novel encryption method of gps information in image file
play

Novel Encryption Method of GPS Information in Image File Using - PowerPoint PPT Presentation

Novel Encryption Method of GPS Information in Image File Using Format-preserving Encryption Changhyun Lee, Yeonju Choi, Hyeongmin Park, Kangbin Yim, and Sun-Young Lee Soonchunhyang University IMIS 2019 Presenter: Brandon Falk (


  1. Novel Encryption Method of GPS Information in Image File Using Format-preserving Encryption Changhyun Lee, Yeonju Choi, Hyeongmin Park, Kangbin Yim, and Sun-Young Lee Soonchunhyang University IMIS 2019 Presenter: Brandon Falk ( 上海交大)

  2. 01 02 03 BACKGROUND INTRODUCTION STATE OF THE ART TABLE OF CONTENTS 04 05 06 EXPERIMENTS RESULTS CONCLUSION

  3. 01 BACKGROUND

  4. Background Privacy Exchangeable Image File Format-Preserving Format (EXIF) Encryption (FPE) Global Positioning System No other existing proposals (GPS) for encrypting EXIF

  5. INTRODUCTION 02

  6. Measuring GPS in Smartphones A-GPS Cell-ID Synchronize GPS satellite position 3G or 4G signals received from and current time by 3G or 4G base station communication networks Wi-Fi P-Cell Signal of wireless router Builds database based on identifying location information in surrounding environment and compares to information received from device

  7. EXIF How smartphone, camera, etc When Data Travels date time stamps Across devices, software, etc Where Photo storage services longitude / latitude / direction / Google images, WeChat altitude Moments, Weibo, Facebook, Instagram ( Some services strip EXIF data )

  8. “Can be a gold mine of information” —SOMEONE FAMOUS

  9. Format-Preserving Encryption Encrypt plaintext with values of same format ● Vulnerable to codebook attack if plaintext is short ○ Defense ● Tweaking, Cycle-walking, Ranking ○ Tweak is additional input values to make up for short plaintext ■ Cycle-walking is Vulnerable to side-channel attacks ■ P-NP problems can’t effjciently apply Ranking ■ Thus, FPE is not used in this paper’s proposal ●

  10. STATE OF THE 03 ART

  11. FE1 Algorithm Unbalanced Feistel Network - divide plain into unequal lengths Calculation of L and R values - R is entered in round function along with key, tweak, and corresponding # of rounds Round function algorithms: HMAC and AES. Calculate XOR with L. Then attach to existing value R.

  12. Design of GPS Encryption using FE1 Encryption Process shown below is the same as Decryption Process VISION Venus has a beautiful name and is the second planet from the Sun. It’s terribly hot—even hotter than Mercury—and its atmosphere is extremely poisonous. It’s the second-brightest natural object in the night sky after the Moon 12

  13. EXPERIMENTS 04

  14. Real Location Searched on Google Maps Exceed Google Map Range Value (Intended)

  15. 05 RESULTS Here you could describe the topic of the section

  16. Discussion of Results SPECS: CPU I5-8500 Windows 10 Time Complexity: n^2

  17. Discussion of Results Triangle = EXIF GPS data found Circle = EXIF GPS data not found

  18. CONCLUSION 06

  19. Conclusion and Potential 5,408 5,408 5,608 608 5,608 5,608 Followers Followers Views Followers Likes Followers Novel Encryption Approach ● Lack of Defense ○ Lack of Significant Experimentation ○ Area is capable for further research ○ AGE EXIF GPS implications ● Treasure cove of data is stored in ○ photos If a photo service is hacked, a ■ lot of personal information can be more exposed than intended

  20. 谢谢 ~

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend