Top Banner
Steganography with Public-Key Cryptography for Videoconference XXX CNMAC - Set/2007 Fábio Borges de Oliveira Steganography with Public-Key Cryptography for Videoconference – p.1/26
34

Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

May 07, 2018

Download

Documents

vudiep
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Steganography with Public-KeyCryptography for Videoconference

XXX CNMAC - Set/2007

Fábio Borges de Oliveira

Steganography with Public-Key Cryptography for Videoconference – p.1/26

Page 2: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

SteganographySource:

Steganography:

Steganography with Public-Key Cryptography for Videoconference – p.2/26

Page 3: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Why do we need to use it?

1. The enemy could interrupt the message

2. There is the Shor’s quantum algorithm thatcan factor huge numbers quickly O(n3)

3. Someone might find a way to break thecryptosystem

Steganography with Public-Key Cryptography for Videoconference – p.3/26

Page 4: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Symmetric

Ana BethEdna

Secure Channel

Steganography with Public-Key Cryptography for Videoconference – p.4/26

Page 5: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Asymmetric

EdnaAna Beth

Steganography with Public-Key Cryptography for Videoconference – p.5/26

Page 6: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

RSA

ϕ = ϕ(pq) = (p − 1)(q − 1)

Choose a so that gcd(a, ϕ) = 1

ab ≡ 1 mod ϕ.

xab ≡ x mod pq ∀x ∈ Z.

Steganography with Public-Key Cryptography for Videoconference – p.6/26

Page 7: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Diffie-HellmanAlice chooses k with gcd(k, pq) = 1 and sendsthe values of k and pq. Then, Alice chooses a r,computes kr and sends the result to Bob whilekeeping r secret. At the same moment Bobchooses s, computes ks and sends the result toAlice while keeping s secret.So, both form the candidate exponent

a = (kr)s = (ks)r.

To verify if a is a valid RSA exponent, Alicecomputes gcd(a, ϕ) = 1. If a is not valid theyrepeat the process.

Steganography with Public-Key Cryptography for Videoconference – p.7/26

Page 8: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Key agreement

Diffie-Hellman

ElGamal

Menezes-VanstoneDiscrete Logarithmic Problem

Steganography with Public-Key Cryptography for Videoconference – p.8/26

Page 9: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Steganography and Public-key

Steganography using public-key cryptography

cannot use a static media, like an image, but it

requires a data stream, like a dialog.

Steganography with Public-Key Cryptography for Videoconference – p.9/26

Page 10: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Videoconference

We have the option to use the sound or thevideo

We chose the ITU-T H263 - video codecprotocol

An H263 video stream contains I-frame,P-frame and B-frame

Hiding in a sequence of JPEG

Steganography with Public-Key Cryptography for Videoconference – p.10/26

Page 11: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Spatial domain

For every 8 bits.

Steganography with Public-Key Cryptography for Videoconference – p.11/26

Page 12: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Spatial domain

Bit position: 12345678

Steganography with Public-Key Cryptography for Videoconference – p.11/26

Page 13: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Spatial domain

Bit position: 12345678

Steganography with Public-Key Cryptography for Videoconference – p.11/26

Page 14: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Spatial domain

Bit position: 12345678

Steganography with Public-Key Cryptography for Videoconference – p.11/26

Page 15: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Spatial domain

Bit position: 12345678

Steganography with Public-Key Cryptography for Videoconference – p.11/26

Page 16: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Spatial domain

Bit position: 12345678

Steganography with Public-Key Cryptography for Videoconference – p.11/26

Page 17: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Spatial domain

Bit position: 12345678

Steganography with Public-Key Cryptography for Videoconference – p.11/26

Page 18: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Spatial domain

Bit position: 12345678

Steganography with Public-Key Cryptography for Videoconference – p.11/26

Page 19: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Spatial domain

Bit position: 12345678

Steganography with Public-Key Cryptography for Videoconference – p.11/26

Page 20: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Visual attack

Steganography with Public-Key Cryptography for Videoconference – p.12/26

Page 21: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Steganographic scheme in JPEG

Steganography

Block 8

x8

JPEG

Entropy EncoderQuantizerDCT

DequantizerInverse DCT Entropy Decoder

Image

Input

Output

Steganography with Public-Key Cryptography for Videoconference – p.13/26

Page 22: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Discrete Cosine Transform (DCT)

F [m,n] =C(m)

2

C(n)

2

7∑

x=0

7∑

y=0

P [x, y] cos α cos β,

α =(2x + 1)mπ

16,

β =(2y + 1)nπ

16

C(k) =

{

1√2

for k = 0,

1 for all other values of k.

Steganography with Public-Key Cryptography for Videoconference – p.14/26

Page 23: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

The quantization

F ′[m,n] =F [m,n]

Q[m,n]

Steganography with Public-Key Cryptography for Videoconference – p.15/26

Page 24: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Pixel matrix P

P =

0 0 0 200 200 0 0 0

0 0 200 200 200 200 0 0

0 200 200 200 200 200 200 0

200 200 200 200 200 200 200 200

200 200 200 200 200 200 200 200

0 200 200 200 200 200 200 0

0 0 200 200 200 200 0 0

0 0 0 200 200 0 0 0

Steganography with Public-Key Cryptography for Videoconference – p.16/26

Page 25: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Quantization matrix Q

Q =

6 11 16 21 26 31 36 41

11 16 21 26 31 36 41 46

16 21 26 31 36 41 46 51

21 26 31 36 41 46 51 56

26 31 36 41 46 51 56 61

31 36 41 46 51 56 61 66

36 41 46 51 56 61 66 71

41 46 51 56 61 66 71 76

Steganography with Public-Key Cryptography for Videoconference – p.17/26

Page 26: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Consider the matrices

A that has not suffered steganography

B that has changed in every second LSB ofcoefficients AC, whose modulus is greaterthan two

C that has changed only the second LSB ofF ′[0, 2]

D that has changed the LSB of AC, whosemodulus is greater than one

Steganography with Public-Key Cryptography for Videoconference – p.18/26

Page 27: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Euclidian distance

|P − A| = 35.60898762

|P − B| = 200.2698180

|P − C| = 48.98979486

|P − D| = 106.5833008

Steganography with Public-Key Cryptography for Videoconference – p.19/26

Page 28: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Matrix A without steganography

Steganography with Public-Key Cryptography for Videoconference – p.20/26

Page 29: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Matrix B with aggressive settings

Steganography with Public-Key Cryptography for Videoconference – p.21/26

Page 30: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Matrix C no aggressive settings

Steganography with Public-Key Cryptography for Videoconference – p.22/26

Page 31: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Matrix D with aggressive settings

Steganography with Public-Key Cryptography for Videoconference – p.23/26

Page 32: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

The protocol

1. the position of the sequence of bits previouslyagreement to establish communication in avideoconference,

2. steganography more secure,

3. Diffie-Hellman key agreement,

4. RSA to exchange an irrational numbergenerator,

5. strong cryptography based on irrationalnumbers.

Steganography with Public-Key Cryptography for Videoconference – p.24/26

Page 33: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Conclusion

We have introduced a model forsteganocryptography

First of all we revised the RSA, Diffie-Hellmanand JPEG’s compression

Our contribution is showing the viability toembed in others LSB

It brings an extra-layer of security

Steganography with Public-Key Cryptography for Videoconference – p.25/26

Page 34: Steganography with Public-Key Cryptography for Videoconferencelncc.br/~borges/doc/Steganography with Public-Key... · Steganography with Public-Key Cryptography for Videoconference

Last Slide

Thank you.

Any suggestions will be welcome.

www.lncc.br/borgesFábio Borges de Oliveira

Steganography with Public-Key Cryptography for Videoconference – p.26/26