利用網路聊天室傳送機密訊息 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University

Slides:



Advertisements
Similar presentations
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 :JongHyup LEE 出處.
Advertisements

1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授 Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography.
多媒體網路安全實驗室 Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Date : Reporter : Hong Ji Wei Authors.
多媒體網路安全實驗室 Source:International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH- MSP),2010 Sixth. Authors:Hsiang-Cheh.
1 視覺密碼學 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University ( 清華大學 ) National Chung Cheng University ( 中正大學 ) Feng Chia University (
CE1 week 3 Vocabulary Jobs. Homework: Sketch Engine Go to –Sign up for a 30 day Sketch Engine account –Experiment.
鄭瑞興的個人簡介 中山資工所 鄭瑞興.
多媒體網路安全實驗室 A Strong User Authentication Framework for Cloud Computing Date : Reporter : Hong Ji Wei Authors : Amlan Jyoti Choudhury, Mangal.
多媒體網路安全實驗室 A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks Date:2011/10/05 報告人:向峻霈.
多媒體網路安全實驗室 An Efficient RFID Authentication Protocol for Low-cost Tags Date : Reporter : Hong Ji Wei Authors : Yanfei Liu From : 2008 IEEE/IFIP.
多媒體網路安全實驗室 A novel user authentication and privacy preserving scheme with smartcards for wireless communications 作者 :Chun-Ta Li,Cgeng-Chi Lee 出處 :Mathematical.
1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
A Novel Technique for Image Authentication in Frequency Domain using Discrete Fourier Transformation Technique (IAFDDFTT) Malaysian Journal of Computer.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
多媒體網路安全實驗室 Certificateless multi-proxy signature Date:2011/04/08 報告人:向峻霈 出處 : Zhengping Jin, Qiaoyan Wen: Computer Communications, pp ,2011.
1 A Steganographic Scheme for Secure Communications Based on the Chaos and Eular Theorem Der-Chyuan Lou and Chia-Hung Sung IEEE Transactions on Multimedia,
多媒體網路安全實驗室 Mobility Assisted Secret Key Generation Using Wireless Link Signatures Date: Reporter : Hong Ji Wei Auther : Junxing Zhang Kasera,
多媒體網路安全實驗室 Anonymous ID Signature Scheme with Provable Identity Date: Reporter :Chien-Wen Huang 出處: 2008 Second International Conference on Future.
NOTE ON PERSONAL COMPUTER SECURITY Hsu, Yen-Yi. Outline  Background  Content –6 steps.
Internet Technology Laboratory Department of Computer and Communication Kun Shan University  官方網站:
1 Chapter 15 Graphs, Trees, and Networks. 2 Chap Undirected Graphs 15.2 Directed Graphs 15.3 Trees 15.4 Networks 15.5 Graph Algorithms
多媒體網路安全實驗室 Practical Searching Over Encrypted Data By Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: GLOBECOM 2010, 2010 IEEE.
Reversible Data Hiding for Point-Sampled Geometry JOURNAL OF INFORMATION SCIENCE AND ENGINEERING Vol. 23, pp , 2007 PENG-CHENG WANG AND CHUNG-MING.
多媒體網路安全實驗室 Anonymous Authentication Systems Based on Private Information Retrieval Date: Reporter: Chien-Wen Huang 出處: Networked Digital Technologies,
多媒體網路安全實驗室 Source: IEICE Trans. Fundamentals, Vol. E90-A, No. 4, April 2007, pp Authors:Hong Lin Jin, Masaaki Fujiyoshi, Hitoshi Kiya Speaker:Cheng.
多媒體網路安全實驗室 An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards 作者 : Xiong Li, Yongping.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Digital Watermarking and Its Applications
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Information Hiding Technology: Current Research and Future Trend
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Embedding Secret Messages in Texts
Visit for more Learning Resources
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
The Recent Developments in Visual Secret Sharing
Hiding Data in a Color Palette Image with Hybrid Strategies
Emoticon-based Text Steganography in Chat
基於邊緣吻合向量量化編碼 法之資訊隱藏 張 真 誠 逢甲大學 講座教授 中正大學 榮譽教授、合聘教授 清華大學 合聘教授
Embedding Secrets Using Magic Matrices
Emoticon-based Text Steganography in Chat
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
A Restricted Region-based Data-hiding Scheme
Some Novel Steganographic Methods for Digital Images
Recent Developments in Text Steganography
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Information Steganography Using Magic Matrix
A Data Hiding Method for Text Documents Using Multiple-Base Encoding
Hiding Information in VQ Index Tables with Reversibility
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
De-clustering and Its Application to Steganography
Information Hiding Techniques Using Magic Matrix
Recent Developments in Information Hiding
Steganographic Systems for Secret Messages
High-capacity Reversible Data-hiding for LZW Codes
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

利用網路聊天室傳送機密訊息 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University

2 Information hiding in general text  Synonym substitution  Syntactic transformation  Translation  Semantic transformation Information hiding in hypertext Information hiding in binary text  Inter-word spacing schemes Information hiding in chat text  Text steganography in chat  Emoticon-based steganography in chat

3 Synonym substitution Taichung is a 0 wonderful 1 decent 2 fine 3 great 4 nice little 0 city 1 town Secret message : (3) 5 (1) 2 Taichung is a great little town

4 Syntactic transformations Syntactic: the way that words and phrases are put together to form sentences in a language

5 Semantic transformation Grafting: adding or repeating information Pruning: removing repeated information Substitution: replacing information Semantic :Describe things that deal with the meanings of words and sentences

6 Grafting He is detained in Japan. He, an American citizen, is detained in Japan.

7 Pruning The Pentagon ordered two new spy planes to the region to start flying over Afghanistan. Afghanistan has been under attack since October, and the Pentagon ordered two new spy planes to the region to start flying over there. Afghanistan has been under attack since October

8 Substitution The Pentagon ordered two new spy planes to the region to start flying over Afghanistan. Afghanistan Taliban ruled country The Pentagon ordered two new spy planes to the region to start flying over the Taliban ruled country.

9 Translation 法文 : C ’ est la vie 英文 : That ’ s life. That is the life. It is the life. It ’ s life. Message AliceBob Stego object Cover object

10 Rule #RuleCodeProb. (1)S -> AB00.5 (2)S -> CB10.5 (3)A -> It is00.5 (4)A -> It’s10.5 (5)C -> That is00.5 (6)C -> That’s10.5 (7)B -> life00.5 (8)B -> the life (9)B -> a life PrefixRuleOutput 1(2)CB 0(5)That is B 10(8)That is the life Secret: 1010 Translation

11 Inter-word spacing scheme 1 This scheme exploits inter-word space of text to encode data. Thisisabook. Secret bits: {0 1 0} Thisisabook.

12 Inter-word spacing scheme 2 Weemploythecombinationoftherepeatedwords… Secret bits: { } Space change: + - + We employthecombinationof therepeated words… Keep spaces between groups unchanged.

13 Add-pattern Delete-pattern Information hiding in binary text Binary image

14 Information hiding in binary text Embedding Secret bit 0 : A-pattern  D-pattern D-pattern  D-pattern Secret bit 1 : D-pattern  A-pattern A-pattern  A-pattern Extracting D-pattern  Secret bit 0 A-pattern  Secret bit 1

15 Information hiding in hypertext Extraction Secret message Embedding Cover hypertextStego hypertext Secret key

16 多媒體暨網路安全實驗室 ~ 歡迎加入 ~ Tags text file Secret: … <META capital letters small letters 0101 :the written states <body <p<p Information hiding in hypertext

17 Secret: … 多媒體暨網路安全實驗室 ~ 歡迎加入 ~ text file <META <body <p<p capital letters small letters 0101 :the written states Information hiding in hypertext

18 Text steganography in chat Shirali-Shahreza, M.H., Shirali-Shahreza, M., “Text Steganography in Chat,” Proceedings of the Third IEEE/IFIP International Conference in Central Asia on Internet the Next Generation of Mobile, Wireless and Optical Communications Networks, Tashkent, Uzbekistan, Sep. 2007, pp. 1-5.

19 Text steganography in chat SMS-Texting

20 Text steganography in chat Usual abbreviated words univ.  university PC  Personal Computer M.S.  master of science UN  United Nations Dr  doctor

21 Text steganography in chat SMS list + abbreviated words list  Check list full formabbreviated form0  full form, 1  abbreviated form

22 Text steganography in chat Embedding : “Please call me when you feel upset.” secret “10” “Please CM when you feel upset.” Extracting : “Please CM when you feel upset.” secret bits “10” Check list

23 Emoticon-based steganography in chat Emoticon-based Text Steganography in Chat

24 Phase1: Classify the emoticons by their meaning Emoticon-based steganography in chat

25 Example: N = 16 hide  log 2 N  = 4 bits per emoticon sender uses second symbol receiver can extract 4 bits “0001” Emoticon-based steganography in chat

26 Phase2: emoticon || sentence : secret = 0 sentence || emoticon : secret = 1 I lost my bag secret = 0 secret = 1 Emoticon-based steganography in chat

27 Phase3: emoticon, sentence : secret = 0 emoticon, sentence : secret = 1, I lost my bag secret = 0 secret = 1 I lost my bag Emoticon-based steganography in chat

28 Zhihui wants to send secret bits “ ” to Alan3c ||1||1 Phase1 Phase2 Alan3c says: Just a kidding, you are the nicest guy I know in the world. Zhihui says: 00 Phase3 Alan3c says : You are a bad student! Zhihui says: Emoticon-based steganography in chat

29 Future Research Direction Chinese text steganography 壞的毛病 壞毛病 山東的蘋果 山東蘋果 我的媽媽 我媽媽 主要的問題 主要問題 另外的一件事 另外一件事 其他的問題 其他問題 北京的大學 北京大學

30