1 / 11

Speaker: Meng -Jing Tsai Date: 2012.09.10 Authors: Chih-Hsuan Tzeng , Wen -Hsiang Tsai

Hiding Binary Images behind Noise with Authentication Capability: A New Approach to Covert Communication. Speaker: Meng -Jing Tsai Date: 2012.09.10 Authors: Chih-Hsuan Tzeng , Wen -Hsiang Tsai

oistin
Download Presentation

Speaker: Meng -Jing Tsai Date: 2012.09.10 Authors: Chih-Hsuan Tzeng , Wen -Hsiang Tsai

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hiding Binary Images behind Noise with Authentication Capability: A New Approachto Covert Communication Speaker: Meng-Jing Tsai Date: 2012.09.10 Authors: Chih-HsuanTzeng, Wen-Hsiang Tsai Source: Proceedings of  IEEE 37th Annual 2003 International Carnahan Conference on Security Technology, Oct. 2003, pp. 232-236

  2. Outline • Introductions • Proposed Method • Experimental Result • Conclusions

  3. Introductions • Covert communication • There were only a few studies in the past about hiding information behind binary images. • difficult • limited data embedding

  4. Proposed Method Hiding g2 Ki g1 seed K K1, K2, K3, … , Ki secret image block noise block

  5. Proposed Method Hiding g3 Ki 1 0 0 1 g4 Xi 1 authentication XOR secret secret image block noise block Authentication bits 1101110

  6. Proposed Method Hiding secret image block cover resulting

  7. Proposed Method Recovering g3 Ki g1 seed K K1, K2, K3, … , Ki g4 Xi authentication secret Authentication bits 1101110

  8. Proposed Method Recovering g2 Ki XOR noise block cover resulting secret image block

  9. Experimental Result Secret binary image 1024*768 Cover noise image resulting 1152*864 K=1234

  10. Conclusions A larger data-embedding capacity can be provided by the cover noise image. The proposed method ensures full recoverability of hidden secret data from cover noise images.

  11. Thank youfor your listening.

More Related