Information Hiding & Digital Watermarking

Slides:



Advertisements
Similar presentations
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Advertisements

CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
Foundations of Cryptography Lecture 13 Lecturer: Moni Naor.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Public Key Model 8. Cryptography part 2.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Information Hiding & Digital Watermarking Tri Van Le.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Chapter 21 Public-Key Cryptography and Message Authentication.
Theory of Computation II Topic presented by: Alberto Aguilar Gonzalez.
Lecture 2: Introduction to Cryptography
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan
Information Hiding & Digital Watermarking Tri Van Le.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
@Yuan Xue CS 285 Network Security Public-Key Cryptography Yuan Xue Fall 2012.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Secret Key Cryptography
Cryptography – Test Review
Outline Primitive Element Theorem Diffie Hellman Key Distribution
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Boneh-Franklin Identity Based Encryption Scheme
Public Key Encryption Systems
PUBLIC-KEY ENCRYPTION Focusing on RSA
Public Key Encryption and Digital Signatures
Outline Desirable characteristics of ciphers Uses of cryptography
Introduction to Security
Handbook of Applied Cryptography - CH8, Public-Key Encryption
Outline Desirable characteristics of ciphers Uses of cryptography
Digital Signature Schemes and the Random Oracle Model
Cryptographic Hash Functions Part I
Cryptography Lecture 4.
Cryptography Lecture 3 Arpita Patra © Arpita Patra.
Recent Developments on Multimedia and Secure Networking Technologies
Encryption, Cryptography, and Steganography:
The RSA public-key cryptosystem cse712 e-commerce
Security through Encryption
Introduction to Symmetric-key and Public-key Cryptography
csci5233 computer security & integrity (Chap. 4)
Parag Agarwal Digital Watermarking Parag Agarwal
NET 311 Information Security
Cryptography Lecture 4.
Cryptography Lecture 5.
Public-Key, Digital Signatures, Management, Security
DISSERTATION ON CRYPTOGRAPHY.
One Way Functions Motivation Complexity Theory Review, Motivation
Recent Developments on Multimedia and Secure Networking Technologies
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9
Introduction to Cryptography
Cryptography Lecture 3.
Fluency with Information Technology Lawrence Snyder
Public Key Encryption Systems
2. Perfect Secret Encryption
Network Security Design Fundamentals Lecture-13
CIS 5371 Cryptography 2. Perfect Secret Encryption
Presentation transcript:

Information Hiding & Digital Watermarking Tri Van Le

Outlines Background State of the art Research goals Research plan Our approaches

Background Information hiding Related work Steganography Digital watermarking Related work Covert channels Anonymous communications

Information Hiding Steganography Digital watermarking Invisible inks Small dots Letters Digital watermarking Copyright information Tracing information

Information Hiding Main idea Steganography Watermarking Hide messages in a cover Steganography Secrecy of messages Watermarking Authenticity of messages

Covert Channels Leakage information (e.g. viruses) Subliminal channels Disk space CPU load Subliminal channels Digital signatures Encryption schemes Cryptographic malwares

Covert Computations Computation inside computations Secret design calculations inside a factoring computation Secret physics simulations inside a cryptographic software or devices

Anonymous Communications MIX Networks Electronic voting Anonymous communication Onion Routings Limited anonymous communication Blind signatures Digital cash

Digital Watermarking Secure against known simple attacks Common lossy compressions JPEG, MPEG, … Common signal processing operations Band pass, echo, pitch, noise filters, … Crop, scale, move, reshape, … Specialized attacks

Information Hiding (state of the art) Many schemes were proposed Most of them were broken Use heuristic security Subjective measurements Assume very specific enemy

Broken Schemes (I)

Broken Schemes (II)

Broken Schemes (III)

Broken Schemes (IV)

Cryptography in the 80s Beginning time of open research A lot of schemes proposed Most of them soon broken

Broken Cryptosystems (I) Merkle Hellman 1978-1984 Iterated Knapsack 1978-1984 Lu-Lee 1979-1980 Adiga Shankar 1985-1988 Nieder- reiter 1986-1988 Merlke Hellman Merlke Hellman Lu-Lee Adigar Shankar Neiderreiter Goodman McAuly 1984-1988 Pieprzyk 1985-1988 Chor Rivest 1988-1998 Okamoto 1986-1987 Okamoto 1987-1988 Goodman McAuly Pieprzyk Chor Rivest Okamoto Okamoto

Broken Cryptosystems (II) Matsumoto Imai 1983-1984 Cade 1985-1986 Yagisawa 1985-1986 TMKIF 1986-1985 Luccio Mazzone 1980-1981 Matsumoto Imai Cade Yasigawa Tsujii, Itoh Matsumoto Kurosama Fujioka Luccio Mazzone Kravitz Reed 1982-1982 Rao Nam 1986-1988 Low Degree CG 1982 High Degree CG 1988 Rivest Adleman Dertouzos 1978-1987 ... Kravitz Reed Rao Nam Boyar Krawczyk Rivest Adleman Dertouzos

Proven Secure Schemes Perfectly secure schemes Shannon (1949) Computationally secure schemes Goldwasser and Micali (1982) Rabin (1981)

Perfectly Secure Cryptosystems Shannon’s work (1949) Mathematical proof of security Information theoretic secrecy Enemy with unlimited power Can compute any desired function

Computationally Secure Cryptosystems Rabin (81), Goldwasser & Micali (82) Mathematical proof of security Computational secrecy Enemy with limited time and space Can run in polynomial time Can use polynomial space

Research Goals Fundamental way What are the properties Systematic approach Same as Shannon and Goldwasser’s work What are the properties Hiding Secrecy Authenticity

Fundamental Models Unconditional Security Statistical Security Unlimited enemy Statistical Security Polynomial number of samples Computational Security Polynomial time and space

Information Hiding Properties Hiding property Output must look like the cover Secrecy property No partial information on input message Authenticity property Hard to compute valid output

Unconditional Hiding Definition Requires E: KM  C, encryption function K: key set, M: message set, C: cover set Pcover: probability distribution of covers Pc: probability distribution of E(k,m) Requires Pc = Pcover

Statistical Hiding Definition Requires Pcover: probability distribution of covers Pc: probability distribution of E(k,m) n: description length of each cover Requires |Pc - Pcover| is negligible. |Pc - Pcover| < n-d for all d>0 and n>Nd.

Computational Hiding Definition Requires Pcover: probability distribution of covers Pc: probability distribution of E(k,m) n: description length of each cover Requires Pc and Pcover are P-time indistinguishable

Computational Hiding P-time indistinguishable For all P.P.T.M. A, d>0, and n>Nd: Prob(A(Pc)=1) - Prob(A(Pcover)=1) < n-d. Informally speaking No P-time enemy can tell apart Pc and Pcover

Unconditional Secrecy Ciphertext independence: Prob(m|E(k,m)) = Prob(m) Informally no information on message given ciphertext

Statistical Secrecy Negligible advantages: For all m in M, d>0, n>Nd: |Prob(m|E(k,m)) - Prob(m)| < n-d Informally Only negligible amount of information on message leaked when given the ciphertext.

Computational Secrecy Negligible chances: For all P.P.T.M. A: For all m in M, d>0, n>Nd: |Prob(A(E(k,m))=m)| < n-d Informally Only negligible chance of output correct m.

Our Approaches Arbitrary key Restricted key Key = Ciphertext Steganography, watermarking Restricted key Protection of key materials Key = Ciphertext Secret sharing

Our Approaches Arbitrary key distribution Applications E(k,m) is distributed accordingly to Pcover Applications Steganography Digital watermarking Tamper-resistant hardware

Our Approaches Restricted key distribution Applications c = E(k,m) k is distributed accordingly to PK c is distributed accordingly to Pcover Applications No tamper-resistant hardware Protection of key materials

Our Approaches Key = Ciphertext Requires Applications S: MCC (k1,k2) = S(m) Requires k1 and k2 distributed accordingly to Pcover Applications Secret sharing Robustness

Research Progress To understand information hiding Perfect hiding (done) Necessary and sufficient conditions Computational complexity results Constructions of prefect secure schemes Constructions of schemes with non-reliability Computational hiding (under research) Conventional constructions Public key schemes

Perfect Hiding Scheme Condition Algorithms Pcover(c)  1/|M| Setup: produce |M| matrices Ai Disjoint non-zero entries Columns sum up to Pcover Rows sum up to the same Encrypt: E(k,m) distributes accordingly to row Am(k).

Perfect Hiding Scheme Algorithms Message distribution independence Encrypt: c=E(k,m) distributes accordingly to row Am(k). Decrypt: Output m such that Am(k,c)>0. Message distribution independence Hiding implies privacy.

Other aspects Other aspects Extra problem Replacing privacy by authenticity Digital watermarking Extra problem Robustness against modifications Simple modifications General modifications

How to exploit Quadratic residues Decision Diffie-Hellman n = pq S1 = {x2 |x in Zn*} S2 = {x|x in Zn* and J(x)=1} Decision Diffie-Hellman U1 = (g, ga, gb, gab) mod p U2 = (g, ga, gb, gr) mod p

Conclusion Covert channels Our work Very special distribution General distribution Proven security levels

Thank you Questions?