Information Hiding in Email Services Based on Confused Document Encrypting Schemes
Author: Wei-Shyun Pan Po-Kang Chen Quincy Wu
Information Hiding in Email Services Based on Confused Document - - PowerPoint PPT Presentation
Information Hiding in Email Services Based on Confused Document Encrypting Schemes Author Wei-Shyun Pan Po-Kang Chen Quincy Wu Outline Introduction Related works A Confused Document Encrypting Schemes and its
Author: Wei-Shyun Pan Po-Kang Chen Quincy Wu
2
– A Confused Document Encrypting Schemes and its Implementation (Lin & Lee ,1998) – Information hiding
– Concept – CDES module – Compression module – Encryption module – Image hiding module
– Environment – Experiment
3
4
5
6
7
8
– Cheating texts – Plaintext – Character position table (CPT) – Plaintext Index file (PIF) – Key
9
Transmitting many cheating text files
Plaintext index file (PIF)
A Confused Document Encrypting Scheme and its Implementation (Lin & Lee ,1998)
From : weishin.pan@gmail.com To : magicpanx@gmail.com Subject: Hello ! Body--------------------------------------------------------------------------- Confused Document Encrypting Scheme Attachments----------------------------------------------------------------- (1) ID-0005.txt (2) ID-0019.txt (3) ID-5597.txt (4) ID-2468.txt (5) ID-9870.txt (5) Encrypted plaintext index file + (Encrypted-ID 0019)
An encrypted file Eavesdropper
10 Does the cheating text contains all of the different characters in the plaintext? Generate the character’s position table (CPT) of the cheating text Input cheating text Input plaintext Encrypt the ID Generate plaintext index file (PIF) by random Randomly generate an ID for the cheating text Compress the PIF Encrypt the compressed PIF Put the encrypted ID in the head of the encrypted and compressed PIF Send out the compressed and encrypted PIF and the cheating text involving an ID
Receiver Sender
2-nd key 1-st key No Yes
(CDES,Lin&Lee,1998 [1])
11
Decrypt the encrypted ID in the given PIF Does find out the corresponding cheating text? Decrypt the given PIF Generate the character’s position table (CPT)
Decompress the given PIF Use the CPT and the PIF to reverse the original plaintext Plaintext output
(CDES,Lin&Lee,1998 [1])
No, wait the correct cheating text to come 2-nd key 1-st key Yes No
12
Plaintext : Cat is my pet. {C, a , t , i, s , m , y , p , e , . , □} Cheating text : Computer security is important. {C, o , m , p, u , t , e , r , s , c , i , y , a , n , . , □} Character Position record C 1
m 3 , 23 p 4 , 24 u 5 , 13 t 6 , 16 , 27 , 30 e 7 , 11 r 8 , 14, 26 s 10 , 20 c 12 i 15 , 19 , 22 y 17 a 28 n 29 . 31 □ 9 , 18 , 21
Table 1. Characters Position Table (CPT)
1 28 6 … … … … Plaintext index file(PIF)
13
14
Cheating text The proposal is based on Confused Document Encrypting Scheme
Do you want to have a coffee with me ?
It looks OK !
Eavesdropper
Sent out via Email PIF We should meet at 9 pm.
15
CDES module Plaintext Cheating text CPT generated PIF generated Compression module Encryption module Compress the PIF Encrypt the compressed PIF Image-Hiding module Hiding the PIF in image
Send out via E-mail
16
17
18
19
20
You’ll remember what you had seen before.
What I’ve seen
Cat Tree Cat 1 Dog 2 Cat Dog Tree 3 Keep in mind (The dictionary)
21
22
(Encryptor) E KEY1 (Decryptor) D KEY2 M = Dk2(C) Hacker C = Ek1(M) M ( Plaintext) = original message C ( Cipher text) = encrypted message Ek (M) = Encryption function Dk (C) = Decryption function Public area Private area
23
24
25
26
Do you want to have a coffee with me ? Do you want to have a coffee with me ? We should meet at 9 pm.
27
Cheating text Plaintext index file embedded
28
Read the plaintext Read the cheating text Generate the CPT of the cheating text Generate the plaintext index file Compress the PIF Encrypt the compressed PIF Hiding the PIF in image Compose a mail to receiver
From : weishin.pan@gmail.com To: magicpanx@gmail.com Subject: Hello ,magicpanx !
Do you want to have a coffee with me? Attached file : ncnu.jpg PIF embedded Cheating text
1-st Key 2-nd Key
29
Read the cheating text Seek PIF from the attach image Decrypt the PIF
2-nd Key 1-st Key
Generate the CPT of the cheating text Decompress the PIF Using the CPT and the PIF to reverse the original plaintext Plaintext output We should meet at 9 pm. Plaintext
From : weishin.pan@gmail.com To: magicpanx@gmail.com Subject: Hello ,magicpanx !
Do you want to have a coffee with me? Attached file : ncnu.jpg PIF embedded Cheating text
30
31
32
and its Implementation”,Computers & Security,Vol. 17, No. 6, pp.543-551, 1998.
System Scheme”, Elsevier Science Ltd, 2001.
confused documents" , Journal of Information Management, Vol.7 (2),2001b, pp. 183-191
encrypting scheme of data hiding”, Technical Report, Department of Information Management, Ta Hwa Institute of Technology, R.O.C.,2002.
Confused Document Encrypting Schemes", International Conference on Multimedia Computing and Information Technology (MCIT 2010) University of Sharjah(UoS), Sharjah, United Arab Emirates (UAE), March 2-4, 2010.