Information Hiding & Digital Watermarking Tri Van Le.

Slides:



Advertisements
Similar presentations
Cryptography and Game Theory: Designing Protocols for Exchanging Information Gillat Kol and Moni Naor.
Advertisements

Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
CS555Topic 191 Cryptography CS 555 Topic 19: Formalization of Public Key Encrpytion.
Foundations of Cryptography Lecture 13 Lecturer: Moni Naor.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
Asymmetric Cryptography part 1 & 2 Haya Shulman Many thanks to Amir Herzberg who donated some of the slides from
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Introduction to Modern Cryptography Instructor: Amos Fiat Strongly based on presentation and class by Benny Chor School of Computer Science Tel- Aviv Univ.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
CS555Spring 2012/Topic 41 Cryptography CS 555 Topic 4: Computational Approach to Cryptography.
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
1 Pertemuan 08 Public Key Cryptography Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Cryptography and Network Security Chapter 10. Chapter 10 – Key Management; Other Public Key Cryptosystems No Singhalese, whether man or woman, would venture.
Computer Security CS 426 Lecture 3
Public Key Model 8. Cryptography part 2.
CMSC 414 Computer and Network Security Lecture 3 Jonathan Katz.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
CIS 5371 Cryptography Introduction.
Merkle-Hellman Knapsack Cryptosystem Merkle offered $100 award for breaking singly - iterated knapsack Singly-iterated Merkle - Hellman KC was broken by.
Lec. 5 : History of Cryptologic Research II
Damageless Information Hiding Technique using Neural Network Keio University Graduate School of Media and Governance Kensuke Naoe.
CSCE 201 Introduction to Information Security Fall 2010 Data Protection.
Midterm Review Cryptography & Network Security
Chapter 21 Public-Key Cryptography and Message Authentication.
Information Security -- Part II Public-Key Encryption and Hash Functions Frank Yeong-Sung Lin Information Management Department National Taiwan University.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
Computer and Network Security Rabie A. Ramadan Lecture 6.
Theory of Computation II Topic presented by: Alberto Aguilar Gonzalez.
Merkle-Hellman Knapsack Cryptosystem
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Lecture 2: Introduction to Cryptography
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
The First Ten Years of Public-Key Cryptography Paper by: Whitfield Diffie Presentation by Taotao Zhao.
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Master and PhD examples Prof. Yvo Desmedt Department of Computer Science Florida State University, USA Partially funded by NSF.
Computer Security Lecture 5 Ch.9 Public-Key Cryptography And RSA Prepared by Dr. Lamiaa Elshenawy.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Cryptography and Network Security Chapter 10 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 3 (Chapter 9) Public-Key Cryptography and RSA Prepared by Dr. Lamiaa M. Elshenawy 1.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
INCS 741: Cryptography Overview and Basic Concepts.
CHAPTER 14 ENCRYPTION AND DECRYPTION Sajina Pradhan
Information Hiding & Digital Watermarking Tri Van Le.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Parag Agarwal Digital Watermarking Parag Agarwal
Cryptography Lecture 5.
Information Hiding & Digital Watermarking
Introduction to Cryptography
2. Perfect Secret Encryption
Presentation transcript:

Information Hiding & Digital Watermarking Tri Van Le

Outlines Background State of the art Research goals Research plan Our approaches

Background Information hiding –Steganography –Digital watermarking Related work –Covert channels –Anonymous communications

Information Hiding Steganography –Invisible inks –Small dots –Letters Digital watermarking –Copyright information –Tracing information

Information Hiding Main idea –Hide messages in a cover Steganography –Secrecy of messages Watermarking –Authenticity of messages

Covert Channels Leakage information (e.g. viruses) –Disk space –CPU load Subliminal channels –Digital signatures –Encryption schemes –Cryptographic malwares

Covert Computations Computation inside computations –Secret design calculations inside a factoring computation –Secret physics simulations inside a cryptographic software or devices

Anonymous Communications MIX Networks –Electronic voting –Anonymous communication Onion Routings –Limited anonymous communication Blind signatures –Digital cash

Digital Watermarking Secure against known simple attacks –Common lossy compressions JPEG, MPEG, … –Common signal processing operations Band pass, echo, pitch, noise filters, … Crop, scale, move, reshape, … Specialized attacks

Information Hiding (state of the art) Many schemes were proposed –Most of them were broken Use heuristic security –Subjective measurements –Assume very specific enemy

Broken Schemes (I)

Broken Schemes (II)

Broken Schemes (III)

Broken Schemes (IV)

Cryptography in the 80s Beginning time of open research A lot of schemes proposed Most of them soon broken

Broken Cryptosystems (I) Merkle Hellman Iterated Knapsack Lu-Lee Merlke Hellman Merlke Hellman Lu-Lee Adiga Shankar Adigar Shankar Nieder- reiter Neiderreiter Goodman McAuly Goodman McAuly Pieprzyk Pieprzyk Chor Rivest Chor Rivest Okamoto Okamoto Okamoto

Broken Cryptosystems (II) Matsumoto Imai Cade Yagisawa Matsumoto Imai CadeYasigawa TMKIF Tsujii, Itoh Matsumoto Kurosama Fujioka Luccio Mazzone Luccio Mazzone Kravitz Reed Kravitz Reed Rao Nam Rao Nam Low Degree CG 1982 High Degree CG 1988 Rivest Adleman Dertouzos Rivest Adleman Dertouzos Krawczyk Boyar...

Proven Secure Schemes Perfectly secure schemes –Shannon (1949) Computationally secure schemes –Goldwasser and Micali (1982) –Rabin (1981)

Perfectly Secure Cryptosystems Shannon’s work (1949) –Mathematical proof of security –Information theoretic secrecy Enemy with unlimited power –Can compute any desired function

Computationally Secure Cryptosystems Rabin (81), Goldwasser & Micali (82) –Mathematical proof of security –Computational secrecy Enemy with limited time and space –Can run in polynomial time –Can use polynomial space

Research Goals Fundamental way –Systematic approach –Same as Shannon and Goldwasser’s work What are the properties –Hiding –Secrecy –Authenticity

Fundamental Models Unconditional Security –Unlimited enemy Statistical Security –Polynomial number of samples Computational Security –Polynomial time and space

Information Hiding Properties Hiding property –Output must look like the cover Secrecy property –No partial information on input message Authenticity property –Hard to compute valid output

Unconditional Hiding Definition –E: K  M  C, encryption function –K: key set, M: message set, C: cover set –P cover : probability distribution of covers –P c : probability distribution of E(k,m) Requires –P c = P cover

Statistical Hiding Definition –P cover : probability distribution of covers –P c : probability distribution of E(k,m) –n: description length of each cover Requires –|P c - P cover | is negligible. –|P c - P cover | 0 and n>N d.

Computational Hiding Definition –P cover : probability distribution of covers –P c : probability distribution of E(k,m) –n: description length of each cover Requires –P c and P cover are P-time indistinguishable

Computational Hiding P-time indistinguishable –For all P.P.T.M. A, d>0, and n>N d :  Prob(A(P c )=1) - Prob(A(P cover )=1)  < n -d. –Informally speaking No P-time enemy can tell apart P c and P cover

Unconditional Secrecy Ciphertext independence: –Prob(m|E(k,m)) = Prob(m) Informally no information on message given ciphertext

Statistical Secrecy Negligible advantages: –For all m in M, d>0, n>N d : |Prob(m|E(k,m)) - Prob(m)| < n -d –Informally Only negligible amount of information on message leaked when given the ciphertext.

Computational Secrecy Negligible chances: –For all P.P.T.M. A: –For all m in M, d>0, n>N d : |Prob(A(E(k,m))=m)| < n -d –Informally Only negligible chance of output correct m.

Our Approaches Arbitrary key –Steganography, watermarking Restricted key –Protection of key materials Key = Ciphertext –Secret sharing

Our Approaches Arbitrary key distribution –E(k,m) is distributed accordingly to P cover Applications –Steganography –Digital watermarking –Tamper-resistant hardware

Our Approaches Restricted key distribution –c = E(k,m) –k is distributed accordingly to P K –c is distributed accordingly to P cover Applications –No tamper-resistant hardware –Protection of key materials

Our Approaches Key = Ciphertext –S: M  C  C –(k 1,k 2 ) = S(m) Requires –k 1 and k 2 distributed accordingly to P cover Applications –Secret sharing –Robustness

Research Progress To understand information hiding –Perfect hiding (done) Necessary and sufficient conditions Computational complexity results Constructions of prefect secure schemes Constructions of schemes with non-reliability –Computational hiding (under research) Conventional constructions Public key schemes

Perfect Hiding Scheme Condition –P cover (c)  1/|M| Algorithms –Setup: produce |M| matrices A i –Disjoint non-zero entries –Columns sum up to P cover –Rows sum up to the same –Encrypt: –E(k,m) distributes accordingly to row A m (k).

Perfect Hiding Scheme Algorithms –Encrypt: –c=E(k,m) distributes accordingly to row A m (k). –Decrypt: –Output m such that A m (k,c)>0. Message distribution independence –Hiding implies privacy.

Other aspects –Replacing privacy by authenticity –Digital watermarking Extra problem –Robustness against modifications –Simple modifications –General modifications

How to exploit Quadratic residues –n = pq –S 1 = {x 2 |x in Z n * } –S 2 = {x|x in Z n * and J(x)=1} Decision Diffie-Hellman –U 1 = (g, g a, g b, g ab ) mod p –U 2 = (g, g a, g b, g r ) mod p

Conclusion Covert channels –Very special distribution Our work –General distribution –Proven security levels

Thank you Questions?