1 / 14

Data Hiding in a Kind of PDF Texts for Secret Communication

Data Hiding in a Kind of PDF Texts for Secret Communication. Authors : S.P. Zhong, X.Q. Cheng, and T.R. Chen Source : International Journal of Network Security, vol. 4, no. 1, pp. 17-26, 2007 Presenter : Ping-Kun Hsu( 許鈵昆 ) Date : 2011/01/21. Outline. Introduction

mura
Download Presentation

Data Hiding in a Kind of PDF Texts for Secret Communication

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data Hiding in a Kind of PDF Texts for Secret Communication Authors : S.P. Zhong, X.Q. Cheng, and T.R. Chen Source : International Journal of Network Security, vol. 4, no. 1, pp. 17-26, 2007 Presenter : Ping-Kun Hsu(許鈵昆) Date : 2011/01/21

  2. Outline Introduction TJ Operator Logistic Chaotic Map The Proposed Scheme Experiment Result Analysis Conclusion Comment

  3. Introduction • Goal • Hiding secret data in PDF file to achieve the undetectability, perceptual transparency, and capacity. • Related Works • TJ Operator • Logical Chaotic Map

  4. TJOperator 2D vector-graph positioning model

  5. Logistic Chaotic Map Xn+1 = r ×Xn×(1-Xn) 0≦Xn≦1, 0 ≦ r ≦4 If 3.57 ≦ r ≦4, the iteration values are random

  6. The Proposed Scheme(1/5) Secret data Key FlagStr2 Start point SHA-1 SHA-1 0101|1010 Map 1 Map 2 01011011 01011010 5 | 10 Num1 Num2 91 mod 16 90 mod 16 Logistic chaotic map 11 10 FlagStr1 Transformed data FlagStr2 IND

  7. The Proposed Scheme(2/5) 10,11,12 IND [<01> 4 <02> -2 <03> 20 <04> 15 <05>]TJ [<01> 10<02>11 <03> 20 <04>12 <05>]TJ no If the absolute value of the integer numeral is in [1,16] Keep the integer numeral constant yes If the Num2 is bigger than φ yes no Replace the integer numeral by the numeral in IND Replace the integer numeral by the numeral transformed from Num1

  8. The Proposed Scheme(3/5) Key FlagStr Start point SHA-1 Map 2 Num2 01011011 Logistic chaotic map 91 mod 16 11 FlagStr

  9. The Proposed Scheme(4/5) [<01> 10<02>11 <03> 20 <04>12 <05>]TJ If the absolute value of the integer numeral is in [1,16] yes no If the Num2 is bigger than φ yes no Extract the integer numeral and check the next integer numeral Check the next integer numeral

  10. The Proposed Scheme(5/5) CheckStr Embedded Data FlagStr2 SHA-1 compare yes no Data have been extracted successfully Data may have been tampered

  11. Experiment Result

  12. Analysis

  13. Conclusion The proposed scheme is secure, and the embedded capacity is high.

  14. Comment How to calculate integer numeral by the numeral transformed from Num1

More Related