Embedding Secret Messages in Texts

Slides:



Advertisements
Similar presentations
Build Your Own Webpage Code Academy.
Advertisements

1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授 Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography.
多媒體網路安全實驗室 Source:International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH- MSP),2010 Sixth. Authors:Hsiang-Cheh.
1 視覺密碼學 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University ( 清華大學 ) National Chung Cheng University ( 中正大學 ) Feng Chia University (
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
利用網路聊天室傳送機密訊息 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
多媒體網路安全實驗室 A novel user authentication and privacy preserving scheme with smartcards for wireless communications 作者 :Chun-Ta Li,Cgeng-Chi Lee 出處 :Mathematical.
HTML Internet Basics & Beyond. What The Heck Is HTML? HTML is the language of web pages. In order to truly understand HTML, you need to know a little.
HTML Extras. Adding a button   This is what it would look like:  Add color to your button: 
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
多媒體網路安全實驗室 Mobility Assisted Secret Key Generation Using Wireless Link Signatures Date: Reporter : Hong Ji Wei Auther : Junxing Zhang Kasera,
多媒體網路安全實驗室 Practical Searching Over Encrypted Data By Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: GLOBECOM 2010, 2010 IEEE.
多媒體網路安全實驗室 Source: IEICE Trans. Fundamentals, Vol. E90-A, No. 4, April 2007, pp Authors:Hong Lin Jin, Masaaki Fujiyoshi, Hitoshi Kiya Speaker:Cheng.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Digital Watermarking and Its Applications
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題
影像偽裝術 Dr. Chin-Chen Chang
ENCODING AND SENDING FORMATTED TEXT
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Information Hiding Technology: Current Research and Future Trend
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Visit for more Learning Resources
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Recent Developments on Multimedia and Secure Networking Technologies
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
The Recent Developments in Visual Secret Sharing
Hiding Data in a Color Palette Image with Hybrid Strategies
Emoticon-based Text Steganography in Chat
基於邊緣吻合向量量化編碼 法之資訊隱藏 張 真 誠 逢甲大學 講座教授 中正大學 榮譽教授、合聘教授 清華大學 合聘教授
Embedding Secrets Using Magic Matrices
Emoticon-based Text Steganography in Chat
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
An Innovative Steganographic Scheme Based on Vector Quantization
A Restricted Region-based Data-hiding Scheme
An Innovative Steganographic Scheme Based on Vector Quantization
The New Developments in Visual Cryptography
Some Novel Steganographic Methods for Digital Images
Recent Developments in Text Steganography
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Information Steganography Using Magic Matrix
A Data Hiding Method for Text Documents Using Multiple-Base Encoding
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Hiding Information in VQ Index Tables with Reversibility
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Chair Professor Chin-Chen Chang Feng Chia University
Recent Developments on Multimedia and Secure Networking Technologies
Chair Professor Chin-Chen Chang Feng Chia University
De-clustering and Its Application to Steganography
Information Hiding Techniques Using Magic Matrix
Encryption & Steganography: Amazing Things To Do with Bits
Recent Developments in Information Hiding
My Research Projects Chair Professor Chin-Chen Chang (張真誠)
Steganographic Systems for Secret Messages
High-capacity Reversible Data-hiding for LZW Codes
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Embedding Secret Messages in Texts Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University http://msn.iecs.fcu.edu.tw/~ccc http://msn.iecs.fcu.edu.tw/

Information hiding in general text Synonym substitution Syntactic transformation Semantic transformation Translation Inter-word spacing schemes Information hiding in binary text Information hiding in hypertext Information hiding in chat text Text steganography in chat Emoticon-based steganography in chat

Synonym substitution 0 wonderful 1 decent 2 fine Taichung is a 0 city 3 great 4 nice Taichung is a 0 city 1 town little Secret message: (3)5(1)2 Taichung is a great little town

Syntactic transformations Syntactic: the way that words and phrases are put together to form sentences in a language

Semantic transformation Semantic :Describe things that deal with the meanings of words and sentences Grafting: adding or repeating information Pruning: removing repeated information Substitution: replacing information

Grafting He is detained in Japan. He, an American citizen, is detained in Japan.

Afghanistan has been under attack since October Pruning The Pentagon ordered two new spy planes to the region to start flying over Afghanistan. Afghanistan has been under attack since October, and the Pentagon ordered two new spy planes to the region to start flying over there. Afghanistan has been under attack since October

Substitution The Pentagon ordered two new spy planes to the region to start flying over Afghanistan. Afghanistan Taliban ruled country The Pentagon ordered two new spy planes to the region to start flying over the Taliban ruled country.

Translation 法文: C’est la vie 英文: That’s life. That is the life. It is the life. It’s life. Message Stego object Alice Bob Cover object

Translation Rule # Rule Code Prob. (1) S -> AB 0.5 (2) S -> CB 1 0.5 (2) S -> CB 1 (3) A -> It is (4) A -> It’s (5) C -> That is (6) C -> That’s (7) B -> life (8) B -> the life 10 0.25 (9) B -> a life 11 Secret: 1010 Prefix Rule Output 1 (2) CB (5) That is B 10 (8) That is the life

Inter-word spacing scheme 1 This scheme exploits inter-word space of text to encode data. Thisisabook. Secret bits: {0 1 0} Thisisabook.

Inter-word spacing scheme 2 Keep spaces between groups unchanged. Weemploythecombinationoftherepeatedwords… Secret bits: { 1 0 1 1} Space change: + -      + We employthecombinationof therepeated words…

Information hiding in binary text Add-pattern Delete-pattern Binary image

Information hiding in binary text Embedding Secret bit 0 : A-pattern  D-pattern D-pattern  D-pattern Secret bit 1 : D-pattern  A-pattern A-pattern  A-pattern Extracting D-pattern  Secret bit 0 A-pattern  Secret bit 1

Information hiding in hypertext Secret message Cover hypertext Embedding Stego hypertext Secret key Extraction Secret message

Information hiding in hypertext <HTML> </HTML> 0110 <body <p Secret: 010110… 1 </title> capital letters small letters 0 1 :the written states Tags text file 1 2 3 4 5 6 <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=big5"> <title> 多媒體暨網路安全實驗室 </title> </head> <body bgcolor="#D27D1O"> <p align="center"><img border="0" src="msn.jpg" width="338" height="345"></p> <p align="center"><font face="標楷體" color="#f4efe8" size="7">~歡迎加入~</font></p> </body> </html> <META

Information hiding in hypertext capital letters small letters 0 1 :the written states text file 1 2 3 4 5 6 <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=big5"> <title> 多媒體暨網路安全實驗室 </title> </head> <body bgcolor="#D27D1O"> <p align="center"><img border="0" src="msn.jpg" width="338" height="345"></p> <p align="center"><font face="標楷體" color="#f4efe8" size="7">~歡迎加入~</font></p> </body> </html> <HTML> <META <body <p </HTML> Secret: 010110…

Text steganography in chat Shirali-Shahreza, M.H., Shirali-Shahreza, M., “Text Steganography in Chat,” Proceedings of the Third IEEE/IFIP International Conference in Central Asia on Internet the Next Generation of Mobile, Wireless and Optical Communications Networks, Tashkent, Uzbekistan, Sep. 2007, pp. 1-5.

Text steganography in chat SMS-Texting

Text steganography in chat Usual abbreviated words univ.  university PC  Personal Computer M.S.  master of science UN  United Nations Dr  doctor

Text steganography in chat SMS list + abbreviated words list  Check list 0  full form, 1  abbreviated form

Text steganography in chat Embedding : “Please call me when you feel upset.” secret “10” “Please CM when you feel upset.” Extracting : Check list secret bits “10”

Emoticon-based steganography in chat Emoticon-based Text Steganography in Chat

Emoticon-based steganography in chat Phase1: Classify the emoticons by their meaning

Emoticon-based steganography in chat Example: N = 16 hide log2N = 4 bits per emoticon sender uses second symbol receiver can extract 4 bits “0001”

Emoticon-based steganography in chat Phase2: emoticon || sentence : secret = 0 sentence || emoticon : secret = 1 I lost my bag secret = 0 I lost my bag secret = 1

Emoticon-based steganography in chat Phase3: emoticon , sentence : secret = 0 emoticon , sentence : secret = 1 , I lost my bag secret = 0 I lost my bag secret = 1

Emoticon-based steganography in chat Zhihui wants to send secret bits “11100000111” to Alan3c. Alan3c says : You are a bad student! Zhihui says: 1110 Alan3c says: Just a kidding, you are the nicest guy I know in the world. Zhihui says: Phase1 Phase3 Phase2 001||1||1

Future Research Direction Chinese text steganography 壞的毛病 壞毛病 山東的蘋果 山東蘋果 我的媽媽 我媽媽 主要的問題 主要問題 另外的一件事 另外一件事 其他的問題 其他問題 北京的大學 北京大學

Thanks for your listening