110 likes | 254 Views
Hiding Binary Images behind Noise with Authentication Capability: A New Approach to Covert Communication. Speaker: Meng -Jing Tsai Date: 2012.09.10 Authors: Chih-Hsuan Tzeng , Wen -Hsiang Tsai
E N D
Hiding Binary Images behind Noise with Authentication Capability: A New Approachto Covert Communication Speaker: Meng-Jing Tsai Date: 2012.09.10 Authors: Chih-HsuanTzeng, Wen-Hsiang Tsai Source: Proceedings of IEEE 37th Annual 2003 International Carnahan Conference on Security Technology, Oct. 2003, pp. 232-236
Outline • Introductions • Proposed Method • Experimental Result • Conclusions
Introductions • Covert communication • There were only a few studies in the past about hiding information behind binary images. • difficult • limited data embedding
Proposed Method Hiding g2 Ki g1 seed K K1, K2, K3, … , Ki secret image block noise block
Proposed Method Hiding g3 Ki 1 0 0 1 g4 Xi 1 authentication XOR secret secret image block noise block Authentication bits 1101110
Proposed Method Hiding secret image block cover resulting
Proposed Method Recovering g3 Ki g1 seed K K1, K2, K3, … , Ki g4 Xi authentication secret Authentication bits 1101110
Proposed Method Recovering g2 Ki XOR noise block cover resulting secret image block
Experimental Result Secret binary image 1024*768 Cover noise image resulting 1152*864 K=1234
Conclusions A larger data-embedding capacity can be provided by the cover noise image. The proposed method ensures full recoverability of hidden secret data from cover noise images.