2 \subsection{Classification of Attacks}\label{sec:attack-classes}
4 In the steganography framework, attacks have been classified
5 in~\cite{Cayre2008} as follows.
9 Watermark-Only Attack (WOA) occurs when an attacker has only access to several watermarked contents.
13 Known-Message Attack (KMA) occurs when an attacker has access to several pairs of watermarked contents and
14 corresponding hidden messages.
18 Known-Original Attack (KOA) is when an attacker has access to several pairs of watermarked contents and
19 their corresponding original versions.
23 Constant-Message Attack (CMA) occurs when the attacker observes several watermarked contents and only knows that the
24 unknown hidden message is the same in all contents.
27 The synthesis of this classification is illustrated in the
28 Table~\ref{table:attack-classification}~\vpageref{table:attack-classification}.
34 \begin{tabular}{|c||c|c|c|}
36 \textbf{Attack} & \textbf{Original content} & \textbf{Stego
37 content} & \textbf{Hidden message}\\
40 \textbf{Watermark-Only Attack (WOA)} & & $\times$ & \\
42 \textbf{Known-Message Attack (KMA)} & & $\times$ & $\times$ \\
44 \textbf{ Kown-Original Attack (KOA)} & $\times$ & $\times$ & \\
46 \textbf{Constant-Message Attack (CMA)} & & & $\times$ \\
49 \caption{Watermarking attacks classification in context of~\cite{Kalker2001}}
51 \label{table:attack-classification}
55 \subsection{Stego-Security of $CI_1$}\label{sec:stego-security}
57 In the prisoner problem of Simmons~\cite{Simmons83,DBLP:conf/ih/BergmairK06}
59 Figure~\ref{fig:simmons-prisonner-problem}~\vpageref{fig:simmons-prisonner-problem}, Alice and Bob are in jail, and they want to, possibly, devise an escape plan by exchanging hidden messages in innocent-looking cover contents. These messages are to be conveyed to one another by a common warden, Eve, who over-drops all contents and can choose to interrupt the communication if they appear to be stego-contents.
63 %\includegraphics[width=10.5cm]{./img/prisoner-problem.png}
64 \includegraphics[width=15cm]{./img/prisoner-problem}
66 \caption{Simmons' prisoner problem~\cite{Simmons83}}
67 \label{fig:simmons-prisonner-problem}
70 The stego-security, defined in this
71 framework, is the highest security level in WOA setup~\cite{Cayre2008}.
72 To recall it, we need the following notations:
74 \item $\mathds{K}$ is the set of embedding keys,
75 \item $p(X)$ is the probabilistic model of $N_0$ initial host contents,
76 \item $p(Y|K_1)$ is the probabilistic model of $N_0$ watermarked contents.
79 Furthermore, it is supposed in this context that each host content has been watermarked with the same secret key $K_1$ and the same embedding function $e$.
82 It is now possible to define the notion of stego-security:
84 \begin{definition}[Stego-Security]
85 \label{Def:Stego-security}
86 The embedding function $e$ is \emph{stego-secure} if and only if:
87 $$\forall K_1 \in \mathds{K}, p(Y|K_1)=p(X).$$
90 To the best of our knowledge, until now, only two schemes have been proven to be stego-secure.
91 On the one hand, the authors of \cite{Cayre2008} have established that the spread spectrum technique called Natural Watermarking is stego-secure when its distortion parameter $\eta$ is equal to $1$.
92 On the other hand, it has been proven in~\cite{gfb10:ip} that:
95 Chaotic Iterations with Independent Strategy (CIIS) are stego-secure.
96 \label{prop:CIIS-stego-security}
102 Let us suppose that $X \sim
103 \mathbf{U}\left(\mathbb{B}^N\right)$ in a CIIS setup.
104 We will prove by a mathematical induction that $\forall n \in \mathds{N}, X^n \sim
105 \mathbf{U}\left(\mathbb{B}^N\right)$. The base case is immediate, as $X^0 = X \sim
106 \mathbf{U}\left(\mathbb{B}^N\right)$. Let us now suppose that the statement
108 \mathbf{U}\left(\mathbb{B}^N\right)$ holds for some $n$.
109 Let $e \in \mathbb{B}^N$ and $\mathbf{B}_k=(0,\cdots,0,1,0,\cdots,0) \in \mathbb{B}^N$ (the digit $1$ is in position $k$).
111 So $P\left(X^{n+1}=e\right)=\sum_{k=1}^N
112 P\left(X^n=e+\mathbf{B}_k,S^n=k\right).$
114 These two events are independent in CIIS setup, thus:
116 $P\left(X^{n+1}=e\right)=\sum_{k=1}^N
117 P\left(X^n=e+\mathbf{B}_k\right) \times P\left(S^n=k\right)$.
119 %According to the recurrence hypothesis ($X^n \sim
120 %\mathbf{U}\left(\mathbb{B}^N\right)$):
121 According to the inductive hypothesis:
124 %P\left(X^{n+1}=e\right) & =\sum_{k=1}^N
125 %\frac{1}{2^N} \times P\left(S^n=k\right) \\
126 %& =\frac{1}{2^N} \sum_{k=1}^N
127 % P\left(S^n=k\right)\\
131 $P\left(X^{n+1}=e\right)=\frac{1}{2^N} \sum_{k=1}^N
132 P\left(S^n=k\right)$.
134 The set of events $\left \{ S^n=k \right \}$ for $k \in \llbracket 1;N
135 \rrbracket$ is a partition of the universe of possible, so
136 $\sum_{k=1}^N P\left(S^n=k\right)=1$.
138 %Evaluate now $ P\left(S^n=k\right)$.
140 %We have: $K^0 = M \otimes K \sim
141 %\mathbf{U}\left([0;1]\right)$, so $K^\prime=F\left( K^0,p \right) \sim
142 %\mathbf{U}\left([0;1]\right)$, because for PLCMs, ``Uniform input generate
143 %uniform output''~\cite{Lasota}.
144 %Well with an immediate proof by recurrence we have:
145 %$K^n \sim \mathbf{U}\left([0;1]\right)$. As $S^n = \left \lfloor N \times X^n
146 %\right \rfloor + 1$ we can deduce that: $S^n \sim
147 %\mathbf{U}\left([1;N]\right)$. Therefore: $ P\left(S^n=k\right)=\frac{1}{N}$.
151 %P\left(X^{n+1}=e\right) & =\frac{1}{2^N} \sum_{k=1}^N
152 % P\left(S^n=k\right) & \\
153 % & =\frac{1}{2^N} \sum_{k=1}^N \frac{1}{N} & \\
154 % & =\frac{1}{2^N} & \\
159 %P\left(X^{n+1}=e\right) & =\frac{1}{2^N} \sum_{k=1}^N
160 % P\left(S^n=k\right) & \\
161 %P\left(X^{n+1}=e\right) & =\frac{1}{2^N} \sum_{k=1}^N \frac{1}{N} &
164 $P\left(X^{n+1}=e\right)=\frac{1}{2^N}$, which leads to $X^{n+1} \sim
165 \mathbf{U}\left(\mathbb{B}^N\right)$.
166 This result is true $\forall n \in \mathds{N}$, we thus have proven that, $$\forall K \in [0;1], Y_K=X^{N_0} \sim
167 \mathbf{U}\left(\mathbb{B}^N\right) \text{ when } X \sim
168 \mathbf{U}\left(\mathbb{B}^N\right)$$
172 Section~\ref{sec:data-hiding-algo-chaotic iterations} are stego-secure.
175 We will now prove that,
179 Chaotic Iterations with Dependent Strategy (CIDS) are not stego-secure.
183 Due to the definition of CIDS, we have $P(Y_K=(1,1,\cdots,1))=0$. So there is
184 no uniform repartition for the stego-contents $Y_K$.
193 \subsection{Chaos-Security of the $CI_1$ scheme}\label{sec:chaos-security}
195 To check whether an information hiding scheme $S$ is chaos-secure or not, $S$
196 must be written as an iterate process $x^{n+1}=f(x^n)$ on a metric space
197 $(\mathcal{X},d)$. This formulation is always possible~\cite{ih10}. So,
200 \begin{definition}[Chaos-Security]
201 \label{Def:chaos-security-definition}
202 An information hiding scheme $S$ is said to be chaos-secure on
203 $(\mathcal{X},d)$ if its iterative process has a chaotic
204 behavior according to Devaney.
207 In the approach presented by Guyeux \emph{et al.}, a data hiding scheme is secure if it is unpredictable.
208 Its iterative process must satisfy the Devaney's chaos property and its level of chaos-security increases with the number of chaotic properties satisfied by it.
210 This new concept of security for data hiding schemes has been proposed in~\cite{ih10} as a complementary approach to the existing framework.
211 It contributes to the reinforcement of confidence into existing secure data hiding schemes.
212 Additionally, the study of security in KMA, KOA, and CMA setups is realizable in this context.
213 Finally, this framework can replace stego-security in situations that are not encompassed by it.
214 In particular, this framework is more relevant to give evaluation of data hiding schemes claimed as chaotic.
219 We can establish that,
223 CIIS and CIDS are chaos-secure.
227 It is due to the fact that chaotic iterations have a chaotic behavior, as defined by Devaney.
232 In the two following sections, we will study the qualitative and quantitative
233 properties of chaos-security for chaotic iterations. These properties can measure the
234 disorder generated by our scheme, giving by doing so some important informations about the
235 unpredictability level of such a process.
237 \subsection{Quantitative property of
238 chaotic iterations}\label{sec:chaos-security-quantitative}
240 \begin{definition}[Expansivity]
241 A function $f$ is said to be \emph{expansive} if $
242 \exists \varepsilon >0,\forall x\neq y,\exists n\in \mathds{N}%
243 ,d(f^{n}(x),f^{n}(y))\geqslant \varepsilon .$
247 $G_{f_{0}}$ is an expansive chaotic dynamical system on $\mathcal{X}$ with a constant of expansivity is equal to 1.
250 If $(S,E)\neq (\check{S};\check{E})$, then either $E\neq \check{E}$, so at least
251 one cell is not in the same state in $E$ and $\check{E}$. Consequently the distance between $(S,E)$ and $(%
252 \check{S};\check{E})$ is greater or equal to 1. Or $E=\check{E}$. So the
253 strategies $S$ and $\check{S}$ are not equal. Let $n_{0}$ be the first index in which the terms $S$ and $\check{S}$
256 k<n_{0},\tilde{G}_{f_{0}}^{k}(S,E)=\tilde{G}_{f_{0}}^{k}(\check{S},\check{E})$,
257 and $\tilde{G}_{f_{0}}^{n_{0}}(S,E)\neq \tilde{G}_{f_{0}}^{n_{0}}(\check{S},\check{E})$. As $E=\check{E},$ the cell which has changed in $E$ at the $n_{0}$-th
258 iterate is not the same as the cell which has changed in $\check{E}$, so
259 the distance between $\tilde{G}_{f_{0}}^{n_{0}}(S,E)$ and $\tilde{G}_{f_{0}}^{n_{0}}(\check{S%
260 },\check{E})$ is greater or equal to 2.
263 \subsection{Qualitative property of
264 chaotic iterations}\label{sec:chaos-security-qualitative}
266 \begin{definition}[Topological mixing]
267 A discrete dynamical system is said to be topologically mixing
268 if and only if, for any couple of disjoint open set $U, V \neq \varnothing$,
269 $n_0 \in \mathds{N}$ can be found so that $\forall n \geqslant n_0, f^n(U) \cap
273 $\tilde{G}_{f_0}$ is topologically mixing on $(\mathcal{X}', d')$.
276 This result is an immediate consequence of the lemma below.
279 For any open ball $B$ of $\mathcal{X}'$, an index $n$ can be found such that $\tilde{G}_{f_0}^n(B) = \mathcal{X}'$.
283 Let $B=B((E,S),\varepsilon)$ be an open ball, which the radius can be considered as strictly less than 1.
284 All the elements of $B$ have the same state $E$ and are such that an integer $k \left(=-\log_{10}(\varepsilon)\right)$ satisfies:
286 \item all the strategies of $B$ have the same $k$ first terms,
287 \item after the index $k$, all values are possible.
290 Then, after $k$ iterations, the new state of the system is $\tilde{G}_{f_0}^k(E,S)_1$ and all the strategies are possible (all the points $(\tilde{G}_{f_0}^k(E,S)_1,\textrm{\^{S}})$, with any $\textrm{\^{S}} \in \mathbb{S}$, are reachable from $B$).
292 We will prove that all points of $\mathcal{X}'$ are reachable from $B$. Let
293 $(E',S') \in \mathcal{X}'$ and $s_i$ be the list of the different cells between
294 $\tilde{G}_{f_0}^k(E,S)_1$ and $E'$. We denote by $|s|$ the size of the sequence
295 $s_i$. So the point $(\check{E},\check{S})$ of $B$ defined by: $\check{E} = E$,
296 $\check{S}^i = S^i, \forall i \leqslant k$, $\check{S}^{k+i} = s_i, \forall i
297 \leqslant |s|$, and $\forall i \in \mathds{N}, S^{k + |s| + i} = S'^i$
298 is such that $\tilde{G}_{f_0}^{k+|s|}(\check{E},\check{S}) = (E',S')$. This concludes the proofs of the lemma and of the proposition.
303 \subsection{Comparison between spread-spectrum and chaotic iterations}\label{sec:comparison-application-context}
305 The consequences of topological mixing for data hiding are multiple. Firstly,
306 security can be largely improved by considering
307 the number of iterations as a secret key. An attacker
308 will reach all of the possible media when iterating without this key.
309 Additionally, he cannot benefit from a KOA setup, by studying media in the
310 neighborhood of the original cover. Moreover, as in a topological mixing
311 situation, it is possible that any hidden message (the initial condition), is
312 sent to the same fixed watermarked content (with different numbers of
313 iterations), the interest to be in a KMA setup is drastically reduced. Lastly, as
314 all of the watermarked contents are possible for a given hidden message, depending
315 on the number of iterations, CMA attacks will fail.
319 The property of expansivity reinforces drastically the sensitivity in the aims of
320 reducing the benefits that Eve can obtain from an attack in KMA or KOA setup. For
321 example, it is impossible to have an estimation of the watermark by moving the
322 message (or the cover) as a cursor in situation of expansivity: this cursor will
323 be too much sensitive and the changes will be too important to be useful. On the
324 contrary, a very large constant of expansivity $\varepsilon$ is unsuitable: the
325 cover media will be strongly altered whereas the watermark would be undetectable.
328 % %Indeed, let us consider the same cover $E$ twice with two different watermarks
329 % $S,S'$. Thus $d(X,Y) < 1$, where $X=(E,S), Y=(E,S')$ and $d$ is for the distance
330 % previously defined. However, due to expansivity, $\exists n \in \mathds{N},
331 % d\left(G^n (X) ; G^n (Y) \right) \geqslant \varepsilon.$ Thus, $d_\infty
332 % \left(G^n (X)_1 ; G^n (Y)_1 \right) \geqslant \varepsilon - 1$, so either
333 % $d_\infty \left(X_1 ; G^n (X)_1 \right) \geqslant \dfrac{\varepsilon - 1}{2}$, or
334 % $d_\infty \left(Y_1 ; G^n (Y)_1 \right) \geqslant \dfrac{\varepsilon - 1}{2}$. If
335 % $\varepsilon$ is large, then at least one of the two watermarked media will be
336 % very different than its original cover.
338 Finally, spread-spectrum is relevant when
339 a discrete and secure data hiding technique is required in WOA setup. However,
340 this technique should not be used in KOA and KMA setup, due to its lack of
341 expansivity.% In the next section, we will present a new class of data hiding
342 schemes, which are expansive.