Information Hiding in Email Services Based on Confused Document - - PowerPoint PPT Presentation

information hiding in email services based on confused
SMART_READER_LITE
LIVE PREVIEW

Information Hiding in Email Services Based on Confused Document - - PowerPoint PPT Presentation

Information Hiding in Email Services Based on Confused Document Encrypting Schemes Author Wei-Shyun Pan Po-Kang Chen Quincy Wu Outline Introduction Related works A Confused Document Encrypting Schemes and its


slide-1
SLIDE 1

Information Hiding in Email Services Based on Confused Document Encrypting Schemes

Author: Wei-Shyun Pan Po-Kang Chen Quincy Wu

slide-2
SLIDE 2

2

Outline

  • Introduction
  • Related works

– A Confused Document Encrypting Schemes and its Implementation (Lin & Lee ,1998) – Information hiding

  • System model

– Concept – CDES module – Compression module – Encryption module – Image hiding module

  • Implementation

– Environment – Experiment

  • Conclusion & Future work
slide-3
SLIDE 3

3

  • The “Personal Privacy” becomes a popular section in

information security over Internet.

  • Information Hiding ( Steganography ) and

Cryptography accomplish secret communication between you and me.

Introduction

slide-4
SLIDE 4

4

The Eavesdropper (Nicolaes Maes ,1657)

slide-5
SLIDE 5

5

Motivation

  • Provide a secret communication service for

Email over Internet and demonstrate how Email services can be protected in my system

  • CDES (Confused Document Encrypting Scheme)

is a technique for data hiding, which sends a meaningful message to deceive the eavesdropper and increase the security

  • Add the image hiding technique
slide-6
SLIDE 6

6

Related works

slide-7
SLIDE 7

7

Information Hiding

  • Use any media to hide secret information.
  • the hacker cannot sense something when

he intercepts the media, because it is common behavior. Secret information

slide-8
SLIDE 8

8

CDES

  • Confused Document Encrypting Scheme (CDES), Lin&

Lee,1998 [1]

  • Elements of CDES

– Cheating texts – Plaintext – Character position table (CPT) – Plaintext Index file (PIF) – Key

slide-9
SLIDE 9

9

Transmitting many cheating text files

+

Plaintext index file (PIF)

A Confused Document Encrypting Scheme and its Implementation (Lin & Lee ,1998)

Plaintext

From : weishin.pan@gmail.com To : magicpanx@gmail.com Subject: Hello ! Body--------------------------------------------------------------------------- Confused Document Encrypting Scheme Attachments----------------------------------------------------------------- (1) ID-0005.txt (2) ID-0019.txt (3) ID-5597.txt (4) ID-2468.txt (5) ID-9870.txt (5) Encrypted plaintext index file + (Encrypted-ID 0019)

An encrypted file Eavesdropper

slide-10
SLIDE 10

10 Does the cheating text contains all of the different characters in the plaintext? Generate the character’s position table (CPT) of the cheating text Input cheating text Input plaintext Encrypt the ID Generate plaintext index file (PIF) by random Randomly generate an ID for the cheating text Compress the PIF Encrypt the compressed PIF Put the encrypted ID in the head of the encrypted and compressed PIF Send out the compressed and encrypted PIF and the cheating text involving an ID

Receiver Sender

2-nd key 1-st key No Yes

(CDES,Lin&Lee,1998 [1])

Sender

slide-11
SLIDE 11

11

Decrypt the encrypted ID in the given PIF Does find out the corresponding cheating text? Decrypt the given PIF Generate the character’s position table (CPT)

  • f the cheating text

Decompress the given PIF Use the CPT and the PIF to reverse the original plaintext Plaintext output

Receiver

(CDES,Lin&Lee,1998 [1])

No, wait the correct cheating text to come 2-nd key 1-st key Yes No

slide-12
SLIDE 12

CPT & PIF

12

Input

Plaintext : Cat is my pet. {C, a , t , i, s , m , y , p , e , . , □} Cheating text : Computer security is important. {C, o , m , p, u , t , e , r , s , c , i , y , a , n , . , □} Character Position record C 1

  • 2 , 25

m 3 , 23 p 4 , 24 u 5 , 13 t 6 , 16 , 27 , 30 e 7 , 11 r 8 , 14, 26 s 10 , 20 c 12 i 15 , 19 , 22 y 17 a 28 n 29 . 31 □ 9 , 18 , 21

Table 1. Characters Position Table (CPT)

1 28 6 … … … … Plaintext index file(PIF)

slide-13
SLIDE 13

13

System model

slide-14
SLIDE 14

14

Text + photo

Cheating text The proposal is based on Confused Document Encrypting Scheme

Do you want to have a coffee with me ?

It looks OK !

Eavesdropper

Sent out via Email PIF We should meet at 9 pm.

Concept

slide-15
SLIDE 15

15

CDES module Plaintext Cheating text CPT generated PIF generated Compression module Encryption module Compress the PIF Encrypt the compressed PIF Image-Hiding module Hiding the PIF in image

System model

Send out via E-mail

slide-16
SLIDE 16

16

CDES Module

  • Sender :

– Generate the CPT by the cheating text, and the plaintext will generate PIF by CPT.

  • Receiver :

– Use the CPT and the PIF to reverse the

  • riginal plaintext.
slide-17
SLIDE 17

17

Compression Module

  • It provides compression/decompression

for the plaintext index file(PIF), because the PIF size will be large.

  • It uses the LZMA algorithm.
slide-18
SLIDE 18

18

Data Compression

  • Reduce the data size.
  • Decrease transmission time.
  • Increase security of data.
slide-19
SLIDE 19

19

LZMA algorithm

  • Dictionary coding

– Dictionary size increased → Higher compression rate ↑ and lower speed ↓

Example: ABCDEFBCGXY 1. {AB,BC,CD,DE,EF) will be added to the dictionary and translated to a smallest unique- code . 2. Later, if BC has been stored in the dictionary, so it will be translated to a smallest unique- code ,and add the strings {BCG,XY} to the dictionary.

slide-20
SLIDE 20

20

You’ll remember what you had seen before.

What I’ve seen

Cat Tree Cat 1 Dog 2 Cat Dog Tree 3 Keep in mind (The dictionary)

LZMA Diagram

slide-21
SLIDE 21

21

Encryption Module

  • Encrypt the plaintext index file (PIF)
  • It uses the Blowfish algorithm
slide-22
SLIDE 22

22

Cryptography

  • In our case, we assume the keys already

delivered securely.

M

(Encryptor) E KEY1 (Decryptor) D KEY2 M = Dk2(C) Hacker C = Ek1(M) M ( Plaintext) = original message C ( Cipher text) = encrypted message Ek (M) = Encryption function Dk (C) = Decryption function Public area Private area

slide-23
SLIDE 23

23

Image-hiding Module

  • It provides image hiding for the plaintext

index file (PIF).

  • Uses the” JPHS“ (open source software).
  • JPHS also uses the Blowfish algorithm to

encrypt the PIF in an image.

slide-24
SLIDE 24

24

Implementation

slide-25
SLIDE 25

25

Environment

  • Windows XP SP3
  • Visual Studio 2005
  • Mozilla Thunderbird 3 (3.0.4)
slide-26
SLIDE 26

26

Do you want to have a coffee with me ? Do you want to have a coffee with me ? We should meet at 9 pm.

slide-27
SLIDE 27

27

Receive a mail

Cheating text Plaintext index file embedded

slide-28
SLIDE 28

28

Flow chart (Sender)

Read the plaintext Read the cheating text Generate the CPT of the cheating text Generate the plaintext index file Compress the PIF Encrypt the compressed PIF Hiding the PIF in image Compose a mail to receiver

From : weishin.pan@gmail.com To: magicpanx@gmail.com Subject: Hello ,magicpanx !

Do you want to have a coffee with me? Attached file : ncnu.jpg PIF embedded Cheating text

1-st Key 2-nd Key

slide-29
SLIDE 29

29

Flow chart (Receiver)

Read the cheating text Seek PIF from the attach image Decrypt the PIF

2-nd Key 1-st Key

Generate the CPT of the cheating text Decompress the PIF Using the CPT and the PIF to reverse the original plaintext Plaintext output We should meet at 9 pm. Plaintext

From : weishin.pan@gmail.com To: magicpanx@gmail.com Subject: Hello ,magicpanx !

Do you want to have a coffee with me? Attached file : ncnu.jpg PIF embedded Cheating text

slide-30
SLIDE 30

30

Conclusion

  • Increase the security in email services.
  • Through the behavior observed in chatting,

the image hiding technique is applied to CDES for hide the PIF in an emoticon or a picture, which looks meaningful.

slide-31
SLIDE 31

31

Future work

  • The framework can use for instant

message (IM), like Windows Live Messenger, Yahoo Messenger in the future work.

– Because people use the emoticon and photo in the chat, it has been a common behavior.

slide-32
SLIDE 32

32

Reference

  • [ 1 ] Chu-Hsing Lin and Tien-Chi Lee, “A Confused Document Encrypting Scheme

and its Implementation”,Computers & Security,Vol. 17, No. 6, pp.543-551, 1998.

  • [ 2 ]Wen-Hung Yeh and Jing-Jang Hwang, “Hiding Digital Information Using a Novel

System Scheme”, Elsevier Science Ltd, 2001.

  • [ 3 ]Yeh, W. H. and Hwang J. J., "A scheme of hiding secret Chinese information in

confused documents" , Journal of Information Management, Vol.7 (2),2001b, pp. 183-191

  • [ 4 ]Bi-feng Liang, etc, “On the study and implementation for confused document

encrypting scheme of data hiding”, Technical Report, Department of Information Management, Ta Hwa Institute of Technology, R.O.C.,2002.

  • [ 5 ]Tzu-jung Yao and Quincy Wu, "On the Study of Overhead Reduction for

Confused Document Encrypting Schemes", International Conference on Multimedia Computing and Information Technology (MCIT 2010) University of Sharjah(UoS), Sharjah, United Arab Emirates (UAE), March 2-4, 2010.

slide-33
SLIDE 33

Thank you for your listening