Recent Developments on Multimedia and Secure Networking Technologies - PowerPoint PPT Presentation

1 / 46
About This Presentation
Title:

Recent Developments on Multimedia and Secure Networking Technologies

Description:

Watermarking Image authentication Secret ... – PowerPoint PPT presentation

Number of Views:246
Avg rating:3.0/5.0
Slides: 47
Provided by: YungCh7
Category:

less

Transcript and Presenter's Notes

Title: Recent Developments on Multimedia and Secure Networking Technologies


1
???????????
  • ???
  • ???? ????
  • ???? ????
  • ???? ????

2
  1. Watermarking
  2. Image authentication
  3. Secret sharing
  4. Visual cryptography
  5. Steganography

3
Watermarking
  • Visible watermarking
  • Easy to embed
  • Clear to see watermark

4
Watermarking (Cont.)
  • Invisible watermarking
  • Requirements
  • Good visual quality of watermarked image
  • Robustness

Watermarking
Watermarked image
Original image
Watermark
5
Image authentication
  • Requirements
  • Detect the tampered area
  • Try to restore the tampered area

Tampered image
Detected image
Restored image
Image
6
Secret sharing
  • Classification
  • Meaningless shadows
  • Meaningful shadows

7
Secret sharing (Cont.)
Sharing
Shadow size 256 ? 256
Image size 512 ? 512
Reconstructing
(2,4)-threshold secret sharing scheme
PSNR24 dB
8
Secret sharing (Cont.)
Reconstructing
Hiding
Stego-image
Reconstructed secret image
Secret image
Stego-image
(2, n)-threshold secret sharing scheme
Stego-image
9
Visual cryptography
Stacking
Shadow 1
Shadow 2
Secret
10
Visual cryptography (Cont.)
shadow1
cover image1
stego image1
cover image2
stego image2
shadow2
11
Visual cryptography (Cont.)
stego image1
stego image2
stacked result
12
Visual cryptography (Cont.)
shadow1
cover image1
stego image1
cover image2
stego image2
shadow2
13
Visual cryptography (Cont.)
stego image1
stego image2
stacked result
14
Visual cryptography (Cont.)-Meaningful and
Progressive
  • Meaningful shares friendly content
  • Progressive visual cryptography
  • Improve the stacked result progressively

15
Visual cryptography (Cont.) -Progressive Visual
Cryptography (t, 6)
(2, 6)
(3, 6)
(4, 6)
(5, 6)
(6, 6)
16
Visual cryptography (Cont.) -Experimental Results
(2, 6)
(3, 6)
(4, 6)
(5, 6)
(6, 6)
17
Visual cryptography (Cont.)
Stacking
Shadow 1
Shadow 2
Secret
18
18
Visual cryptography (Cont.)-Authentication
Participant 1
Share 1
Recovered secret image
Participant 2
Share 2
19
Visual cryptography (Cont.)
Share 1
Share 2
20
Visual cryptography (Cont.)
Tampered share 1
Share 2
21
Visual cryptography (Cont.)
Rotating 40o
Stacking
Stacking
Share 2
Share 1
Secret 1 VISUAL
Secret 2 SECRET
22
Steganography
  • The targets
  • Frequency domain (e.g. DCT, DWT, DFT)
  • Spatial domain (e.g. pixel values)
  • Compression domain (e.g. VQ)
  • Text
  • Restoration
  • Irreversible
  • Reversible

23
Steganography (Cont.)
  • Image

24
Steganography (Cont.) -Kim et al.s Method

9 0 1 2 3 4 5 6 7 8 0
8 6 7 8 0 1 2 3 4 5 6
7 3 4 5 6 7 8 0 1 2 3
6 0 1 2 3 4 5 6 7 8 0
5 6 7 8 0 1 2 3 4 5 6
4 3 4 5 6 7 8 0 1 2 3
3 0 1 2 3 4 5 6 7 8 0
2 6 7 8 0 1 2 3 4 5 6
1 3 4 5 6 7 8 0 1 2 3
0 0 1 2 3 4 5 6 7 8 0
0 1 2 3 4 5 6 7 8 9

25
Kim et al.s Method (Embedding)
5 8 8 3 4 8 7 6
8 6 7 7 8 3 1 2
6 3 5 6 8 2 1 5
6 5 4 7 3 5 2 8
6 5 4 3 2 1 5 1
1 2 5 1 3 4 1 6
8 2 3 3 1 6 4 5
1 8 7 5 3 2 6 3

9 0 1 2 3 4 5 6 7 8 0
8 6 7 8 0 1 2 3 4 5 6
7 3 4 5 6 7 8 0 1 2 3
6 0 1 2 3 4 5 6 7 8 0
5 6 7 8 0 1 2 3 4 5 6
4 3 4 5 6 7 8 0 1 2 3
3 0 1 2 3 4 5 6 7 8 0
2 6 7 8 0 1 2 3 4 5 6
1 3 4 5 6 7 8 0 1 2 3
0 0 1 2 3 4 5 6 7 8 0
0 1 2 3 4 5 6 7 8 9
Cover Image
Cover Image
6 9 7 3 9 8 7 6
8 9 7 7 9 3 1 2
6 3 5 6 8 2 1 5
6 5 4 7 9 5 2 8
6 5 9 3 2 1 5 1
1 2 5 1 3 4 1 6
8 2 9 3 9 6 4 5
1 8 7 5 3 2 6 9

Stego Image
Stego Image
26
Kim et al.s Method (Embedding)
6 9 7 3 9 8 7 6
8 9 7 7 9 3 1 2
6 3 5 6 8 2 1 5
6 5 4 7 9 5 2 8
6 5 9 3 2 1 5 1
1 2 5 1 3 4 1 6
8 2 9 3 9 6 4 5
1 8 7 5 3 2 6 9

9 0 1 2 3 4 5 6 7 8 0
8 6 7 8 0 1 2 3 4 5 6
7 3 4 5 6 7 8 0 1 2 3
6 0 1 2 3 4 5 6 7 8 0
5 6 7 8 0 1 2 3 4 5 6
4 3 4 5 6 7 8 0 1 2 3
3 0 1 2 3 4 5 6 7 8 0
2 6 7 8 0 1 2 3 4 5 6
1 3 4 5 6 7 8 0 1 2 3
0 0 1 2 3 4 5 6 7 8 0
0 1 2 3 4 5 6 7 8 9
Stego Image
Stego Image

27
Zhang and Wangs Method(Embedding)
8 7 9 4
79 54 55 11
20 21 12 24
12 10 10 9
Secret data 1000 1011
p2
255
0
1
2
3
4
0
1
2
3
4
0
1
10002 1 35














11
2
3
4
0
1
2
3
4
0
1
2
3
2

10
0
1
2
3
4
0
1
2
3
4
0
1
0
Cover image

9
3
4
0
1
2
3
4
0
1
2
3
4
3

8
1
2
3
4
0
1
2
3
4
0
1
2
1

7
4
0
1
2
3
4
0
1
2
3
4
0
4

6
2
3
4
0
1
2
3
4
0
1
2
3
2

7 7 10 4



5
0
1
2
3
4
0
1
2
3
4
0
1
0

4
3
4
0
1
2
3
4
0
1
2
3
4
3

3
1
2
3
4
0
1
2
3
4
0
1
2
1

2
4
0
1
2
3
4
0
1
2
3
4
0
4

1
2
3
4
0
1
2
3
4
0
1
2
3
2

0
1
2
3
4
0
0
1
2
3
4
0
1
0
Stego image
p1
0
1
2
3
4
5
6
7
8
9
10
11
255

Magic Matrix
28
Zhang and Wangs Method (Extracting)
p2
7 7 10 4



255
0
1
2
3
4
0
1
2
3
4
0
1














11
2
3
4
0
1
2
3
4
0
1
2
3
2

10
0
1
2
3
4
0
1
2
3
4
0
1
0

9
3
4
0
1
2
3
4
0
1
2
3
4
3

8
1
2
3
4
0
1
2
3
4
0
1
2
1
Stego image

7
4
0
1
2
3
4
0
1
2
3
4
0
4

6
2
3
4
0
1
2
3
4
0
1
2
3
2

5
0
1
2
3
4
0
1
2
3
4
0
1
0

4
3
4
0
1
2
3
4
0
1
2
3
4
3

3
1
2
3
4
0
1
2
3
4
0
1
2
1

2
4
0
1
2
3
4
0
1
2
3
4
0
4

1 35
1
2
3
4
0
1
2
3
4
0
1
2
3
2

0
1
2
3
4
0
0
1
2
3
4
0
1
0
p1
0
1
2
3
4
5
6
7
8
9
10
11
255

Magic Matrix
Extracted secret data 10002
29
Sudoku
  • A logic-based number placement puzzle

30
Sudoku (Cont.)
  • A Sudoku grid contains nine 3 3 matrices, each
    contains different digits from 1 to 9.
  • Each row and each column of a Sudoku grid also
    contain different digits from 1 to 9.
  • Property

Possible solutions 6,670,903,752,021,072,936,960
(i.e. 6.6711021)
31
Data Hiding Using Sudoku
- 1
Reference Matrix M
32
Data Hiding Using Sudoku (Embedding) (Cont.)
8 7 11 12
79 54 55 11
20 21 12 24
12 10 10 9
Secret data 011 001 10
279
Cover Image
min.
d( , ) ((8-8)2(4-7)2)1/23 d( , )
((9-8)2(7-7)2)1/21 d( , )
((6-8)2(8-7)2)1/22.24
9 7



Stego Image
33
Data Hiding Using Sudoku (Embedding) (Cont.)
8 7 11 12
79 54 55 11
20 21 12 24
12 10 10 9
Secret data 011 001 10
279
Cover Image
d( , ) ((11-11)2(15-12)2)1/23 d( , )
((15-11)2(12-12)2)1/24 d( , )
((9-11)2(14-12)2)1/22.83
min.
9 7 9 14



Stego Image
34
Data Hiding Using Sudoku (Extracting) (Cont.)
9 7 9 14



Stego Image
Extracted data 279 011 0012
35
Experimental Results
36
Steganography (Cont.)
  • Text
  • ???? ???
  • ????? ????
  • ???? ???
  • ????? ????
  • ?????? ?????
  • ????? ????
  • ????? ????
  • Video
  • Sound

37
Synonym substitution
0 wonderful 1 decent 2 fine 3 great 4
nice
Taichung is a
0 city 1 town
little
Secret message (3)5(1)2
Taichung is a great little town
37
38
Information hiding in hypertext
Secret message
Embedding
Secret key
Extraction
Secret message
38
39
Information hiding in hypertext
Secret 010110
0
Tags
text file
lthtmlgt ltheadgt ltmeta http-equiv"Content-Type"
content"text/html charsetbig5"gt lttitlegt
??????????? lt/titlegt lt/headgt ltbody
bgcolor"D27D1O"gt ltp align"center"gtltimg
border"0" src"msn.jpg" width"338"
height"345"gtlt/pgt ltp align"center"gtltfont
face"???" color"f4efe8" size"7"gt????lt/fontgtlt
/pgt lt/bodygt lt/htmlgt
ltMETA
39
40
Information hiding in hypertext
text file
lthtmlgt ltheadgt ltmeta http-equiv"Content-Type"
content"text/html charsetbig5"gt lttitlegt
??????????? lt/titlegt lt/headgt ltbody
bgcolor"D27D1O"gt ltp align"center"gtltimg
border"0" src"msn.jpg" width"338"
height"345"gtlt/pgt ltp align"center"gtltfont
face"???" color"f4efe8" size"7"gt????lt/fontgtlt
/pgt lt/bodygt lt/htmlgt
ltHTMLgt
ltMETA
ltbody
ltp
lt/HTMLgt
Secret 010110
40
41
Text steganography in chat
  • Shirali-Shahreza, M.H., Shirali-Shahreza,
    M., Text Steganography in Chat, Proceedings of
    the Third IEEE/IFIP International Conference in
    Central Asia on Internet the Next Generation of
    Mobile, Wireless and Optical Communications
    Networks, Tashkent, Uzbekistan, Sep. 2007, pp.
    1-5.

41
42
Text steganography in chat
SMS-Texting
42
43
Text steganography in chat
  • Usual abbreviated words
  • univ. ? university
  • PC ? Personal Computer
  • M.S. ? master of science
  • UN ? United Nations
  • Dr ? doctor

43
44
Text steganography in chat
  • SMS list abbreviated words list
  • ? Check list
  • 0 ? full form, 1 ? abbreviated form

44
45
Text steganography in chat
  • Embedding
  • Please call me when you
    feel upset.

  • secret 10
  • Please CM when you
    feel upset.
  • Extracting
  • Please CM when you feel
    upset.

Check list
secret bits 10
45
46
Thanks for your listening
Write a Comment
User Comments (0)
About PowerShow.com