Chair Professor Chin-Chen Chang Feng Chia University

Slides:



Advertisements
Similar presentations
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Advertisements

1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授 Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography.
Information Hiding: Watermarking and Steganography
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
1 視覺密碼學 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University ( 清華大學 ) National Chung Cheng University ( 中正大學 ) Feng Chia University (
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Digital Watermarking Parag Agarwal
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Digital Watermarking and Its Applications
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Information Hiding Technology: Current Research and Future Trend
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
Image Watermarking Chu, Hsi-Cheng.
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
The Recent Developments in Visual Cryptography
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Recent Developments on Multimedia and Secure Networking Technologies
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
A Data Hiding Scheme Based Upon Block Truncation Coding
The Recent Developments in Visual Secret Sharing
Hiding Data in a Color Palette Image with Hybrid Strategies
Parag Agarwal Digital Watermarking Parag Agarwal
Embedding Secrets Using Magic Matrices
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Security and Privacy in Pervasive/Ubiquitous Computing Systems
The New Developments in Visual Cryptography
Some Novel Steganographic Methods for Digital Images
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Information Steganography Using Magic Matrix
A Data Hiding Method for Text Documents Using Multiple-Base Encoding
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Hiding Information in VQ Index Tables with Reversibility
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Chair Professor Chin-Chen Chang Feng Chia University
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Recent Developments on Multimedia and Secure Networking Technologies
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Digital Watermarking for Image Authentication with Localization
Chair Professor Chin-Chen Chang Feng Chia University
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
De-clustering and Its Application to Steganography
A Data Hiding Scheme Based Upon Block Truncation Coding
Information Hiding Techniques Using Magic Matrix
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Recent Developments in Information Hiding
My Research Projects Chair Professor Chin-Chen Chang (張真誠)
Steganographic Systems for Secret Messages
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Chair Professor Chin-Chen Chang Feng Chia University Security Technologies on Communication Networks and Their Applications to Electronic Business Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University http://msn.iecs.fcu.edu.tw/~ccc

Outline Mobile services Radio Frequency Identification (RFID) Roaming between cellular network and WLAN Watermarking Image authentication Visual cryptography Secret sharing Steganography MSN lab

Mobile services (1/4) MSN lab

Mobile services (2/4) MSN lab

Mobile services (3/4) MSN lab

Treats ? (4/4) User perspective Network perspective Spoofing Framing Denial-of-service Network perspective Passive Active 1. Eavesdropping 2. Traffic analysis 1. Masquerading 2. Replay 3. Message modification MSN lab

Spoofing MSN lab

Framing Legitimate? Bogus? MSN lab

Denial-of-service MSN lab

RFID (1/4) Tag Reader Database Antenna MSN lab

RFID (2/4) Shopping Library Transportation Household appliance … MSN lab

Risk? (3/4) Eavesdropping Traffic analysis Replay attack Position detection Physical attack MSN lab

Issue? (4/4) Anonymity -> Privacy Synchronization Authentication Efficiency MSN lab

Roaming (1/3) Access to the Internet anywhere & anytime Mobile device Base station AP AS ISP WLAN Cellular network AS: Authentication server AP: Access point MSN lab

Roaming (2/3) Cellular networks : wide service areas and continuous pervasive access WLAN : high-speed pervasive communications How to integrate? MSN lab

Issues? (3/3) Mutual authentication Anonymous service Charging MSN lab

Watermarking Visible watermarking Easy to embed Clear to see watermark MSN lab

Watermarking (Cont.) Invisible watermarking Requirements: Good visual quality of watermarked image Robustness Watermarking Original image Watermarked image MSN lab Watermark

Image authentication Requirements: Detect the tampered area Try to restore the tampered area Image Tampered image Detected image Restored image MSN lab

Classification: Meaningless shadows Meaningful shadows Secret sharing MSN lab

Secret sharing (Cont.) Sharing Shadow size: 256  256 Reconstructing Image size: 512  512 Reconstructing (2,4)-threshold secret sharing scheme MSN lab PSNR=24 dB

Secret sharing (Cont.) Reconstructing Secret image Hiding Stego-image Reconstructed secret image Secret image Stego-image (2, n)-threshold secret sharing scheme Stego-image MSN lab

Visual cryptography Stacking Shadow 1 Shadow 2 Secret MSN lab

Visual cryptography (Cont.) Stacking Shadow 1 Shadow 2 MSN lab Secret

Visual cryptography (Cont.) Rotating 40o Stacking Stacking Share 1 Share 2 Secret 1 “VISUAL” Secret 2 “SECRET” MSN lab

Steganography The targets Restoration Frequency domain (e.g. DCT, DWT, DFT) Spatial domain (e.g. pixel values) Compression domain (e.g. VQ) Text Restoration Irreversible Reversible MSN lab

Steganography (Cont.) Image Hiding system Stego image Cover image Secret message Stego image 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0 MSN lab

Steganography (Cont.) Text Video Sound 壞的毛病 壞毛病 山東的蘋果 山東蘋果 我的媽媽 我媽媽 壞的毛病 壞毛病 山東的蘋果 山東蘋果 我的媽媽 我媽媽 主要的問題 主要問題 另外的一件事 另外一件事 其他的問題 其他問題 北京的大學 北京大學 Video Sound MSN lab

Conclusions The biggest risk: eavesdropping & copy The limitation: Power Computing capability Robustness Image quality MSN lab

Security Technologies on Communication Networks and Their Applications to Electronic Business MSN lab