420 likes | 557 Views
Damageless Information Hiding Technique using Neural Network. Keio University Graduate School of Media and Governance Kensuke Naoe. Abstract. An information hiding technique without embedding any data to target content Pattern recognition model Neural network as classifier (extraction key)
E N D
Damageless Information Hiding Technique using Neural Network Keio University Graduate School of Media and Governance Kensuke Naoe
Abstract • An information hiding technique without embedding any data to target content • Pattern recognition model • Neural network as classifier (extraction key) • Advantage and disadvantage
Outline • Background • Motivation • Current Problem • Proposed Method • Experiment results • Future Work • Coclusion
Background • Emergence of the Internet • Contents are widely distributed • Information hiding provides reliability • Digital watermarking for Digital Rights Management • Steganography for covert channel
Motivation and current problem • Use one information hiding algorithm with another to strengthen the security of the content • Digital watermarking • Steganography • FIngerprinting • There are many great information hiding algorithm but have difficulties to collaborate • possibility of obstructing previously embedded data • Applying another information hiding algorithm might result in recalculation of fingerprint for the content
Research Objective • To hide or to relate certain information without embedding any information to the target content • Ability to collaborate with another information hiding algorithm to strengthen the security
Proposed Method • Approach • Embed model to pattern recognition model • Neural network as classifier (extraction key) • Only proper extraction key will lead to proper hidden signal
Why use neural network? • Has abilities of • Tolerance to noise • Error correction and complementation • Additional learning characteristic • Multi-layered Perceptron Model • Backpropagation Learning (Supervised Learning)
Proposed Method (Embedding) 1.Frequency Transformation of content Coordinate of feature subblocks (extraction key) 2.Selection of feature subblock 3.Use feature values as input value for neural network Hidden signal as teacher signal 4. Generation of classifier (extraction key)
Proposed Method (Extraction) 1.Frequency Transformation of content Coordinate of feature subblocks (encryption key) 2.Selection of feature subblock 3.Use feature values as input value for neural network Hidden signal as output signal 4. Applying the classifier (encryption key)
What is neural network? • neuron(nervous cell) • It only has a function of receiving a signal and dispatching signal to connected neuron • When organically connected, it has ability to process a complicated task • A network built with these neurons are called neural network • Multi layered perceptron model • Often used for non-linear pattern classifier
Calculation of network • Input value of neuron • Sum product of network weight and output values from previous layer yj j xj wNj w1j wij y1 yN yi
Generating classifier (extraction key) 1.Frequency Transformation of content Coordinate of feature subblocks (encryption key) 2.Selection of feature subblock 3.Use feature values as input value for neural network Hidden signal as teacher signal 4. Generation of classifier (encryption key)
Further experiments • Can proposed method extract from high pass filtered image or jpeg image ?
Future work • Because it relies on the position of feature sub block, it is weak to geometric attacks • Rotation, expansion, shrinking • Key sharing has to rely on another security technology
Conclusion • Information hiding technique without embedding any data into target content by using neural network • Ability to collaborate with other information hiding algorithm
Output layer Hidden layer Input layer Three layered perceptron model • Three layer model • Feed forward model • Input function • Sigmoid function • Backpropagation learning
x y Sigmoid function • Input function for multi-layered perceptron model • sigmoid = look like letter of S
8 8 Selection of feature values Has DC value and various values of AC (low, middle, high) Feature subblock