User Security Priority Nouf Al-Otaibi and Adnan Gutub Umm Al-Qura - - PowerPoint PPT Presentation

user security priority
SMART_READER_LITE
LIVE PREVIEW

User Security Priority Nouf Al-Otaibi and Adnan Gutub Umm Al-Qura - - PowerPoint PPT Presentation

AET-2014: International conference on Advanced Engineering Technologies, Dubai, UAE, 25-26 December 2014 Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority Nouf Al-Otaibi and Adnan Gutub Umm


slide-1
SLIDE 1

Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority

1 AET-2014: International conference on Advanced Engineering Technologies, Dubai, UAE, 25-26 December 2014

Nouf Al-Otaibi and Adnan Gutub

Umm Al-Qura University (UQU) Makkah, Saudi Arabia

Thursday 25th December 2014

slide-2
SLIDE 2

Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority

Adnan Gutub

Thursday 25th December 2014 AET-2014, Dubai, UAE

Outline

  • Motivation
  • Cryptography vs. Steganography
  • System Overview
  • System Implementation Interface
  • Testing
  • Results & Comparison

2

slide-3
SLIDE 3

Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority

Adnan Gutub

Thursday 25th December 2014 AET-2014, Dubai, UAE

Motivation:

  • Flexibility: User Security Priority
  • PC data dependant

(Steganography)

  • Storage of Secure Text

3

slide-4
SLIDE 4

Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority

Adnan Gutub

Thursday 25th December 2014 AET-2014, Dubai, UAE

Cryptography vs. Steganography

  • Cryptography

▫ Converting secret data to unreadable forms... Unconverting it back to the readable form

  • Steganography

▫ Hiding existence of a secret data (from

  • bservation)
slide-5
SLIDE 5

Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority

Adnan Gutub

Thursday 25th December 2014 AET-2014, Dubai, UAE

Cryptography

5

Hiding Retrieve

Secret Data

Z

Lock

Z

Key = Z Same Key = Z

Secret Data

slide-6
SLIDE 6

Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority

Adnan Gutub

Thursday 25th December 2014 AET-2014, Dubai, UAE

6

Public Key (Assymetric) Cryptosystems (PKC)

  • Why public key cryptography ?
  • Key Distribution and Management is difficult in

symmetric cryptosystems: DES, AES (Rijndael)

  • ver large networks.
  • Electronic Signatures
  • Other cryptographic functions such:

▫ Key Exchange ▫ Secret Key Derivation ▫ Secret Sharing functions

slide-7
SLIDE 7

Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority

Adnan Gutub

Thursday 25th December 2014 AET-2014, Dubai, UAE

7

Asymmetric Key Cryptography

  • Instead of one key, have two

▫ public key ▫ private key

  • Use one key to encode/encrypt
  • Use other key to decode/decrypt
slide-8
SLIDE 8

Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority

Adnan Gutub

Thursday 25th December 2014 AET-2014, Dubai, UAE

8

Simple Example of PKC

Non-mathematical

OPEN DIRECTORY

SENDER RECEIVER

K-close K-close K-close K-open (keep secret) K-open Message Message

slide-9
SLIDE 9

Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority

Adnan Gutub

Thursday 25th December 2014 AET-2014, Dubai, UAE

Basic Applications

9

  • Confidentiality

▫ Hiding contents of messages exchanged in a transaction

slide-10
SLIDE 10

Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority

Adnan Gutub

Thursday 25th December 2014 AET-2014, Dubai, UAE

Basic Applications

10

  • Authentication

▫ Ensuring that the origin of a message is correctly identified

slide-11
SLIDE 11

Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority

Adnan Gutub

Thursday 25th December 2014 AET-2014, Dubai, UAE

Basic Applications

11

  • Confidentiality

▫ Hiding contents of messages exchanged in a transaction

  • Authentication

▫ Ensuring that the origin of a message is correctly identified

  • Integrity

▫ Ensuring that only authorized parties are able to modify computer system assets and transmitted information

  • Non-repudiation

▫ Requires that neither of the authorized parties deny the aspects of a valid transaction

slide-12
SLIDE 12

Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority

Adnan Gutub

Thursday 25th December 2014 AET-2014, Dubai, UAE

Steganography & Cryptography

  • Cryptography

▫ Converting messages to unreadable forms... Unconverting it back to the readable form

  • Steganography

▫ Hiding the existence of a message

slide-13
SLIDE 13

Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority

Adnan Gutub

Thursday 25th December 2014 AET-2014, Dubai, UAE

Overview : Steganography model for PC storage

Basic Steganography System

13

Sensitive Secret Text Data Cover Steganography Image

Output: Stego-Image

Hiding Sensitive Secret Text Data on Personal Computers

Security System

Image Base Steganography

slide-14
SLIDE 14

Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority

Adnan Gutub

Thursday 25th December 2014 AET-2014, Dubai, UAE

Steganography: Image based

  • Hiding in LSBs
  • Example: embedding 200 => (11001000)
  • Pixel 1: 00101101

00011101 11011100

  • Pixel 2: 10100110 11000101 00001101
  • Pixel 3: 11010010 10101100 01100011

14

slide-15
SLIDE 15

Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority

Adnan Gutub

Thursday 25th December 2014 AET-2014, Dubai, UAE

System interface

showing: bits statistics to give full flexibility for user priority process of hiding text

15

slide-16
SLIDE 16

Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority

Adnan Gutub

Thursday 25th December 2014 AET-2014, Dubai, UAE

Testing: 30 images

security relation to data dependency

16

slide-17
SLIDE 17

Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority

Adnan Gutub

Thursday 25th December 2014 AET-2014, Dubai, UAE

NUMBER OF BITS FROM DIFFERENT TESTING’S HIDING IN 30 FIXED SIZE IMAGES

17 pic Number of Bits Different pic Number of Bits Different 1 29815 16 7749 2 26533 17 26096 3 33489 18 9222 4 17086 19 27502 5 21409 20 27149 6 25637 21 27656 7 27421 22 29447 8 22656 23 23343 9 13747 24 39382 10 41327 25 29820 11 30186 26 11169 12 22396 27 28081 13 57930 28 12339 14 33535 29 89512 15 37988 30 26230

slide-18
SLIDE 18

Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority

Adnan Gutub

Thursday 25th December 2014 AET-2014, Dubai, UAE

18

Testing Results: 30 images

security relation to data dependency

70 75 80 85 90 95 100 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30

Percentage of Security per Image

slide-19
SLIDE 19

Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority

Adnan Gutub

Thursday 25th December 2014 AET-2014, Dubai, UAE

Remarks

  • Implemented visual basic platform
  • Flexible Stego-system ==>

▫ user security priority ▫ Useful for hiding text on PC

  • Image Based Stego: fully dependant on the PC

data available

19

slide-20
SLIDE 20

Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority

Adnan Gutub

Thursday 25th December 2014 AET-2014, Dubai, UAE

20

slide-21
SLIDE 21

Thanks for the opportunity

Questions?

21

Flexible Stego-System for Hiding Text in Images of Personal Computers Based

  • n User Security Priority

Nouf Al-Otaibi and Adnan Gutub

Umm Al-Qura University (UQU), Makkah, Saudi Arabia AET-2014: International conference on Advanced Engineering Technologies, Dubai, UAE, 25-26 December 2014