Upload
oistin
View
58
Download
5
Embed Size (px)
DESCRIPTION
Hiding Binary Images behind Noise with Authentication Capability: A New Approach to Covert Communication. Speaker: Meng -Jing Tsai Date: 2012.09.10 Authors: Chih-Hsuan Tzeng , Wen -Hsiang Tsai - PowerPoint PPT Presentation
Citation preview
Hiding Binary Images behind Noise with Authentication Capability:
A New Approachto Covert Communication
Speaker: Meng-Jing TsaiDate: 2012.09.10
Authors: Chih-Hsuan Tzeng, Wen-Hsiang TsaiSource: Proceedings of IEEE 37th Annual 2003 International Carnahan Conference on Security Technology, Oct. 2003, pp. 232-236
2
Outline
҉/ Introductions҉/ Proposed Method҉/ Experimental Result҉/ Conclusions
3
Introductions
• Covert communication• There were only a few studies in the past
about hiding information behind binary images.– difficult– limited data embedding
4
Proposed Method
0 1 1
1 1 0
1 0 0
secret image block
1 0 1 1
1 0 0 1
0 0 1 0
0 1 0 0
noise block
g1
seed K
g2
Ki
Hiding
K1, K2, K3, … , Ki
5
1 0 0 0
1 1 0 1
0 1 1 0
0 0 0 0
Proposed Method
0 1 1
1 1 0
1 0 0
secret image blocknoise block
g3
Ki
g4
Xi
1 0 1 1
1 0 0 1
0 0 1 0
0 1 0 0
1 1 0 1 1 1 0
Authentication bits
XOR
Hiding
1 0 0
secret
authentication
1
1
6
Proposed Method
0 1 1
1 1 0
1 0 0
secret image blockcover resulting
Hiding
1 1 0 0
1 1 0 1
1 1 1 0
0 0 0 0
71 1 0 1 1 1 0
1 1 0 0
1 1 0 1
1 1 1 0
0 0 0 0
Proposed MethodRecovering
g1
seed K K1, K2, K3, … , Ki
g3
Ki
secret
authentication
g4
Xi
Authentication bits
8
1 0 1 1
1 0 0 1
0 0 1 0
0 1 0 0
Proposed MethodRecovering
noise block
g2
Ki
cover resulting
1 1 0 0
1 1 0 1
1 1 1 0
0 0 0 0
0 1 1
1 1 0
1 0 0
secret image block
XOR
9
Experimental Result
Secret binary image1024*768 Cover noise image resulting
1152*864K=1234
10
Conclusions
• A larger data-embedding capacity can be provided by the cover noise image.
• The proposed method ensures full recoverability of hidden secret data from cover noise images.
Thank youfor your listening.