Exploiting sensitivity of nonorthogonal joint diagonalisation as a security mechanism in steganography

Basava R. Matam, David Lowe

Research output: Chapter in Book/Report/Conference proceedingConference publication

Abstract

We have recently proposed the framework of independent blind source separation as an advantageous approach to steganography. Amongst the several characteristics noted was a sensitivity to message reconstruction due to small perturbations in the sources. This characteristic is not common in most other approaches to steganography. In this paper we discuss how this sensitivity relates the joint diagonalisation inside the independent component approach, and reliance on exact knowledge of secret information, and how it can be used as an additional and inherent security mechanism against malicious attack to discovery of the hidden messages. The paper therefore provides an enhanced mechanism that can be used for e-document forensic analysis and can be applied to different dimensionality digital data media. In this paper we use a low dimensional example of biomedical time series as might occur in the electronic patient health record, where protection of the private patient information is paramount.
Original languageEnglish
Title of host publicationDSP 2009: 16th International Conference on Digital Signal Processing, Proceedings
Place of PublicationPiscataway (US)
PublisherIEEE
Pages532-538
Number of pages7
ISBN (Electronic)978-1-4244-3297-4
ISBN (Print)978-1-4244-3298-1
DOIs
Publication statusPublished - 5 Jul 2009
Event16th International Conference on Digital Signal Processing - Santorini, Greece
Duration: 5 Jul 20097 Jul 2009

Conference

Conference16th International Conference on Digital Signal Processing
Abbreviated titleDSP 2009
CountryGreece
CitySantorini
Period5/07/097/07/09

Bibliographical note

© 2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

Keywords

  • ICA
  • joint diagonalisation
  • nonorthogonal
  • sensitivity
  • watermarking

Fingerprint Dive into the research topics of 'Exploiting sensitivity of nonorthogonal joint diagonalisation as a security mechanism in steganography'. Together they form a unique fingerprint.

  • Research Output

    • 2 Conference publication

    EEG/ECG information fusion for epileptic event detection

    Bermudez, T., Lowe, D. & Arlaud-Lamborelle, A. M., 20 Nov 2009, DSP 2009: 16th International Conference on Digital Signal Processing, Proceedings. Piscataway (US): IEEE, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference publication

  • Watermarking: how secure is the DM-QIM embedding technique?

    Matam, B. R. & Lowe, D., 20 Nov 2009, DSP 2009: 16th International Conference on Digital Signal Processing, Proceedings. Piscataway (US): IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference publication

  • Cite this

    Matam, B. R., & Lowe, D. (2009). Exploiting sensitivity of nonorthogonal joint diagonalisation as a security mechanism in steganography. In DSP 2009: 16th International Conference on Digital Signal Processing, Proceedings (pp. 532-538). IEEE. https://doi.org/10.1109/ICDSP.2009.5201074