information hiding in email services based on confused
play

Information Hiding in Email Services Based on Confused Document - PowerPoint PPT Presentation

Information Hiding in Email Services Based on Confused Document Encrypting Schemes Author Wei-Shyun Pan Po-Kang Chen Quincy Wu Outline Introduction Related works A Confused Document Encrypting Schemes and its


  1. Information Hiding in Email Services Based on Confused Document Encrypting Schemes Author : Wei-Shyun Pan Po-Kang Chen Quincy Wu

  2. Outline • Introduction • Related works – A Confused Document Encrypting Schemes and its Implementation (Lin & Lee ,1998) – Information hiding • System model – Concept – CDES module – Compression module – Encryption module – Image hiding module • Implementation – Environment – Experiment • Conclusion & Future work 2

  3. Introduction • The “ Personal Privacy ” becomes a popular section in information security over Internet. • Information Hiding ( Steganography ) and Cryptography accomplish secret communication between you and me. 3

  4. The Eavesdropper (Nicolaes Maes ,1657) 4

  5. Motivation • Provide a secret communication service for Email over Internet and demonstrate how Email services can be protected in my system • CDES (Confused Document Encrypting Scheme) is a technique for data hiding, which sends a meaningful message to deceive the eavesdropper and increase the security • Add the image hiding technique 5

  6. Related works 6

  7. Information Hiding • Use any media to hide secret information. • the hacker cannot sense something when he intercepts the media, because it is common behavior. Secret information 7

  8. CDES • Confused Document Encrypting Scheme (CDES), Lin& Lee,1998 [1] • Elements of CDES – Cheating texts – Plaintext – Character position table (CPT) – Plaintext Index file (PIF) – Key 8

  9. Plaintext + Transmitting many cheating text files Plaintext index file (PIF) An encrypted file From : weishin.pan@gmail.com To : magicpanx@gmail.com Subject: Hello ! Body--------------------------------------------------------------------------- Confused Document Encrypting Scheme Attachments----------------------------------------------------------------- (1) ID-0005.txt (2) ID-0019.txt (3) ID-5597.txt (4) ID-2468.txt (5) ID-9870.txt (5) Encrypted plaintext index file + (Encrypted-ID 0019) Eavesdropper A Confused Document Encrypting Scheme and its Implementation (Lin & Lee ,1998) 9

  10. Sender Input plaintext Input cheating text No Does the cheating text contains all of the different characters in the plaintext? Sender Yes Generate the character’s position Randomly generate an table (CPT) of the cheating text ID for the cheating text Generate plaintext index file (PIF) by random 2-nd key Compress the PIF Encrypt the ID 1-st key Encrypt the compressed PIF Put the encrypted ID in the head of the encrypted and compressed PIF (CDES,Lin&Lee,1998 [1]) Send out the compressed and encrypted PIF and the cheating text involving an ID 10 Receiver

  11. Decrypt the encrypted ID in the given PIF 2-nd key No, wait the correct cheating text to come Does find out the No corresponding cheating text? Yes 1-st key Receiver Decrypt the given PIF Generate the character’s position table (CPT) of the cheating text Decompress the given PIF Use the CPT and the PIF to (CDES,Lin&Lee,1998 [1]) reverse the original plaintext Plaintext output 11

  12. CPT & PIF Character Position record Input C 1 Plaintext : Cat is my pet. o 2 , 25 {C, a , t , i, s , m , y , p , e , . , □ } m 3 , 23 Cheating text : Computer security is important. p 4 , 24 {C, o , m , p, u , t , e , r , s , c , i , y , a , n , . , □ } u 5 , 13 t 6 , 16 , 27 , 30 e 7 , 11 r 8 , 14, 26 s 10 , 20 Plaintext index file(PIF) c 12 i 15 , 19 , 1 28 6 … … … … 22 y 17 a 28 n 29 . 31 □ 9 , 18 , 21 Table 1. Characters Position Table (CPT) 12

  13. System model 13

  14. Concept Text + photo We should meet at 9 pm. Do you want to have a coffee with me ? Cheating text PIF It looks OK ! Sent out via Email Eavesdropper 14 The proposal is based on Confused Document Encrypting Scheme

  15. System model CDES module Compression module Compress the PIF Plaintext Cheating text CPT generated Encryption module Encrypt the compressed PIF PIF generated Image-Hiding module Hiding the PIF in image Send out via E-mail 15

  16. CDES Module • Sender : – Generate the CPT by the cheating text, and the plaintext will generate PIF by CPT. • Receiver : – Use the CPT and the PIF to reverse the original plaintext. 16

  17. Compression Module • It provides compression/decompression for the plaintext index file(PIF), because the PIF size will be large. • It uses the LZMA algorithm. 17

  18. Data Compression • Reduce the data size. • Decrease transmission time. • Increase security of data. 18

  19. LZMA algorithm • Dictionary coding – Dictionary size increased → Higher compression rate ↑ and lower speed ↓ Example: ABCDEFBCGXY 1. {AB,BC,CD,DE,EF) will be added to the dictionary and translated to a smallest unique- code . 2. Later, if BC has been stored in the dictionary, so it will be translated to a smallest unique- code ,and add the strings {BCG,XY} to the dictionary. 19

  20. LZMA Diagram Keep in mind (The dictionary) You’ll remember what you had seen before. What I’ve seen Cat 1 Dog Tree Cat Cat Dog 2 Tree 3 20

  21. Encryption Module • Encrypt the plaintext index file (PIF) • It uses the Blowfish algorithm 21

  22. Cryptography • In our case, we assume the keys already delivered securely. Public area M M = D k2 (C) C = E k1 (M) (Encryptor) (Decryptor) E D Hacker KEY1 KEY2 Private area E k (M) = Encryption function M ( Plaintext) = original message 22 C ( Cipher text) = encrypted message D k (C) = Decryption function

  23. Image-hiding Module • It provides image hiding for the plaintext index file (PIF). • Uses the” JPHS“ (open source software). • JPHS also uses the Blowfish algorithm to encrypt the PIF in an image. 23

  24. Implementation 24

  25. Environment • Windows XP SP3 • Visual Studio 2005 • Mozilla Thunderbird 3 (3.0.4) 25

  26. Do you want to have a coffee with me ? Do you want to have a coffee with me ? We should meet at 9 pm. 26

  27. Receive a mail Cheating text Plaintext index file embedded 27

  28. Flow chart (Sender) Read the plaintext Hiding the PIF in image 2-nd Key Read the cheating text Compose a mail to receiver Generate the CPT of the cheating text From : weishin.pan@gmail.com To: magicpanx@gmail.com Generate the plaintext index file Subject: Hello ,magicpanx ! Do you want to have a coffee with me? Compress the PIF Cheating text 1-st Key Attached file : Encrypt the compressed PIF ncnu.jpg 28 PIF embedded

  29. Flow chart (Receiver) Read the cheating text From : weishin.pan@gmail.com 2-nd Key To: magicpanx@gmail.com Subject: Hello ,magicpanx ! Seek PIF from the attach image Do you want to have a coffee with me? 1-st Key Decrypt the PIF Cheating text Attached file : ncnu.jpg Generate the CPT of the cheating text PIF embedded Decompress the PIF Using the CPT and the PIF to reverse the original plaintext Plaintext We should meet at 9 pm. Plaintext output 29

  30. Conclusion • Increase the security in email services. • Through the behavior observed in chatting, the image hiding technique is applied to CDES for hide the PIF in an emoticon or a picture, which looks meaningful. 30

  31. Future work • The framework can use for instant message (IM), like Windows Live Messenger, Yahoo Messenger in the future work. – Because people use the emoticon and photo in the chat, it has been a common behavior. 31

  32. Reference • [ 1 ] Chu-Hsing Lin and Tien-Chi Lee, “A Confused Document Encrypting Scheme and its Implementation”,Computers & Security,Vol. 17, No. 6, pp.543-551, 1998. • [ 2 ]Wen-Hung Yeh and Jing-Jang Hwang, “Hiding Digital Information Using a Novel System Scheme”, Elsevier Science Ltd, 2001. • [ 3 ]Yeh, W. H. and Hwang J. J., "A scheme of hiding secret Chinese information in confused documents" , Journal of Information Management, Vol.7 (2),2001b, pp. 183-191 • [ 4 ]Bi-feng Liang, etc, “On the study and implementation for confused document encrypting scheme of data hiding”, Technical Report, Department of Information Management, Ta Hwa Institute of Technology, R.O.C.,2002. • [ 5 ]Tzu-jung Yao and Quincy Wu, "On the Study of Overhead Reduction for Confused Document Encrypting Schemes", International Conference on Multimedia Computing and Information Technology (MCIT 2010) University of Sharjah(UoS), Sharjah, United Arab Emirates (UAE), March 2-4, 2010. 32

  33. Thank you for your listening

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend