首页 > 最新文献

2012 IEEE International Workshop on Information Forensics and Security (WIFS)最新文献

英文 中文
Weighted stego-image steganalysis for naive content-adaptive embedding 朴素内容自适应嵌入的加权隐写-图像隐写分析
Pub Date : 2012-12-01 DOI: 10.1109/WIFS.2012.6412648
Pascal Schöttle, Stefan Korff, Rainer Böhme
Weighted stego-image (WS) steganalysis is the state of the art for estimating LSB replacement steganography in spatial domain images. However, the most powerful WS variants designed against random uniform embedding perform poorly against content-adaptive steganography. As a remedy, we propose a novel variant of WS which is specialized in detecting small payloads hidden exclusively in the least detectable spots of a cover, benchmark its performance against known methods, and experimentally investigate the influence of the choice of the adaptivity criterion, i. e., the function that identifies supposedly secure spots in a heterogeneous cover. We find that adaptivity criteria which are hard to recover from the stego image alone provide stronger security against our specialized WS method.
加权隐写图像(WS)隐写分析是估计空间域图像中LSB替换隐写的最新技术。然而,针对随机均匀嵌入设计的最强大的WS变体在对抗内容自适应隐写术时表现不佳。作为补救措施,我们提出了一种新的WS变体,专门用于检测隐藏在掩体中最难以检测的点的小型有效载荷,将其性能与已知方法进行基准测试,并实验研究选择自适应标准的影响,即识别异质掩体中所谓安全点的功能。我们发现难以单独从隐写图像中恢复的自适应准则比我们专门的WS方法提供了更强的安全性。
{"title":"Weighted stego-image steganalysis for naive content-adaptive embedding","authors":"Pascal Schöttle, Stefan Korff, Rainer Böhme","doi":"10.1109/WIFS.2012.6412648","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412648","url":null,"abstract":"Weighted stego-image (WS) steganalysis is the state of the art for estimating LSB replacement steganography in spatial domain images. However, the most powerful WS variants designed against random uniform embedding perform poorly against content-adaptive steganography. As a remedy, we propose a novel variant of WS which is specialized in detecting small payloads hidden exclusively in the least detectable spots of a cover, benchmark its performance against known methods, and experimentally investigate the influence of the choice of the adaptivity criterion, i. e., the function that identifies supposedly secure spots in a heterogeneous cover. We find that adaptivity criteria which are hard to recover from the stego image alone provide stronger security against our specialized WS method.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124907483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Dynamic traitor tracing for arbitrary alphabets: Divide and conquer 任意字母的动态叛逆者跟踪:分而治之
Pub Date : 2012-06-28 DOI: 10.1109/WIFS.2012.6412656
Thijs Laarhoven, Jan-Jaap Oosterwijk, J. Doumen
We give a generic divide-and-conquer approach for constructing collusion-resistant probabilistic dynamic traitor tracing schemes with larger alphabets from schemes with smaller alphabets. This construction offers a linear tradeoff between the alphabet size and the codelength. In particular, we show that applying our results to the binary dynamic Tardos scheme of Laarhoven et al. leads to schemes that are shorter by a factor equal to half the alphabet size. Asymptotically, these codelengths correspond, up to a constant factor, to the fingerprinting capacity for static probabilistic schemes. This gives a hierarchy of probabilistic dynamic traitor tracing schemes, and bridges the gap between the low bandwidth, high codelength scheme of Laarhoven et al. and the high bandwidth, low codelength scheme of Fiat and Tassa.
我们给出了一种通用的分而治之的方法,用于从具有较小字母的方案构造具有较大字母的抗合谋概率动态叛逆者跟踪方案。这种结构提供了字母大小和码长之间的线性权衡。特别是,我们表明,将我们的结果应用于Laarhoven等人的二进制动态Tardos方案会导致方案缩短等于字母表大小的一半。渐近地,这些码长对应于静态概率方案的指纹识别能力,直到一个常数因子。这给出了概率动态叛逆者跟踪方案的层次结构,并弥补了Laarhoven等人的低带宽、高码长方案与Fiat和Tassa的高带宽、低码长方案之间的差距。
{"title":"Dynamic traitor tracing for arbitrary alphabets: Divide and conquer","authors":"Thijs Laarhoven, Jan-Jaap Oosterwijk, J. Doumen","doi":"10.1109/WIFS.2012.6412656","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412656","url":null,"abstract":"We give a generic divide-and-conquer approach for constructing collusion-resistant probabilistic dynamic traitor tracing schemes with larger alphabets from schemes with smaller alphabets. This construction offers a linear tradeoff between the alphabet size and the codelength. In particular, we show that applying our results to the binary dynamic Tardos scheme of Laarhoven et al. leads to schemes that are shorter by a factor equal to half the alphabet size. Asymptotically, these codelengths correspond, up to a constant factor, to the fingerprinting capacity for static probabilistic schemes. This gives a hierarchy of probabilistic dynamic traitor tracing schemes, and bridges the gap between the low bandwidth, high codelength scheme of Laarhoven et al. and the high bandwidth, low codelength scheme of Fiat and Tassa.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123395899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability 对65nm Arbiter puf的机器学习攻击:准确的建模对可用性提出了严格的限制
Pub Date : 1900-01-01 DOI: 10.1109/WIFS.2012.6412622
Gabriel Hospodar, Roel Maes, I. Verbauwhede
Arbiter Physically Unclonable Functions (PUFs) have been proposed as efficient hardware security primitives for generating device-unique authentication responses and cryptographic keys. However, the assumed possibility of modeling their underlying challenge-response behavior causes uncertainty about their actual applicability. In this work, we apply well-known machine learning techniques on challenge-response pairs (CRPs) from 64-stage Arbiter PUFs realized in 65nm CMOS, in order to evaluate the effectiveness of such modeling attacks on a modern silicon implementation. We show that a 90%-accurate model can be built from a training set of merely 500 CRPs, and that 5000 CRPs are sufficient to perfectly model the PUFs. To study the implications of these attacks, there is need for a new methodology to assess the security of PUFs suffering from modeling. We propose such a methodology and apply it to our machine learning results, yielding strict bounds on the usability of Arbiter PUFs. We conclude that plain 64-stage Arbiter PUFs are not secure for challenge-response authentication, and the number of extractable secret key bits is limited to at most 600.
仲裁器物理不可克隆函数(puf)已被提出作为有效的硬件安全原语,用于生成设备唯一的身份验证响应和加密密钥。然而,对其潜在挑战-反应行为建模的假设可能性导致了其实际适用性的不确定性。在这项工作中,我们将著名的机器学习技术应用于65纳米CMOS实现的64级Arbiter puf的挑战响应对(CRPs),以评估这种建模攻击在现代硅实现上的有效性。我们证明,仅用500个crp的训练集就可以建立一个准确率为90%的模型,而5000个crp足以完美地模拟puf。为了研究这些攻击的影响,需要一种新的方法来评估受建模影响的puf的安全性。我们提出了这样一种方法,并将其应用于我们的机器学习结果,从而对Arbiter puf的可用性产生严格的限制。我们得出结论,普通的64阶段Arbiter puf对于挑战-响应身份验证是不安全的,并且可提取的密钥位数最多限制为600。
{"title":"Machine learning attacks on 65nm Arbiter PUFs: Accurate modeling poses strict bounds on usability","authors":"Gabriel Hospodar, Roel Maes, I. Verbauwhede","doi":"10.1109/WIFS.2012.6412622","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412622","url":null,"abstract":"Arbiter Physically Unclonable Functions (PUFs) have been proposed as efficient hardware security primitives for generating device-unique authentication responses and cryptographic keys. However, the assumed possibility of modeling their underlying challenge-response behavior causes uncertainty about their actual applicability. In this work, we apply well-known machine learning techniques on challenge-response pairs (CRPs) from 64-stage Arbiter PUFs realized in 65nm CMOS, in order to evaluate the effectiveness of such modeling attacks on a modern silicon implementation. We show that a 90%-accurate model can be built from a training set of merely 500 CRPs, and that 5000 CRPs are sufficient to perfectly model the PUFs. To study the implications of these attacks, there is need for a new methodology to assess the security of PUFs suffering from modeling. We propose such a methodology and apply it to our machine learning results, yielding strict bounds on the usability of Arbiter PUFs. We conclude that plain 64-stage Arbiter PUFs are not secure for challenge-response authentication, and the number of extractable secret key bits is limited to at most 600.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124445914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 150
A Least Squares approach to user profiling in pool mix-based anonymous communication systems 基于池混合的匿名通信系统中用户分析的最小二乘方法
Pub Date : 1900-01-01 DOI: 10.1109/WIFS.2012.6412635
F. Pérez-González, C. Troncoso
Deployed high-latency anonymous communication systems conceal communication patterns using pool mixes as building blocks. These mixes are known to be vulnerable to Disclosure Attacks that uncover persistent relationships between users. In this paper we study the performance of the Least Squares Disclosure Attack (LSDA), an approach to disclosure rooted in Maximum Likelihood parameter estimation that recovers user profiles with greater accuracy than previous work. We derive analytical expressions that characterize the profiling error of the LSDA with respect to the system parameters for a threshold binomial pool mix and validate them empirically. Moreover, we show that our approach is easily adaptable to attack diverse pool mixing strategies.
部署的高延迟匿名通信系统使用池混合作为构建块来隐藏通信模式。众所周知,这些组合很容易受到揭露用户之间持久关系的披露攻击。在本文中,我们研究了最小二乘披露攻击(LSDA)的性能,这是一种基于最大似然参数估计的披露方法,比以前的工作更准确地恢复用户配置文件。我们导出了描述LSDA相对于阈值二项池混合的系统参数的分析误差的解析表达式,并对它们进行了经验验证。此外,我们表明我们的方法很容易适应攻击不同的池混合策略。
{"title":"A Least Squares approach to user profiling in pool mix-based anonymous communication systems","authors":"F. Pérez-González, C. Troncoso","doi":"10.1109/WIFS.2012.6412635","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412635","url":null,"abstract":"Deployed high-latency anonymous communication systems conceal communication patterns using pool mixes as building blocks. These mixes are known to be vulnerable to Disclosure Attacks that uncover persistent relationships between users. In this paper we study the performance of the Least Squares Disclosure Attack (LSDA), an approach to disclosure rooted in Maximum Likelihood parameter estimation that recovers user profiles with greater accuracy than previous work. We derive analytical expressions that characterize the profiling error of the LSDA with respect to the system parameters for a threshold binomial pool mix and validate them empirically. Moreover, we show that our approach is easily adaptable to attack diverse pool mixing strategies.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130263362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improving the DGK comparison protocol 改进DGK比较协议
Pub Date : 1900-01-01 DOI: 10.1109/WIFS.2012.6412624
T. Veugen
When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison protocol is by Damgard, Geisler and Kroigaard. We present two ways of improving this comparison protocol. Firstly, we reduce the computational effort of one party by roughly 50%. Secondly, we show how to achieve perfect security towards the other party without additional costs, whereas the original version with encrypted inputs only achieved statistical security. An additional advantage is that larger inputs are allowed.
在处理加密域中的信号时,可以使用同态加密实现对加密数据的线性操作。然而,加密数据的比较需要各方之间的附加协议,并且相对昂贵。Damgard、Geisler和Kroigaard提出了一个著名且经常使用的比较协议。我们提出了两种改进该比较协议的方法。首先,我们将一方的计算工作量减少了大约50%。其次,我们展示了如何在不增加额外成本的情况下实现对另一方的完美安全,而原始版本的加密输入只实现了统计安全。另一个好处是允许更大的投入。
{"title":"Improving the DGK comparison protocol","authors":"T. Veugen","doi":"10.1109/WIFS.2012.6412624","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412624","url":null,"abstract":"When processing signals in the encrypted domain, homomorphic encryption can be used to enable linear operations on encrypted data. Comparison of encrypted data however requires an additional protocol between the parties and will be relatively expensive. A well-known and frequently used comparison protocol is by Damgard, Geisler and Kroigaard. We present two ways of improving this comparison protocol. Firstly, we reduce the computational effort of one party by roughly 50%. Secondly, we show how to achieve perfect security towards the other party without additional costs, whereas the original version with encrypted inputs only achieved statistical security. An additional advantage is that larger inputs are allowed.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116548005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
Destination assisted cooperative jamming for wireless physical layer security 无线物理层安全的目标辅助协同干扰
Pub Date : 1900-01-01 DOI: 10.1109/WIFS.2012.6412663
Yupeng Liu, A. Petropulu
A wireless network with one source, one destination, one eavesdropper and multiple decode-and-forward (DF) relays is considered. A two-slot cooperative relaying scheme is proposed that targets at maximizing the secrecy rate. In the first slot, the source transmits the information bearing signal, and at the same time, it cooperates with the destination in jamming the eavesdropper without creating interference at the relay. In the second slot, one optimally selected relay retransmits the decoded source signal, and at the same time, it cooperates with the source to jam the eavesdropper without creating interference at the destination. For the beamforming, no eavesdropper channel information is required. Optimal relay selection and also optimal power allocation among the first/second slot data signal and jamming noise are proposed. It is shown that the system secrecy rate of the proposed scheme scales with the total system power, P0 and the number of available relays, K, according to log2(1 + P0/8 log K) - 1.6252bps.
考虑一个具有一个源、一个目的、一个窃听器和多个DF中继的无线网络。提出了一种以保密率最大化为目标的双时隙协同中继方案。在第一个插槽中,源发送承载信息的信号,同时,它与目的配合,在不对中继产生干扰的情况下对窃听者进行干扰。在第二个时隙中,一个最优选择的中继对解码后的源信号进行重传,同时与源信号配合,在不对目标产生干扰的情况下对窃听者进行干扰。对于波束形成,不需要窃听信道信息。提出了中继的最优选择和第一/第二时隙数据信号和干扰噪声之间的最优功率分配。结果表明,该方案的系统保密率随系统总功率P0和可用中继数K的变化而变化,取值为log2(1 + P0/8 log K) - 1.6252bps。
{"title":"Destination assisted cooperative jamming for wireless physical layer security","authors":"Yupeng Liu, A. Petropulu","doi":"10.1109/WIFS.2012.6412663","DOIUrl":"https://doi.org/10.1109/WIFS.2012.6412663","url":null,"abstract":"A wireless network with one source, one destination, one eavesdropper and multiple decode-and-forward (DF) relays is considered. A two-slot cooperative relaying scheme is proposed that targets at maximizing the secrecy rate. In the first slot, the source transmits the information bearing signal, and at the same time, it cooperates with the destination in jamming the eavesdropper without creating interference at the relay. In the second slot, one optimally selected relay retransmits the decoded source signal, and at the same time, it cooperates with the source to jam the eavesdropper without creating interference at the destination. For the beamforming, no eavesdropper channel information is required. Optimal relay selection and also optimal power allocation among the first/second slot data signal and jamming noise are proposed. It is shown that the system secrecy rate of the proposed scheme scales with the total system power, P0 and the number of available relays, K, according to log2(1 + P0/8 log K) - 1.6252bps.","PeriodicalId":396789,"journal":{"name":"2012 IEEE International Workshop on Information Forensics and Security (WIFS)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121496974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 150
期刊
2012 IEEE International Workshop on Information Forensics and Security (WIFS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1