Recent Developments on Multimedia and Secure Networking Technologies

Slides:



Advertisements
Similar presentations
1 影像偽裝術的最新發展 張真誠 逢甲大學 講座教授 中正大學 榮譽教授 清華大學 合聘教授 Watermarking 2. Image authentication 3. Secret sharing 4. Visual cryptography 5. Steganography.
Advertisements

Information Hiding: Watermarking and Steganography
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Digital Watermarking Parag Agarwal
Chapter 21 Distributed System Security Copyright © 2008.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
SPEAKER: HONG-JI WEI DATE: Efficient and Secure Anonymous Authentication Scheme with Roaming Used in Mobile Networks.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Digital Watermarking and Its Applications
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Information Hiding Technology: Current Research and Future Trend
Computer Communication & Networks
Visual Secret Sharing Chair Professor Chin-Chen Chang (張真誠)
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
The Recent Developments in Visual Cryptography
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
A Data Hiding Scheme Based Upon Block Truncation Coding
The Recent Developments in Visual Secret Sharing
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Parag Agarwal Digital Watermarking Parag Agarwal
Embedding Secrets Using Magic Matrices
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Security.
Security and Privacy in Pervasive/Ubiquitous Computing Systems
The New Developments in Visual Cryptography
Some Novel Steganographic Methods for Digital Images
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Information Steganography Using Magic Matrix
Chair Professor Chin-Chen Chang Feng Chia University
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Hiding Information in VQ Index Tables with Reversibility
Information Hiding and Its Applications
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
Recent Developments on Multimedia and Secure Networking Technologies
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Operating System Concepts
Chair Professor Chin-Chen Chang Feng Chia University
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
De-clustering and Its Application to Steganography
A Data Hiding Scheme Based Upon Block Truncation Coding
Information Hiding Techniques Using Magic Matrix
Privacy Protection for E-Health Systems by
Recent Developments in Information Hiding
Steganographic Systems for Secret Messages
Introduction to Multimedia Security Topics Covered in this Course
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Hiding Information in VQ Index Tables with Reversibility
Presentation transcript:

Recent Developments on Multimedia and Secure Networking Technologies Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University

Multimedia (Watermarking) Classifications: Visible watermarking Invisible watermarking Robust watermarking Semi-fragile watermarking Fragile watermarking

Multimedia (Watermarking) (Cont.) Visible watermarking Easy to embed Clear to see watermark

Multimedia (Watermarking) (Cont.) Invisible watermarking Requirements: Good visual quality of watermarked image Robustness Watermarking Original image Watermarked image Watermark

Multimedia (Image authentication) Requirements: Detect the tampered area Try to restore the tampered area Solutions: Hamming codes Image Tampered image Detected image Restored image

Multimedia (Steganography) Classification: The target of modification Frequency domain (e.g. DCT, DWT, DFT) Spatial domain (e.g. pixel values) Compression domain (e.g. VQ, LAC, SOC) Stego image restoration Irreversible data hiding Reversible data hiding

Multimedia (Steganography) (Cont.) Irreversible data hiding Requirements: High capacity Good visual quality of stego images Solutions: Using Sudoku Using wet paper codes concept Using Hamming codes

Multimedia (Steganography) (Cont.) Reversible Requirements: Fully reconstructing cover image Good visual quality of stego image High capacity Solutions: Data hiding in VQ indices Data hiding in LAC codes Data hiding in SOC codes …

Multimedia (Secret sharing) Classification: Meaningless shadows Meaningful shadows Requirements: Unexpected user can not see the secret image Good visual quality of reconstructed secret image

Multimedia (Secret sharing) (Cont.) Shadow size: 256  256 Image size: 512  512 Reconstructing (2,4)-threshold secret sharing scheme PSNR=24 dB

Multimedia (Secret sharing) (Cont.) Meaningful shadows Requirements: Good visual quality of stego image Secret image extraction and reconstruction Solutions: Applying steganography techniques Applying image authentication mechanisms

Multimedia (Secret sharing) (Cont.) Reconstructing Hiding Stego-image Reconstructed secret image Secret image Stego-image (2, n)-threshold secret sharing scheme Stego-image

Multimedia (Visual cryptography) Requirements: Secret message delivery Unexpected user can not see the message from an individual share Solutions: Using shadow patterns Using meaningful shadow images Using Circle Shares

Multimedia (Visual cryptography) (Cont.) Stacking Shadow 1 Shadow 2 Secret

Multimedia (Visual cryptography) (Cont.) Stacking Shadow 1 Shadow 2 Secret

Multimedia (Visual cryptography) (Cont.) Rotating 40o Stacking Stacking Share 1 Share 2 Secret 1 “VISUAL” Secret 2 “SECRET”

Multimedia (Threshold) Requirements: Segment the objects on image Low computation cost Threshold value T=41 Class 1 Class 2 Original image Segmented image Histogram

Secure Networking Fast Computation Algorithms for Cryptography Requirements: Large number computations Low computation cost Solutions: Fast division algorithm using residue number system (RNS) Fast conversion algorithms in RNS using Aryabhata remainder theorem (ART) Fast RNS modular multiplication and exponentiation algorithms

Secure Networking (Cont.) Secure Communication Secure E-mail protocols Requirements Reduce the computation cost of client devices Achieve perfect forward secrecy Solutions: Using low cost functions (e.g. one-way hash functions)

Secure Networking (Cont.) Anonymity for Roaming Service Requirements: Avoid possible attacks (e.g. replay attacks, forgery attacks, known-key attacks) Achieve the property of anonymity Solutions: Using low cost functions Using smart card Using nonce to replace timestamp

Secure Networking (Cont.) Authentication in WLAN Requirements: Prevent impersonation attacks Protect personal privacy Solutions: Using mutual authentication Feasible computational complexity Using session keys

Secure Networking (Cont.) Key Exchange Remote Server IC Card Issuing Center Authentication Center (AC) 2. Service request 3. Authentication and key exchange 1. Issue an IC card Users

Secure Networking (Cont.) Requirements: Freely choose identity and password Password modification Mutual authentication Common session key distribution Reduce computation cost

Secure Networking (Cont.) E-commerce Application Electronic check Payer’s identity appending E-checks generation Payer and payee verification E-traveler’s check Unique identity for the e-traveler’s check E-traveler’s check can only be generated by check –issuing bank or an authorized organization