YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Steganography with Public-KeyCryptography for Videoconference

XXX CNMAC - Set/2007

Fábio Borges de Oliveira

Steganography with Public-Key Cryptography for Videoconference – p.1/26

Page 2: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

SteganographySource:

Steganography:

Steganography with Public-Key Cryptography for Videoconference – p.2/26

Page 3: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Why do we need to use it?

1. The enemy could interrupt the message

2. There is the Shor’s quantum algorithm thatcan factor huge numbers quickly O(n3)

3. Someone might find a way to break thecryptosystem

Steganography with Public-Key Cryptography for Videoconference – p.3/26

Page 4: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Symmetric

Ana BethEdna

Secure Channel

Steganography with Public-Key Cryptography for Videoconference – p.4/26

Page 5: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Asymmetric

EdnaAna Beth

Steganography with Public-Key Cryptography for Videoconference – p.5/26

Page 6: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

RSA

ϕ = ϕ(pq) = (p − 1)(q − 1)

Choose a so that gcd(a, ϕ) = 1

ab ≡ 1 mod ϕ.

xab ≡ x mod pq ∀x ∈ Z.

Steganography with Public-Key Cryptography for Videoconference – p.6/26

Page 7: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Diffie-HellmanAlice chooses k with gcd(k, pq) = 1 and sendsthe values of k and pq. Then, Alice chooses a r,computes kr and sends the result to Bob whilekeeping r secret. At the same moment Bobchooses s, computes ks and sends the result toAlice while keeping s secret.So, both form the candidate exponent

a = (kr)s = (ks)r.

To verify if a is a valid RSA exponent, Alicecomputes gcd(a, ϕ) = 1. If a is not valid theyrepeat the process.

Steganography with Public-Key Cryptography for Videoconference – p.7/26

Page 8: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Key agreement

Diffie-Hellman

ElGamal

Menezes-VanstoneDiscrete Logarithmic Problem

Steganography with Public-Key Cryptography for Videoconference – p.8/26

Page 9: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Steganography and Public-key

Steganography using public-key cryptography

cannot use a static media, like an image, but it

requires a data stream, like a dialog.

Steganography with Public-Key Cryptography for Videoconference – p.9/26

Page 10: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Videoconference

We have the option to use the sound or thevideo

We chose the ITU-T H263 - video codecprotocol

An H263 video stream contains I-frame,P-frame and B-frame

Hiding in a sequence of JPEG

Steganography with Public-Key Cryptography for Videoconference – p.10/26

Page 11: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Spatial domain

For every 8 bits.

Steganography with Public-Key Cryptography for Videoconference – p.11/26

Page 12: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Spatial domain

Bit position: 12345678

Steganography with Public-Key Cryptography for Videoconference – p.11/26

Page 13: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Spatial domain

Bit position: 12345678

Steganography with Public-Key Cryptography for Videoconference – p.11/26

Page 14: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Spatial domain

Bit position: 12345678

Steganography with Public-Key Cryptography for Videoconference – p.11/26

Page 15: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Spatial domain

Bit position: 12345678

Steganography with Public-Key Cryptography for Videoconference – p.11/26

Page 16: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Spatial domain

Bit position: 12345678

Steganography with Public-Key Cryptography for Videoconference – p.11/26

Page 17: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Spatial domain

Bit position: 12345678

Steganography with Public-Key Cryptography for Videoconference – p.11/26

Page 18: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Spatial domain

Bit position: 12345678

Steganography with Public-Key Cryptography for Videoconference – p.11/26

Page 19: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Spatial domain

Bit position: 12345678

Steganography with Public-Key Cryptography for Videoconference – p.11/26

Page 20: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Visual attack

Steganography with Public-Key Cryptography for Videoconference – p.12/26

Page 21: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Steganographic scheme in JPEG

Steganography

Block 8

x8

JPEG

Entropy EncoderQuantizerDCT

DequantizerInverse DCT Entropy Decoder

Image

Input

Output

Steganography with Public-Key Cryptography for Videoconference – p.13/26

Page 22: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Discrete Cosine Transform (DCT)

F [m,n] =C(m)

2

C(n)

2

7∑

x=0

7∑

y=0

P [x, y] cos α cos β,

α =(2x + 1)mπ

16,

β =(2y + 1)nπ

16

C(k) =

{

1√2

for k = 0,

1 for all other values of k.

Steganography with Public-Key Cryptography for Videoconference – p.14/26

Page 23: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

The quantization

F ′[m,n] =F [m,n]

Q[m,n]

Steganography with Public-Key Cryptography for Videoconference – p.15/26

Page 24: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Pixel matrix P

P =

0 0 0 200 200 0 0 0

0 0 200 200 200 200 0 0

0 200 200 200 200 200 200 0

200 200 200 200 200 200 200 200

200 200 200 200 200 200 200 200

0 200 200 200 200 200 200 0

0 0 200 200 200 200 0 0

0 0 0 200 200 0 0 0

Steganography with Public-Key Cryptography for Videoconference – p.16/26

Page 25: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Quantization matrix Q

Q =

6 11 16 21 26 31 36 41

11 16 21 26 31 36 41 46

16 21 26 31 36 41 46 51

21 26 31 36 41 46 51 56

26 31 36 41 46 51 56 61

31 36 41 46 51 56 61 66

36 41 46 51 56 61 66 71

41 46 51 56 61 66 71 76

Steganography with Public-Key Cryptography for Videoconference – p.17/26

Page 26: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Consider the matrices

A that has not suffered steganography

B that has changed in every second LSB ofcoefficients AC, whose modulus is greaterthan two

C that has changed only the second LSB ofF ′[0, 2]

D that has changed the LSB of AC, whosemodulus is greater than one

Steganography with Public-Key Cryptography for Videoconference – p.18/26

Page 27: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Euclidian distance

|P − A| = 35.60898762

|P − B| = 200.2698180

|P − C| = 48.98979486

|P − D| = 106.5833008

Steganography with Public-Key Cryptography for Videoconference – p.19/26

Page 28: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Matrix A without steganography

Steganography with Public-Key Cryptography for Videoconference – p.20/26

Page 29: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Matrix B with aggressive settings

Steganography with Public-Key Cryptography for Videoconference – p.21/26

Page 30: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Matrix C no aggressive settings

Steganography with Public-Key Cryptography for Videoconference – p.22/26

Page 31: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Matrix D with aggressive settings

Steganography with Public-Key Cryptography for Videoconference – p.23/26

Page 32: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

The protocol

1. the position of the sequence of bits previouslyagreement to establish communication in avideoconference,

2. steganography more secure,

3. Diffie-Hellman key agreement,

4. RSA to exchange an irrational numbergenerator,

5. strong cryptography based on irrationalnumbers.

Steganography with Public-Key Cryptography for Videoconference – p.24/26

Page 33: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Conclusion

We have introduced a model forsteganocryptography

First of all we revised the RSA, Diffie-Hellmanand JPEG’s compression

Our contribution is showing the viability toembed in others LSB

It brings an extra-layer of security

Steganography with Public-Key Cryptography for Videoconference – p.25/26

Page 34: Steganography with Public-Key Cryptography for …borges/doc/Steganography with Public...Steganography using public-key cryptography cannot use a static media, like an image, but it

Last Slide

Thank you.

Any suggestions will be welcome.

www.lncc.br/borgesFábio Borges de Oliveira

Steganography with Public-Key Cryptography for Videoconference – p.26/26


Related Documents