein Harn. Fair reconstruction of a secret. Inf. Process. Lett., 55(1):45-47, 1995.
66
[62] Dan Boneh, Craig Gentry, and Brent Waters. Collusion resistant broadcast encryption with short ciphertexts and private keys. In Victor Shoup, editor, Advances in Cryptology CRYPTO 2005, volume 3621 of Lecture Notes in Computer Science, pages 258-275. Springer Berlin Heidelberg, 2005. ISBN 978-3-540-28114-6.
67
[63] Adrian Perrig. Efficient collaborative key management protocols for secure autonomous group communication. In International Workshop on Cryptographic Techniques and E-Commerce CrypTEC '99, pages 192-202.
68
ORIGINAL_ARTICLE
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
>Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is generated by a trusted Private Key Generator (PKG). However, it is unrealistic to assume that a single PKG will be responsible for issuing private keys to members of different organizations or a large-scale nation. Hence, it is needed to consider multiple PKG environments with different system parameters. In this paper, we propose an identity-based key agreement protocol among users of different networks with independent PKGs, which makes use of elliptic curves. We prove the security of the proposed protocol in the random oracle model and show that all security attributes are satisfied. We also demonstrate a comparison between our protocol and some related protocols in terms of the communication costs and the execution time. The results show that the execution time of our protocol is less than 10%, and its communication costs are about 50% of the competitor protocols.
http://www.isecure-journal.com/article_39136_720abc23e66b24a1564536558e5d8afb.pdf
2013-01-01T11:23:20
2017-09-22T11:23:20
55
70
10.22042/isecure.2013.5.1.4
Identity-Based Cryptography
Key Agreement Protocol
Elliptic Curve Cryptography
Random Oracle Model
M.
Sabzinejad Farash
sabzinejad@tmu.ac.ir
true
1
sabzinejad@tmu.ac.ir
sabzinejad@tmu.ac.ir
sabzinejad@tmu.ac.ir
LEAD_AUTHOR
M.
Ahmadian Attari
mahmoud@eetd.kntu.ac.ir
true
2
AUTHOR
[1] ISO/IEC 9594-8 :( the 4th edn.), "Information technology-Open Systems Interconnection-The Directory: Public-key and attribute certificate frameworks," International Organization for Standardization, Geneva, Switzerland, 2001.
1
[2] A. Shamir, "Identity-based cryptosystems and signature schemes," Proc. of CRYPTO 1984, LNCS, vol. 196, 1984, pp. 47-53.
2
[3] R.L. Rivest, A. Shamir, L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, vol. 21, no. 2, 1978, pp. 120126.
3
[4] D. Boneh, M. Franklin, "Identity-based encryption from the weil pairing," Proc. Of CRYPTO2001, LNCS, vol. 2139, 2001, pp. 213-229.
4
[5] N. Smart, "An Identity-based Authenticated Key Agreement Protocol Based on Weil Pairing," Electronic Letters, vol. 38, 2002, pp. 630-632.
5
[6] N.Y. Lee, C.N.Wu, C.C.Wang, "Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings," Computers & Electrical Engineering, vol. 34, no. 1, 2008, pp. 12-20.
6
[7] D.L. Vo, H. Lee, C.Y. Yeun, K. Kim, "Enhancements of authenticated multiple key exchange protocol based on bilinear pairings," Computers & Electrical Engineering, vol. 36, no. 1, 2009, pp. 155-159.
7
[8] M.S. Farash, M. Bayat, M.A. Attari, "Vulnerability of two multiple-key agreement protocols," Computers & Electrical Engineering, vol. 37, no. 2, 2011, pp. 199-204.
8
[9] M.S. Farash, M. Gardeshi, M. Bayat, "Security Enhancement of a multiple-key exchange protocol based on bilinear pairings," 6th International ISC Conference on Information Security and Cryptology (ISCISC2009), 2009, pp. 175-182.
9
[10] Q. Cheng, C. Ma, "Analysis and improvement of an authenticated multiple key exchange protocol," Computers & Electrical Engineering, vol. 37, no. 2, 2011, pp. 187-190.
10
[11] L. Ni, G. Chen, J. Li, Y. Hao, "Strongly secure identity-based authenticated key agreement protocols," Computers & Electrical Engineering, vol. 37, no. 2, 2011, pp. 205-217.
11
[12] M. Holbl, T. Welzer, B. Brumen, "An improved two-party identity-based authenticated key agreement protocol using pairings," Journal
12
of Computer and System Sciences, vol. 78, no. 1, 2012, pp. 142-150.
13
[13] D. He, "An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings," Ad Hoc Networks, vol. 10, no. 6, 2012, pp. 1009-1016.
14
[14] Z. Zhang, L. Zhu, L. Liao, and M.Wang, "Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings," Information Sciences, vol. 209, 2012, pp. 93-112.
15
[15] Y. Chuang, Y. Tseng, "Towards generalized ID-based user authentication for mobile multi-server environment," International Journal of Communication Systems, vol. 25, no. 4, 2012, pp. 447-460.
16
[16] K. Shim, "A round-optimal three-party ID-based authenticated key agreement protocol, "Information Sciences, vol. 186, 2012, pp. 239-248.
17
[17] K. Shim, "Cryptanalysis of Two Identity-Based Authenticated Key Agreement Protocols," IEEE Communications Letters, vol. 16, no. 4, 2012, pp. 554-556.
18
[18] L. Ni, G. Chen, and J. Li, "Escrowable identity-based authenticated key agreement protocol with strong security," Computers and Mathematics with Applications, 2012,
19
doi:10.1016/j.camwa.2012.01.041.
20
[19] M.S. Farash, M.A. Attari, "A new improved and efficient authenticated multiple-key agreement protocol based on bilinear pairings," Computers & Electrical Engineering, 2012, http://dx.doi.
21
org/10.1016/j.compeleceng.2012.09.004.
22
[20] L. Chen, Z. Cheng, N.P. Smart, "Identity-based key agreement protocols from pairings," International Journal of Information Security, vol. 6, no. 4, 2007, pp. 213-241.
23
[21] P. Barreto, H. Kim, B. Lynn, M. Scott, "Efficient algorithms for pairing-based cryptosystems," Proc. CRYPTO 2002, LNCS, vol. 2442, 2002, pp. 354-368, Springer.
24
[22] P. Barreto, B. Lynn, M. Scott, "On the selection of pairing-friendly groups," Selected Areas in Cryptography (SAC 2003), LNCS, vol. 3006, 2003, pp. 17-25.
25
[23] D. He, J. Chen, J. Hu, "An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Information Fusion, vol. 13, no. 3, 2012, pp. 223-230.
26
[24] W. Han and Z. Zhu, "An ID-based mutual authentication with key agreement protocol for multi-server environment on elliptic curve cryptosystem," International Journal of Communication Systems, 2012, DOI: 10.1002/dac.2405.
27
[25] S. H. Islam, G. P. Biswas, "A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem," The Journal of Systems and Software, vol. 84, no. 11, 2011, pp. 1892-1898.
28
[26] R.W. Zhu, G. Yang, D.S. Wong, "An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices, Theor. Comput. Sci. vol. 9, no. 378, 2007, pp. 198-207.
29
[27] X. Cao, W. Kou, Y. Yu, R. Sun, "Identity-based authentication key agreement protocols without bilinear pairings," IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, vol. E91-A, no. 12, 2008, pp. 3833-3836.
30
[28] X. Cao, W. Kou, Y. Yu, R. Sun, "Identity-based authentication key agreement protocols with-out bilinear pairings," Information Sciences, vol. 180, 2010, pp. 2895-2903.
31
[29] S.K. Hafizul Islam, G.P. Biswas, "An improved pairing-free identity-based authenticated key agreement protocol based on ECC," International Conference on Communication Technology and System Design 2011, Procedia Engineering, vol. 30, 2012, pp. 499-507.
32
[30] H. Lee, D. Kim, S. Kim, H. Oh, "Identity-based Key Agreement Protocols in a Multiple PKG Environment," Proc. of the Int. Conf. on Computational Science and Its Applications, ICCSA 2005. LNCS, vol. 3483, 2005, pp. 877-886.
33
[31] S. Kim, H. Lee, H. Oh, "Enhanced ID-Based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment," Proc. Of ICICS 2005, LNCS, vol. 3783, 2005, pp. 323-335.
34
[32] M.S. Farash, M.A. Attari, "An ID-Based Key Agreement Protocol Based on ECC Among Users of Separate Networks," 9th International ISC Conference on Information Security and Cryptology (ISCISC2012), September 2012, Tabriz, Iran.
35
[33] I.F. Blake, G. Seroussi and N.P. Smart, "Advances Elliptic Curves in Cryptography," London Mathematical Society Lecture Note Series. 317, United States of America by Cambridge University Press, New York, 2005.
36
[34] A. Joux and K. Nguyen, "Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups," Journal of Cryptology, no. 16, 2003, pp. 239248.
37
[35] S. Blake-Wilson, A. Menezes, Authenticated Diffie-Hellman key agreement protocols, in: Proc. SAC98, LNCS vol. 1556, 1999, pp. 339- 361.
38
[36] C. Boyd, A. Mathuria, Protocols for Authentication and Key Establishment. Springer-Verlag, June 2003.
39
[37] C. Kudla, "Special signature schemes and key agreement protocols," Ph.D. Thesis, Royal Holloway University of London, 2006.
40
[38] M. Bellare and Ph. Rogaway, "Entity Authentication and Key Distribution," In Advances in Cryptology-CRYPTO93, LNCS, vol. 773, 1993, pp. 232-249.
41
[39] M. Bellare and Ph. Rogaway, "Provably secure session key distribution: the three party case," In Proc. of the 27th Annual ACM Symposium on Theory of Computing-STOC'95, 1995, pp. 57-66.
42
[40] S. Blake-Wilson, D. Johnson, A. Menezes, "Key agreement protocols and their security analysis," Proc. of the 6th IMA International Conference on Cryptography and Coding, 1997, pp. 30-45.
43
[41] L. Chen, C. Kudla, "Identity based authenticated key agreement from pairings," In IEEE Computer Security Foundations Workshop, 2003, pp. 219-233.
44
[42] K. Choo, C. Boyd, Y. Hitchcock, "On session key construction in provably-secure key establishment protocols: revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-based protocols," In Mycrypt'05, LNCS, vol. 3715, 2005, pp. 116-131.
45
[43] Z. Cheng, M. Nistazakis, R. Comley, L. Vasiu, "On the indistinguishability-based security model of key agreement protocols-simple cases," Cryptology ePrint Archive, Report 2005/129.
46
[44] C. Kudla, K. Paterson,"Modular security proofs for key agreement protocols," In Advances in Cryptology-Asiacrypt'05, LNCS, vol. 378, 2005, pp. 549-565.
47
[45] Y. Wang, "Efficient identity-based and authenticated key agreement protocol," Cryptology ePrint Archive, Report 2005/108.
48
[46] Shamus Software Ltd., Miracl library. http://www.shamus.ie/index.php?page=home.
49
ORIGINAL_ARTICLE
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers
>To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The dynamic analysis or run-time behavior provides a better technique to identify the threat. In this paper, a dynamic approach is proposed in order to extract features from binaries. The run-time behavior of the binary files were found and recorded using a homemade tool that provides a controlled environment. The approach based on DyVSoR assumes that the run-time behavior of each binary can be represented by the values of registers. A method to compute the similarity between two binaries based on the value sets of the registers is presented. Hence, the values are traced before and after invoked API calls in each binary and mapped to some vectors. To detect an unknown file, it is enough to compare it with dataset binaries by computing the distance between registers, content of this file and all binaries. This method could detect malicious samples with 96.1% accuracy and 4% false positive rate. The list of execution traces and the dataset are reachable at: http://home.shirazu.ac.ir/˷ sami/malware
http://www.isecure-journal.com/article_39137_2ec12eb8dddec2ad8da9da145ee933b7.pdf
2013-01-01T11:23:20
2017-09-22T11:23:20
71
82
10.22042/isecure.2013.5.1.5
Malware Detection
API Call
Dynamic Analysis
CPU Register Values
x86 Registers Values
M.
Ghiasi
mhbbgh@gmail.com
true
1
AUTHOR
A.
Sami
asami@ieee.org
true
2
LEAD_AUTHOR
Z.
Salehi
zsalehi@cse.shirazu.ac.ir
true
3
AUTHOR
[1] M. Christodorescu, S. Jha, S. A. Seshia, D. Song, and R. E. Bryant, "Semantics-Aware Malware Detection," IEEE Symposium on Security and Privacy (S&P05), Washington. DC. USA, pp. 32-46, 2005.
1
[2] Symantec Corp, "Symantec Global Internet Security Threat Report," Vol. 7, 2008.
2
[3] PandaLabs, "Pandalabs annual malware report 2009," 2010.
3
[4] K. Kim, and B. R. Moon, "Malware detection based on dependency graph using hybrid genetic algorithm," Proceedings of the 12th Annual Conf. on Genetic and Evolutionary Computation, ACM. USA. , pp. 1211-1218, July 2010.
4
[5] McAfee Labs, "McAfee Threats Report: Fourth Quarter 2010," McAfee Inc., Santa Clara. California, 2010.
5
[6] X. Hu, "Large-Scale Malware Analysis, Detection, and Signature Generation," A dissertation for the degree of Doctor of Philosophy, University of Michigan, Ann Arbor. Michigan. United States, 2011.
6
[7] P. Wood, M. Nisbet, G. Egan, N. Johnston, K. Haley, B. Krishnappa, T. K. Tran, I. Asrar, O. Cox, S. Hittel, et al., "Symantec Internet Security Threat Report Trends for 2011," Vol. 17, Symantec Corporation, 2012.
7
[8] PandaLabs, "Pandalabs annual malware report 2011," 2012.
8
[9] Panda Security, "PandaLabs Annual Report 2012," 2013.
9
[10] Sophos, "Security threat report 2013 New Platforms and Changing Threats," Sophos Ltd., Boston, USA, 2013.
10
[11] Macafee Labs, "McAfee Threats Report: Fourth Quarter 2012," McAfee Inc, 2013.
11
[12] Symantec Corporation, "Internet Security Threat Report 2013," Vol. 18, 2013.
12
[13] Sophos, "Security threat report 2011," Sophos Ltd., Boston, USA, January 2011.
13
[14] Symantec Corporation, "The Shamoon Attacks," [On-line]. Available electronically at http://www.symantec.com/connect/blogs/shamoon-attacks. 2012.
14
[15] Norton by Symantec, "2012 Norton Cybercrime Report," 2012.
15
[16] A. E. Ammar, A. M. Mohd, and H. Ahmed, "Malware Detection Based on Hybrid Signature Behaviors Application Programming Interface Call Graph," American J of Applied Sciences, United States, vol. 3, pp. 283-288, 2012.
16
[17] L. Bohne, "Pandoras Bochs: Automatic Unpacking of Malware," Diploma Thesis, University of Mannheim, January 2008.
17
[18] M. Egele, T. Scholte, E. Kirda, and C. Kruegel, "A survey on automated dynamic malware analysis techniques and tools," ACM Computing Surveys (CSUR) J., Vol. 44, ACM. New York. USA, pp. 1-49, February 2012.
18
[19] S. M. Abdulalla, L. M. Kiah, and O. Zakariam, "A biological Model to Improve PE Malware Detection: Review," Int. J. of Physical Sciences, vol. 5, pp. 2236-2247, 2010.
19
[20] K. M. Goertzel, "Tools on Anti Malware," Technical Information Center, 2009.
20
[21] Li. Shengying, "A survey on tools for binary code analysis," Stony Brook University, August 2004.
21
[22] M. Bailey, J. Oberheide, J. Andersen, Z. Mao, F. Jahanian, and J. Nazario, "Automated Classification and Analysis of Internet Malware," In Proceedings of Symposium on Recent Advances in Intrusion Detection (RAID07), pp. 178-197, 2007.
22
[23] M. Yahyazadeh, and M. Abadi, "BotOnus: An Online Unsupervised Method for Botnet Detection," The ISC Int. J. of Information Security (ISeCure), vol. 4, pp. 51-62, January 2012.
23
[24] P. Li, L. Liu, D. Gao, and M. K. Reiter, "On challenges in evaluating malware clustering," In Proceedings of the 13th Int. Conf. on Recent advances in intrusion detection (RAID10), Berlin. Heidelberg, pp. 238-255, 2010.
24
[25] Z. Salehi, M. Ghiasi, and A. Sami, "Malware Detection Preserving API Function Calls and Their Standard Function Calling Notation," In
25
Proceeding of 16th CSI Symposium on Artificial Intelligence and Signal Processing (AISP 2012), Shiraz, Iran, 2012.
26
[26] H. Zhao, M. Xu, N. Zheng, J. Yao, and Q. Ho, "Malicious executable classification based on behavioral factor analysis," In Proceeding Int. Conf. on e-Education, e-Business, e-Management and e-Learning (IC4E 2010), Sanya. China, pp. 502- 506, 2010.
27
[27] F. Ahmed, H. Hameed, M. Z. Shafiq, and M. Farooq, "Using spatiotemporal information in api calls with machine learning algorithms for malware detection," In Proceeding Second ACM workshop on Security and artificial intelligence (AISec 09), New York, USA, pp. 55-62, 2009.
28
[28] R. Tian, R. Islam, and L. Batten, "Differentiating Malware from Cleanware Using Behavioral Analysis," In Proceeding Fifth Int. Conf. on Malicious and Unwanted Soft-ware (MALWARE 2010), Nancy, France, pp. 23-30, 2010.
29
[29] F. Leder, B. Steinbock, and P. Martini, "Classification and detection of metamorphic malware using value set analysis," In Proceeding Fourth Int. Conf. on Malicious and Unwanted Software (MALWARE 2009), pp. 39-46, 2009.
30
[30] V. S. Sathyanarayan, P. Kohli, and B. Bruhadeshwar, "Signature Generation and Detection of Malware Families," In Information Security and Privacy 13th Australasian Conf. (ACISP 2008),Wollongong, Australia, pp. 336-349, July 2008.
31
[31] R. Moskovitch, D. Stopel, C. Feher, N. Nissim, and Y. Elovici, "Unknown Malcode Detection via Text Categorization and the Imbalance Problem," Intelligence and Security Informatics (ISI 2008), Taipei. Taiwan, pp. 156-181, 2008.
32
[32] I. Santos, F. Brezo, J. Nieves, Y. K. Penya, B. Sanz, C. Laorden, and P. G. Bringas, "Idea: Opcode-sequence-based malware detection," In Engineering Secure Software and Systems Second Int. Symposium (ESSoS 2010), Pisa. Italy, pp. 35-43, February 2010.
33
[33] R. Tian, L. M. Batten, and S. C. Versteeg, "Function Length as a Tool for Malware Classification," In Proceedings of the 3rd Int. Conf. on Malicious and Unwanted Software (Malware 2008), pp. 69-76, 2008.
34
[34] R. Tian, L. Batten, R. Islam, and S. Versteeg, "an Automated Classification System based on the Strings of Trojan and Virus Families," In Proceedings of the 4th Int. Conf. on Malicious and Unwanted Software (MALWARE 2009), Quebec. Canada, pp. 23-30, October 2009.
35
[35] Y. Ye, T. Li, Q. Jiang, and Y. Wang, "CIMDS: Adapting Post processing Techniques of Associative Classification for Malware Detection," IEEE Trans. Systems, Man, and Cybernetics, Part C: Applications and Reviews, Vol. 40, pp. 298-307, May 2010.
36
[36] A. Sami, B. Yadegari, H. Rahimi, N. Peiravian, S. Hashemi, and A. Hamze, "Malware detection based on mining API calls," In Proceedings of ACM Symposium on Applied Computing (SAC 10), Switzerland, pp. 1020-1025, March 2010.
37
[37] G. Tahan, L. Rokach, and Y. Shahar, "Mal-ID: Automatic Malware Detection Using Common Segment Analysis and Meta-Features," The J. of Machine Learning Research, Vol. 13, pp. 949-979, 2012.
38
[38] M. K. Shankarapani, S. Ramamoorthy, R. S. Movva, and S. Mukkamala, "Malware detection using assembly and API call sequences," J. in Computer Virology, Vol. 7, pp. 107-119, 2010.
39
[39] P. M. Comparetti, G. Salvaneschi, E. Kirda, C. Kolbitsch, C. Kruegel, and S. Zanero, "Identifying Dormant Functionality in Malware Programs," IEEE Symposium on Security and Privacy (S&P 2010), Berleley/Oakland. California. USA, pp. 61-76, May 2010.
40
[40] M. Christodorescu, S. Jha, and C. Kruegel, "Mining specifications of malicious behavior," Foundations of Software Engineering, pp. 1-10, 2007.
41
[41] L. Bai, J. Pang, Y. Zhang, W. Fu, and J. Zhu, "Detecting malicious behavior using critical API calling graph matching," Proceedings of the 1st Int. Conf. on Information Science and Engineering, Nanjing, pp. 1716-1719, 2009.
42
[42] H. Guo, J. Pang, Y. Zhang, F. Yue, and R. Zhao, "HERO: A novel malware detection framework based on binary translation," Proceedings of the IEEE Int. Conf. on Intelligent Computing and Intelligent Systems, Xiamen, pp. 411-415, 2010.
43
[43] Y. Park, D. Reeves, V. Mulukutla, and B. Sundaravel, "Fast malware classification by automated behavioral graph matching," Proceedings of the 6th Annual Workshop on Cyber Security and Information Intelligence Research, USA, 2010.
44
[44] F. Karbalaee, A. Sami, and M. Ahmadi, "Semantic Malware Detection by Deploying Graph Mining," Int. J. of Computer Science Issues (IJCSI 2012), Vol. 9, pp. 373-379, 2012.
45
[45] O. Kostakis, J. Kinable, H. Mahmoudi, and K. Mustonen, "Improved call graph comparison using simulated annealing," Proceedings of the 2011 ACM Symposium on Applied Computing, USA, pp. 1516-1523, 2011.
46
[46] Y. Park, and D. Reeves, "Deriving common malware behavior through graph clustering", Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, USA, pp. 497-502, 2011.
47
[47] M. Ahmadi, A. Sami, H. Rahimi, and B. Yadegari, "Iterative System Call Patterns Blow the Malware Cover," IT Security for The Next Generation, Asia Pacific & MEA Cup 2011, Malaysia, March 2011.
48
[48] G. Wagener, R. State, and A. Dulaunoy, "Malware behavior analysis," J. in Computer Virology, Vol. 4, pp. 279-287, 2008.
49
[49] U. Bayer, P. M. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda, "Scalable, Behavior Based Malware Clustering," Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS'09), San Diego, February 2009.
50
[50] U. Bayer, E. Kirda, and C. Kruegel, "Improving the Efficiency of Dynamic Malware Analysis," In Proceedings of the 2010 ACM Symposium on Applied Computing (SAC '10), NY, USA, pp. 1871-1878, 2010.
51
[51] J. Jang, D. Brumley, and S. Venkataraman, "Bit- Shred: Feature Hashing Malware for Scalable Triage and Semantic Analysis," Proceedings of the 18th ACM conf. on Computer and Communications Security, ACM, pp. 309-320, 2011.
52
[52] J. Hegedus, Y. Miche, A. Ilin, and A. Lendasse, "Methodology for Behavioral-based Malware Analysis and Detection Using Random Projections and K-Nearest Neighbors Classifiers," In Proceedings of the Seventh Int. Conf. on Computational Intelligence and Security, Sanya, Hainan, China, pp. 1016-1023, 2011.
53
[53] J. Potier, "WinAPIOverride32," 2013. [Online]. Available electronically at http://jacquelin.potier.free.fr/winapioverride32/.
54
[54] M. Fredrikson, S. Jha, M. Christodorescu, "Synthesizing Near-Optimal Malware Specification from Suspicious Behaviors," Proceeding 31st IEEE Symposium on Security and Privacy (S&P 2010), pp. 45-60, 2010.
55
[55] R. Kohavi, "A study of cross-validation and boot-strap for accuracy estimation and model selection," In Proceedings of the Fourteenth Int. Joint Conf. on Artificial Intelligence, pp. 1137-1143, 1995.
56
[56] L. Breiman, "Random Forests," Kluwer Academic Publishers. Manufactured in The Netherlands. 2001.
57
[57] T. Langerud, "PowerScan: A Framework for Dynamic Analysis and Anti-Virus Based Identification of Malware," Master thesis, Norwegian University of Science and Technology Department of Telematics, Nor-way, 2008.
58
[58] C. G. Weng, and J. Poon. "A New Evaluation Measure for Imbalanced Datasets," In Seventh Australasian Data Mining Conf. (AusDM 2008), pp. 27-32, 2008.
59
[59] A. Fog, "Function calling conventions," In Calling conventions for different C++ compilers and operating systems, Copenhagen, Denmark, 2012.
60
[60] J. Potier, "Where is located the return value?," [On-line]. Available electronically at http://jacquelin.potier.free.fr/winapioverride32/doc/faq.ht m#returnvalue, 2011.
61
[61] Intel Corporation, "Intel Itanium Processor specific Application Binary Interface (ABI) Intel," 2001.
62
ORIGINAL_ARTICLE
Robust multiplicative video watermarking using statistical modeling
>The present paper is intended to present a robust multiplicative video watermarking scheme. In this regard, the video signal is segmented into 3-D blocks like cubes, and then, the 3-D wavelet transform is applied to each block. The low frequency components of the wavelet coefficients are then used for data embedding to make the process robust against both malicious and unintentional attacks. The hidden message is inserted through multiplying/dividing these coefficients by a constant parameter which controls the power of the watermark. The watermark extraction relies on a maximum likelihood-based procedure, observing the distribution of the watermarked coefficients. The performance of the proposed scheme has been verified via simulations and found to be superior to some of the well-known existing video watermarking methods.
http://www.isecure-journal.com/article_39138_dc5d300e700aa3d1ae93d99a61c1e51e.pdf
2013-01-01T11:23:20
2017-09-22T11:23:20
83
95
10.22042/isecure.2013.5.1.6
Multiplicative Video Watermarking
Maximum Likelihood Decoding
3D Wavelet Transform
A.
Diyanat
a.diyanat@ut.ac.ir
true
1
LEAD_AUTHOR
M. A.
Akhaee
akhaee@ut.ac.ir
true
2
AUTHOR
Sh.
Ghaemmaghami
ghaemmagh@sharif.edu
true
3
AUTHOR
[1] G. Döerr, “A Guide Tour of Video Watermarking,” Signal Processing: Image Communication, vol. 18, pp. 263-282, Apr. 2003.
1
[2] Y. Chen and H. Huang, “A New Shot-Based Video Watermarking,” in Computer Communication Control and Automation (3CA), International Symposium on, vol. 2, pp. 53-58, 2010.
2
[3] M. Belhaj, M. Mitrea, F. Preteux, and S. Duta, “MPEG-4 AVC robust video watermarking based on QIM and perceptual masking,” in Communications (COMM), 8th International Conference on, pp. 477-480,2010.
3
[4] D. Xu, R. Wang, and J. Wang, “Low complexity video watermarking algorithm by exploiting CAVLC in H. 264/AVC,” in Wireless Communications, Networking and Information Security (WCNIS), IEEE International Conference on, pp. 411-415, 2010.
4
[5] L. Zhang, Y. Zhu, and L. L.-M. Po, “A novel watermarking scheme with compensation in bit stream domain for H.264/AVC,” IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1758-1761, Mar. 2010.
5
[6] G. Langelaar, R. Lagendijk, and J. Biemond, “Real-Time Labeling of MPEG-2 Compressed Video,” Journal of Visual Communication and Image Representation, vol. 9, no. 4, pp. 256-270, 1998.
6
[7] S. K. Bavipati and X. Su, “Secure Compressed Domain Watermarking for H.264 Video,” Seventh International Conference on Information Technology: New Generations, pp. 387-391, Apr. 2010.
7
[8] S. N. Biswas, S. Nahar, S. R. Das, E. M. Petriu, M. H. Assaf, and V. Groza, “MPEG-2 digital video watermarking technique,” in IEEE International Instrumentation and Measurement Technology Conference Proceedings, pp. 225-229, IEEE, May 2012.
8
[9] R. Lancini, F. Mapelli, and S. Tubaro, “A Robust Video Watermarking Technique In the Spatial Domain,” in Video/Image Processing and Multimedia Communications 4th EURASIP-IEEE Region 8 International Symposium on VIProm-Com, no. June, pp. 251-256, 2002
9
[10] P. Chan and M. Lyu, “A DWT-based digital video watermarking scheme with error correcting code,” in Proceedings of Fifth International Conference on Information and Communications Security, pp. 202-213, Springer, 2003.
10
[11] F. Deguillaume, G. Csurka, J. O’Ruanaidh, and T. Pun, “Robust 3D DFT Video Watermarking,” in Proceedings of IS & T/SPIE Electronic Imaging, vol. 3657, pp. 113-124, 1999.
11
[12] J. Zhang, J. Li, and L. Zhang, “Video watermark technique in motion vector,” in Computer Graphics and Image Processing, Proceedings of XIV Brazilian Symposium on, pp. 179-182, 2001.
12
[13] C. Kung, J. Jeng, Y. Lee, H. Hsiao, and W. Cheng, “Video watermarking using motion vector,” in Proc. of 16th IPPR Conference on computer vision, graphics and image processing, no. Cvgip, pp. 547-551, 2003.
13
[14] B. Barakli and C. Vural, “A new reversible video watermarking method-based on motion compensated interpolation,” in 20th Signal Processing and Communications Applications Conference (SIU), pp. 1-4, IEEE, Apr. 2012.
14
[15] B. Mobasseri, “Direct Sequence Watermarking of Digital Video Using M-Frames,” in Proceedings International Conference on Image Processing (ICIP-98), vol. 2, pp. 399-403, 1998.
15
[16] A. M. Kothari and V. V. Dwivedi, “Transform Domain Video Watermarking: Design, Implementation and Performance Analysis,” in International Conference on Communication Systems and Network Technologies, pp. 133-137, IEEE, May 2012.
16
[17] S. a. M. Al-Taweel and P. Sumari, “Robust Video Watermarking Based On 3D-DWT Domain,” in TENCON , IEEE Region 10 Conference, pp. 1-6, Nov. 2010.
17
[18] P. Campisi, “Video watermarking in the 3DDWT domain using perceptual masking,” in IEEE International Conference on Image Processing(ICIP), pp. 997-1000, 2005.
18
[19] R. Reyes, C. Cruz, M. Nakano-Miyatake, and H. Perez-Meana, “Digital Video Watermarking in DWT Domain Using Chaotic Mixtures,” Latin America Transactions, IEEE (Revista IEEE America Latina), vol. 8, no. 3, pp. 304-310, 2010.
19
[20] R. O. Preda, “Robust wavelet-based video watermarking scheme for copyright protection using the human visual system,” Journal of Electronic Imaging, vol. 20, p. 013022, Jan. 2011.
20
[21] M. Swanson and A. Tewfik, “Multi resolution Scene-Based Video Watermarking Using Perceptual Models,” IEEE Journal on Selected Areasin Communications, vol. 16, pp. 540-550, May 2002.
21
[22] J. Sun, N. Yang, J. Liu, X. Yang, X. Li, and L. Zhang, “Video watermarking scheme based on spatial relationship of DCT coefficients,” in Intelligent Control and Automation (WCICA), 8th World Congress on, pp. 56-59, 2010.
22
[23] E. E. Abdallah, A. Ben Hamza, and P. Bhattacharya, “Video watermarking using wavelet transform and tensor algebra,” Signal, Image and Video Processing, vol. 4, pp. 233-245, Apr. 2009.
23
[24] X. Guo-juan and W. Rang-ding, “A Blind Video Watermarking Algorithm Resisting to Rotation Attack,” International Conference on Computer and Communications Security, pp. 111-114, Dec. 2009.
24
[25] C.-X. Wang, X. Nie, X. Wan, W. B. Wan, and F. Chao, “A Blind Video Watermarking Scheme Based on DWT,” Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, vol. 1, pp. 434-437, Sept. 2009.
25
[26] R. C. Motwani, M. C. Motwani, B. D. Bryant, F. C. Harris Jr., and A. S. Agarwal, “Watermark Embedded Optimization for 3D Mesh Objects Using Classification Based Approach,” International Conference on Signal Acquisition and Processing, pp. 125-129, Feb. 2010.
26
[27] D. Pu, Y. Lu, and J. Dai, “Video watermarking approach based on temporal difference and discrete wavelet transform,” in Computer Science and Information Technology (ICCSIT), 3rd IEEE International Conference on, vol. 1, pp. 346-350, 2010.
27
[28] M. A. Akhaee, S. M. E. Sahraeian, B. Sankur, and F. Marvasti, “Robust Scaling-Based Image Watermarking Using Maximum- Likelihood Decoder With Optimum Strength Factor,” IEEE Transactions on Multimedia, vol. 11, pp. 822-833, Aug. 2009.
28
[29] I. I. Cox, J. Kilian, F. F. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking For Multimedia,” Image Processing, IEEE Transactions on, vol. 6, no. 12, pp. 1673-1687, 2002.
29
[30] M. Barni, F. Bartolini, A. D. Rosa, and A. Piva, “A new decoder for the optimum recovery of non-additive watermarks,” IEEE transactions on image processing, vol. 10, pp. 755-66, Jan. 2001.
30
[31] J. Wang, G. Liu, Y. Dai, J. Sun, Z. Wang, and S. Lian, “Locally optimum detection for Barni’s multiplicative watermarking in DWT domain,” Signal Processing, vol. 88, pp. 117-130, Jan. 2008.
31
[32] S. Vassilios and P. Ioannis, “Optimal Detector for Multiplicative Watermarks Embedded in the DFT Domain of Non-White Signals,” EURASIP Journal on Advances in Signal Processing, vol. 1900, no. 16, pp. 2522-2532, 2004.
32
[33] T. Ng and H. Garg, “Maximum Likelihood Detection in Image Watermarking Using Generalized Gamma Model,” in Conference Record of the Thirty-Ninth Asilomar Conference on Signals, Systems and Computers, no. 2, pp. 1680-1684, 2006.
33
[34] M. Akhaee, N. KhademiKalantari, and F. Marvasti, “Robust Audio and Speech Watermarking Using Gaussian and Laplacian Modeling,” Signal Processing, vol. 90, pp. 2487-2497, Aug. 2010.
34
[35] M. A. Akhaee, M. E. Sahraeian, and F. Marvasti, “Contourlet-based image watermarking using optimum detector in a noisy environment.,” IEEE transactions on image processing : (a publication of the IEEE Signal Processing Society), vol. 19, pp. 967-80, Apr. 2010.
35
[36] R. Narayanan, S. Ponnappan, and SE, “Effects of uncorrelated and correlated noise on image information content,” REMOTE SENSING, no. C, pp. 7031-7033, 2001.
36
[37] A. B. Watson, G. Y. Yang, J. a. Solomon, and J. Villasenor, “Visibility of Wavelet Quantization Noise,” Image Processing, IEEE Transactions on, vol. 6, pp. 1164-75, Aug. 2002.
37
[38] E. Lam, “Statistical modeling of the wavelet coefficients with different bases and decomposition levels,” in Vision, Image and Signal Processing, IEE Proceedings-, vol. 151, pp. 203-206, 2004.
38
[39] K. Mihcak, I. Kozintsev, K. Ramchandran, and P. Moulin, “Low Complexity Image Denoising Based On Statistical Modeling of Wavelet Coefficients,” Signal Processing Letters, IEEE, vol. 6, no. 12, pp. 300-303, 1999.
39
[40] A. Petrosian and F. Meyer, Wavelets in Signal and Image Analysis: From Theory to Practice. Computational Imaging and Vision, Springer,
40
[41] [Available], “http://www.irisa.fr/vista/actions/hollywood2.”
41
[42] S. Tai and S. Yang, “A fast method for image noise estimation using laplacian operator and adaptive edge detection,” in Communications, Control and Signal Processing, ISCCSP, 3rd International Symposium on, no. March, pp. 1077-1081, Mar. 2008.
42
[43] C. Liu, W. Freeman, R. Szeliski, and S. Kang, “Noise estimation from a single image,” in Computer Vision and Pattern Recognition, IEEE Computer Society Conference on, vol. 1, pp. 901-908, 2006.
43
[44] D. Donoho and J. Johnstone, “Ideal Spatial Adaptation By Wavelet Shrinkage,” Biometrika, vol. 81, no. 3, p. 425, 1994.
44
[45] R. K. Pearson, Exploring data in engineering, the sciences, and medicine. Oxford; New York: Oxford University Press, 2011.
45
[46] X. Gong and H. Lu, “Towards fast and robust watermarking scheme for H. 264 video,” in 10th IEEE International Symposium on Multimedia, pp. 649-653, Dec. 2008.
46
[47] L. Zhang, Y. Zhu, and L.-M. Po, “A novel watermarking scheme with compensation in bit-stream domain for H.264/AVC,” in IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 1758-1761, IEEE, 2010.
47
[48] X. Gong and H.-M. Lu, “Towards Fast and Robust Watermarking Scheme for H.264 Video,” in Tenth IEEE International Symposium on Multimedia, pp. 649-653, IEEE, Dec. 2008.
48
[49] F. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Processing, vol. 66, pp. 283-301, May 1998.
49
[50] D. Xu, R. Wang, and J. Wang, “Video watermarking based on spatiotemporal JND profile,” Digital Watermarking, vol. 5450, pp. 327- 341,2009.
50
[51] M. Bahoura and H. Ezzaidi, “Real-time implementation of discrete wavelet transform on FPGA,” in IEEE 10th INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, pp. 191 194, IEEE, Oct. 2010.
51
[52] R. Jiang and D. Crookes, “FPGA implementation of 3D discrete wavelet transform for real-time medical imaging,” in Circuit Theory and
52
Design, ECCTD. 18th European Conference on, pp. 519-522, 2007.
53
ORIGINAL_ARTICLE
Image encryption based on chaotic tent map in time and frequency domains
>The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase of the plain image. This change in the frequency domain causes changes in the pixels value and shuffles the pixels location in the time domain. Finally, in the time domain, a pseudo random image is produced using a chaotic tent map, to be combined to the image generated through the first step, and thus the final encrypted image is created. A computer simulation is also utilized to evaluate the proposed algorithm and to compare its results to images encrypted by other methods. The criteria for these comparisons are chi-square test of histogram, correlation coefficients of pixels, NPCR (number of pixel change rate), UACI (unified average changing intensity), MSE (mean square error) and MAE (mean absolute error), key space, and sensitivity to initial condition. These comparisons reveal that the proposed chaotic image encryption method shows a higher performance, and is of more secure.
http://www.isecure-journal.com/article_39139_c5f1135db3f803d6cce0fb031b26b92c.pdf
2013-01-01T11:23:20
2017-09-22T11:23:20
97
110
10.22042/isecure.2013.5.1.7
Image Encryption
Chaotic Tent Map
Key Image
Frequency Domain
Time Domain
E.
Hassani
e.hasani@srbiau.ac.ir
true
1
LEAD_AUTHOR
M.
Eshghi
m-eshghi@sbu.ac.ir
true
2
AUTHOR
[1] E. Hasani, M. Eshghi, “Chaotic Image Encryption In Time and Frequency Domain”, 7th Iranian Machine Vision & Image Processing, IEEE conference, 2011.
1
[2] H. S. Kwok and W. K. S. Tang, “A Fast Image Encryption System Based on Chaotic Maps with Finite Precision Representation”, J. of Chaos, Solitons & Fractals, vol. 32, pp. 1518-1529, 2007.
2
[3] Y. Wang, K. W. Wong, X. Liao and G. Chen, “A New Chaos-based Fast Image Encryption Algorithm”, J. of Applied Soft Computing, Vol. 11, Issue 1, pp. 514-522, 2011.
3
[4] S. Sam, P. Devaraj and R. S. Bhuvaneswaran, “A Novel Image Cipher based on Mixed Transformed Logistic Maps”, J. of Multimedia Tools and Applications, Vol. 56, pp. 315-330, 2012.
4
[5] Kwok Sin Hung, “A Study On Efficient Chaotic Image Encryption Schemes”, Department of Electronic Engineering, CITY UNIVERSITY OF HUNG KONG, 2007.
5
[6] Sh. lian, “MultiMedia Content encryption”, Taylor & Francis Group, 2009.
6
[7] S. M. Seyedzadeh and S. Mirzakuchaki, “A Fast Color Image Encryption Algorithm based on Coupled Two-Dimensional Piecewise Chaotic Map”, J. of Signal Processing, Vol. 92, pp.1202- 1215, 2012.
7
[8] Y. Mao, G. Chen, and S. Lian, “A novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps”, International Journal of Bifurcation and Chaos, vol.14, no.10, pp. 3613-3624, 2004.
8
[9] Q. Zhou, K-wo. Wong, X. Liao, T. Xiang and Y. Hu, “Parallel image encryption algorithm based on discretized chaotic map”, Chaos, Solitons & Fractals, vol. 38, pp. 1081-1092, 2008.
9
[10] X. Zhang, C. Wei-bin “A New Chaotic Algorithm for Image Encryption”, ICLIP2008, IEEE conference, 2008.
10
[11] S.E. Borujeni and M. Eshghi, “Chaotic Image Encryption Design Using Tompkins-Paige Algorithm”, J. of Mathematical Problems in Engineering, 2009.
11
[12] H. Khanzadi, M. Eshghi, “Image Encryption Using Random Bit Sequence Based on Chaotic Maps”, submitted to International Journal of Bifurcation and Chaos, 2012.
12
[13] Sh. Liu, J.Sun, Zhe. Xu, J. Liu, “Analysis on an Image Encryption Algorithm”, IEEE Computer society, 2008 International Workshop on Education Technology and Training & 2008 International Workshop on Geoscience and Remote Sensing.
13
[14] Ch.Wei-bin, X. Zhang, “Image Encryption Algorithm Based on Henon Chaotic System”, IEEE, 2009.
14
[15] K. T. Alligood, T. D. Sauer, J. A. Yorke, “CHAOS: An Introduction to Dynamical Systems”, Corrected third printing 2000, Springer-Verlag, New York, 1996.
15
[16] STEVEN H. STROGATZ, “Nonlinear Dinamics AND Chaos”, Perseus Books Publishing, 1994.
16
[17] H. G. Schuster and Wolfram Just, “Deterministic Chaos”, Fourth, Revised and Enlarged Edition, WILEY-VCH Verlag GmbH & Co, 2005.
17
[18] Y. Heng-fu, W. Yan-peng and T. Zu-wei, “An Image Encryption Algorithm Based on Logistic Chaotic Maps and Arnold Transform”, J. of Hengshui University, pp. 40-43, 2008.
18
[19] H. Khanzadi, M. A. Omam, F. Lotfifar and M. Eshghi “Image Encryption Based on Gyrator Transform Using Chaotic Maps”, Signal Processing (ICSP) conference, China, 2010.
19
[20] Gonzalez and Wood, “Digital Image Processing”, 3rd edition, Prentice Hall, 2008.
20
[21] Y. Wang, K. W. Wong, X. Liao and G. Chen, “A New Chaos-based Fast Image Encryption Algorithm”, J. of Applied Soft Computing, Vol. 11, Issue 1, pp. 514-522, 2011.
21
[22] G. Zhang and Q. Liu, “A Novel Image Encryption Method based on Total Shuffling Scheme”, J. of Optics Communications, Vol. 284, pp. 2775-2780, 2011.
22
[23] X. Zhang and W. Chen, “A New Chaotic Algorithm for Image Encryption”, ICALIP, pp. 889-892, 2008.
23
[24] H. Gao, Y. Zhang, S. Liang and D. Li, “A new chaotic algorithm for image encryption”, J. of Chaos, Solitons & Fractals, vol. 29, pp. 393-399, 2006.
24
[25] Y. Wang, K. W. W, X. L and G. C, “A new chaos-based fast image encryption algorithm”, J. of Applied Soft Computing, vol. 11, pp. 514-522, 2009.
25
ORIGINAL_ARTICLE
Persian Abstract
>
http://www.isecure-journal.com/article_45223_be2605bb6b969d833bd157b02bffdd80.pdf
2013-01-25T11:23:20
2017-09-22T11:23:20
111
116
10.22042/isecure.2013.5.1.8