11
Hiding Binary Images behind Noise with Authentication Capability: A New Approach to Covert Communication Speaker: Meng-Jing Tsai Date: 2012.09.10 Authors: Chih-Hsuan Tzeng, Wen- Hsiang Tsai Source: Proceedings of IEEE 37th Annual 2003 International Carnahan Conference on Security

Speaker: Meng -Jing Tsai Date: 2012.09.10 Authors: Chih-Hsuan Tzeng , Wen -Hsiang Tsai

  • Upload
    oistin

  • View
    58

  • Download
    5

Embed Size (px)

DESCRIPTION

Hiding Binary Images behind Noise with Authentication Capability: A New Approach to Covert Communication. Speaker: Meng -Jing Tsai Date: 2012.09.10 Authors: Chih-Hsuan Tzeng , Wen -Hsiang Tsai - PowerPoint PPT Presentation

Citation preview

Page 1: Speaker:  Meng -Jing Tsai Date: 2012.09.10 Authors:  Chih-Hsuan Tzeng ,  Wen -Hsiang Tsai

Hiding Binary Images behind Noise with Authentication Capability:

A New Approachto Covert Communication

Speaker: Meng-Jing TsaiDate: 2012.09.10

Authors: Chih-Hsuan Tzeng, Wen-Hsiang TsaiSource: Proceedings of IEEE 37th Annual 2003 International Carnahan Conference on Security Technology, Oct. 2003, pp. 232-236

Page 2: Speaker:  Meng -Jing Tsai Date: 2012.09.10 Authors:  Chih-Hsuan Tzeng ,  Wen -Hsiang Tsai

2

Outline

҉/ Introductions҉/ Proposed Method҉/ Experimental Result҉/ Conclusions

Page 3: Speaker:  Meng -Jing Tsai Date: 2012.09.10 Authors:  Chih-Hsuan Tzeng ,  Wen -Hsiang Tsai

3

Introductions

• Covert communication• There were only a few studies in the past

about hiding information behind binary images.– difficult– limited data embedding

Page 4: Speaker:  Meng -Jing Tsai Date: 2012.09.10 Authors:  Chih-Hsuan Tzeng ,  Wen -Hsiang Tsai

4

Proposed Method

0 1 1

1 1 0

1 0 0

secret image block

1 0 1 1

1 0 0 1

0 0 1 0

0 1 0 0

noise block

g1

seed K

g2

Ki

Hiding

K1, K2, K3, … , Ki

Page 5: Speaker:  Meng -Jing Tsai Date: 2012.09.10 Authors:  Chih-Hsuan Tzeng ,  Wen -Hsiang Tsai

5

1 0 0 0

1 1 0 1

0 1 1 0

0 0 0 0

Proposed Method

0 1 1

1 1 0

1 0 0

secret image blocknoise block

g3

Ki

g4

Xi

1 0 1 1

1 0 0 1

0 0 1 0

0 1 0 0

1 1 0 1 1 1 0

Authentication bits

XOR

Hiding

1 0 0

secret

authentication

1

1

Page 6: Speaker:  Meng -Jing Tsai Date: 2012.09.10 Authors:  Chih-Hsuan Tzeng ,  Wen -Hsiang Tsai

6

Proposed Method

0 1 1

1 1 0

1 0 0

secret image blockcover resulting

Hiding

1 1 0 0

1 1 0 1

1 1 1 0

0 0 0 0

Page 7: Speaker:  Meng -Jing Tsai Date: 2012.09.10 Authors:  Chih-Hsuan Tzeng ,  Wen -Hsiang Tsai

71 1 0 1 1 1 0

1 1 0 0

1 1 0 1

1 1 1 0

0 0 0 0

Proposed MethodRecovering

g1

seed K K1, K2, K3, … , Ki

g3

Ki

secret

authentication

g4

Xi

Authentication bits

Page 8: Speaker:  Meng -Jing Tsai Date: 2012.09.10 Authors:  Chih-Hsuan Tzeng ,  Wen -Hsiang Tsai

8

1 0 1 1

1 0 0 1

0 0 1 0

0 1 0 0

Proposed MethodRecovering

noise block

g2

Ki

cover resulting

1 1 0 0

1 1 0 1

1 1 1 0

0 0 0 0

0 1 1

1 1 0

1 0 0

secret image block

XOR

Page 9: Speaker:  Meng -Jing Tsai Date: 2012.09.10 Authors:  Chih-Hsuan Tzeng ,  Wen -Hsiang Tsai

9

Experimental Result

Secret binary image1024*768 Cover noise image resulting

1152*864K=1234

Page 10: Speaker:  Meng -Jing Tsai Date: 2012.09.10 Authors:  Chih-Hsuan Tzeng ,  Wen -Hsiang Tsai

10

Conclusions

• A larger data-embedding capacity can be provided by the cover noise image.

• The proposed method ensures full recoverability of hidden secret data from cover noise images.

Page 11: Speaker:  Meng -Jing Tsai Date: 2012.09.10 Authors:  Chih-Hsuan Tzeng ,  Wen -Hsiang Tsai

Thank youfor your listening.