user security priority
play

User Security Priority Nouf Al-Otaibi and Adnan Gutub Umm Al-Qura - PowerPoint PPT Presentation

AET-2014: International conference on Advanced Engineering Technologies, Dubai, UAE, 25-26 December 2014 Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority Nouf Al-Otaibi and Adnan Gutub Umm


  1. AET-2014: International conference on Advanced Engineering Technologies, Dubai, UAE, 25-26 December 2014 Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority Nouf Al-Otaibi and Adnan Gutub Umm Al-Qura University (UQU) Makkah, Saudi Arabia Thursday 25 th December 2014 1

  2. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority Outline • Motivation Cryptography vs. Steganography • • System Overview • System Implementation Interface Testing • • Results & Comparison Adnan Gutub Thursday 25 th December 2014 2 AET-2014, Dubai, UAE

  3. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority Motivation: • Flexibility: User Security Priority • PC data dependant (Steganography) • Storage of Secure Text Adnan Gutub Thursday 25 th December 2014 3 AET-2014, Dubai, UAE

  4. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority Cryptography vs. Steganography • Cryptography ▫ Converting secret data to unreadable forms... Unconverting it back to the readable form • Steganography ▫ Hiding existence of a secret data (from observation) Adnan Gutub Thursday 25 th December 2014 AET-2014, Dubai, UAE

  5. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority Cryptography Hiding Retrieve Key = Z Same Key = Z Z Secret Data Secret Data Lock Z Adnan Gutub Thursday 25 th December 2014 5 AET-2014, Dubai, UAE

  6. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority Public Key (Assymetric) Cryptosystems (PKC) • Why public key cryptography ? • Key Distribution and Management is difficult in symmetric cryptosystems: DES, AES (Rijndael) over large networks. • Electronic Signatures • Other cryptographic functions such: ▫ Key Exchange ▫ Secret Key Derivation ▫ Secret Sharing functions Adnan Gutub Thursday 25 th December 2014 6 AET-2014, Dubai, UAE

  7. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority Asymmetric Key Cryptography • Instead of one key, have two ▫ public key ▫ private key • Use one key to encode/encrypt • Use other key to decode/decrypt Adnan Gutub Thursday 25 th December 2014 7 AET-2014, Dubai, UAE

  8. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority Simple Example of PKC Non-mathematical SENDER RECEIVER OPEN DIRECTORY K-close Message K-close K-open (keep secret) Message K-open K-close Adnan Gutub Thursday 25 th December 2014 8 AET-2014, Dubai, UAE

  9. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority Basic Applications • Confidentiality ▫ Hiding contents of messages exchanged in a transaction Adnan Gutub Thursday 25 th December 2014 9 AET-2014, Dubai, UAE

  10. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority Basic Applications • Authentication ▫ Ensuring that the origin of a message is correctly identified Adnan Gutub Thursday 25 th December 2014 10 AET-2014, Dubai, UAE

  11. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority Basic Applications • Confidentiality ▫ Hiding contents of messages exchanged in a transaction • Authentication ▫ Ensuring that the origin of a message is correctly identified • Integrity ▫ Ensuring that only authorized parties are able to modify computer system assets and transmitted information • Non-repudiation ▫ Requires that neither of the authorized parties deny the aspects of a valid transaction Adnan Gutub Thursday 25 th December 2014 11 AET-2014, Dubai, UAE

  12. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority Steganography & Cryptography • Cryptography ▫ Converting messages to unreadable forms... Unconverting it back to the readable form • Steganography ▫ Hiding the existence of a message Adnan Gutub Thursday 25 th December 2014 AET-2014, Dubai, UAE

  13. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority Overview : Steganography model for PC storage Basic Steganography System Sensitive Output: Secret Text Security System Stego-Image Data Hiding Sensitive Image Base Secret Text Cover Data on Steganography Steganography Personal Image Computers Adnan Gutub Thursday 25 th December 2014 13 AET-2014, Dubai, UAE

  14. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority Steganography: Image based • Hiding in LSBs • Example: embedding 200 => (11001000) • Pixel 1: 0010110 1 0001110 1 1101110 0 • Pixel 2: 1010011 0 1100010 1 0000110 1 • Pixel 3: 1101001 0 1010110 0 01100011 Adnan Gutub Thursday 25 th December 2014 14 AET-2014, Dubai, UAE

  15. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority System interface showing: bits statistics to give full flexibility for user priority process of hiding text Adnan Gutub Thursday 25 th December 2014 15 AET-2014, Dubai, UAE

  16. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority Testing: 30 images security relation to data dependency Adnan Gutub Thursday 25 th December 2014 16 AET-2014, Dubai, UAE

  17. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority NUMBER OF BITS FROM DIFFERENT TESTING ’ S HIDING IN 30 FIXED SIZE IMAGES pic Number of Bits pic Number of Bits Different Different 1 29815 16 7749 2 26533 17 26096 3 33489 18 9222 4 17086 19 27502 5 21409 20 27149 6 25637 21 27656 7 27421 22 29447 8 22656 23 23343 9 13747 24 39382 10 41327 25 29820 11 30186 26 11169 12 22396 27 28081 13 57930 28 12339 14 33535 29 89512 15 37988 30 26230 Adnan Gutub Thursday 25 th December 2014 17 AET-2014, Dubai, UAE

  18. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority Testing Results: 30 images security relation to data dependency Percentage of Security per Image 100 95 90 85 80 75 70 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Adnan Gutub Thursday 25 th December 2014 18 AET-2014, Dubai, UAE

  19. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority Remarks • Implemented visual basic platform • Flexible Stego-system ==> ▫ user security priority ▫ Useful for hiding text on PC • Image Based Stego: fully dependant on the PC data available Adnan Gutub Thursday 25 th December 2014 19 AET-2014, Dubai, UAE

  20. Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority Adnan Gutub Thursday 25 th December 2014 20 AET-2014, Dubai, UAE

  21. AET-2014: International conference on Advanced Engineering Technologies, Dubai, UAE, 25-26 December 2014 Thanks for the opportunity Questions? Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority Nouf Al-Otaibi and Adnan Gutub Umm Al-Qura University (UQU), Makkah, Saudi Arabia 21

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend