Download presentation
Presentation is loading. Please wait.
Published byLorena Wade Modified over 9 years ago
1
利用網路聊天室傳送機密訊息 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University http://msn.iecs.fcu.edu.tw/~ccc http://msn.iecs.fcu.edu.tw/
2
2 Information hiding in general text Synonym substitution Syntactic transformation Translation Semantic transformation Information hiding in hypertext Information hiding in binary text Inter-word spacing schemes Information hiding in chat text Text steganography in chat Emoticon-based steganography in chat
3
3 Synonym substitution Taichung is a 0 wonderful 1 decent 2 fine 3 great 4 nice little 0 city 1 town Secret message : (3) 5 (1) 2 Taichung is a great little town
4
4 Syntactic transformations Syntactic: the way that words and phrases are put together to form sentences in a language
5
5 Semantic transformation Grafting: adding or repeating information Pruning: removing repeated information Substitution: replacing information Semantic :Describe things that deal with the meanings of words and sentences
6
6 Grafting He is detained in Japan. He, an American citizen, is detained in Japan.
7
7 Pruning The Pentagon ordered two new spy planes to the region to start flying over Afghanistan. Afghanistan has been under attack since October, and the Pentagon ordered two new spy planes to the region to start flying over there. Afghanistan has been under attack since October
8
8 Substitution The Pentagon ordered two new spy planes to the region to start flying over Afghanistan. Afghanistan Taliban ruled country The Pentagon ordered two new spy planes to the region to start flying over the Taliban ruled country.
9
9 Translation 法文 : C ’ est la vie 英文 : That ’ s life. That is the life. It is the life. It ’ s life. Message AliceBob Stego object Cover object
10
10 Rule #RuleCodeProb. (1)S -> AB00.5 (2)S -> CB10.5 (3)A -> It is00.5 (4)A -> It’s10.5 (5)C -> That is00.5 (6)C -> That’s10.5 (7)B -> life00.5 (8)B -> the life100.25 (9)B -> a life110.25 PrefixRuleOutput 1(2)CB 0(5)That is B 10(8)That is the life Secret: 1010 Translation
11
11 Inter-word spacing scheme 1 This scheme exploits inter-word space of text to encode data. Thisisabook. Secret bits: {0 1 0} Thisisabook.
12
12 Inter-word spacing scheme 2 Weemploythecombinationoftherepeatedwords… Secret bits: { 1 0 1 1} Space change: + - + We employthecombinationof therepeated words… Keep spaces between groups unchanged.
13
13 Add-pattern Delete-pattern Information hiding in binary text Binary image
14
14 Information hiding in binary text Embedding Secret bit 0 : A-pattern D-pattern D-pattern D-pattern Secret bit 1 : D-pattern A-pattern A-pattern A-pattern Extracting D-pattern Secret bit 0 A-pattern Secret bit 1
15
15 Information hiding in hypertext Extraction Secret message Embedding Cover hypertextStego hypertext Secret key
16
16 多媒體暨網路安全實驗室 ~ 歡迎加入 ~ Tags text file Secret: 010110… <META capital letters small letters 0101 :the written states 0 1 1 2 3 4 5 6 0110 <body <p<p Information hiding in hypertext
17
17 Secret: 010110… 多媒體暨網路安全實驗室 ~ 歡迎加入 ~ text file <META 1 2 3 4 5 6 <body <p<p capital letters small letters 0101 :the written states Information hiding in hypertext
18
18 Text steganography in chat Shirali-Shahreza, M.H., Shirali-Shahreza, M., “Text Steganography in Chat,” Proceedings of the Third IEEE/IFIP International Conference in Central Asia on Internet the Next Generation of Mobile, Wireless and Optical Communications Networks, Tashkent, Uzbekistan, Sep. 2007, pp. 1-5.
19
19 Text steganography in chat SMS-Texting
20
20 Text steganography in chat Usual abbreviated words univ. university PC Personal Computer M.S. master of science UN United Nations Dr doctor
21
21 Text steganography in chat SMS list + abbreviated words list Check list full formabbreviated form0 full form, 1 abbreviated form
22
22 Text steganography in chat Embedding : “Please call me when you feel upset.” secret “10” “Please CM when you feel upset.” Extracting : “Please CM when you feel upset.” secret bits “10” Check list
23
23 Emoticon-based steganography in chat Emoticon-based Text Steganography in Chat
24
24 Phase1: Classify the emoticons by their meaning Emoticon-based steganography in chat
25
25 Example: N = 16 hide log 2 N = 4 bits per emoticon sender uses second symbol receiver can extract 4 bits “0001” Emoticon-based steganography in chat
26
26 Phase2: emoticon || sentence : secret = 0 sentence || emoticon : secret = 1 I lost my bag secret = 0 secret = 1 Emoticon-based steganography in chat
27
27 Phase3: emoticon, sentence : secret = 0 emoticon, sentence : secret = 1, I lost my bag secret = 0 secret = 1 I lost my bag Emoticon-based steganography in chat
28
28 Zhihui wants to send secret bits “11100000111” to Alan3c. 1110 001||1||1 Phase1 Phase2 Alan3c says: Just a kidding, you are the nicest guy I know in the world. Zhihui says: 00 Phase3 Alan3c says : You are a bad student! Zhihui says: Emoticon-based steganography in chat
29
29 Future Research Direction Chinese text steganography 壞的毛病 壞毛病 山東的蘋果 山東蘋果 我的媽媽 我媽媽 主要的問題 主要問題 另外的一件事 另外一件事 其他的問題 其他問題 北京的大學 北京大學
30
30
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.