Data Hiding in a Kind of PDF Texts for Secret Communication

Post on 22-Feb-2016

42 views 0 download

Tags:

description

Data Hiding in a Kind of PDF Texts for Secret Communication. Authors : S.P. Zhong, X.Q. Cheng, and T.R. Chen Source : International Journal of Network Security, vol. 4, no. 1, pp. 17-26, 2007 Presenter : Ping-Kun Hsu( 許鈵昆 ) Date : 2011/01/21. Outline. Introduction - PowerPoint PPT Presentation

Transcript of Data Hiding in a Kind of PDF Texts for Secret Communication

1

Data Hiding in a Kind of PDF Texts for Secret Communication

Authors : S.P. Zhong, X.Q. Cheng, and T.R. ChenSource : International Journal of Network Security, vol. 4, no. 1, pp. 17-26, 2007Presenter : Ping-Kun Hsu(許鈵昆 )Date : 2011/01/21

2

Outline Introduction TJ Operator Logistic Chaotic Map The Proposed Scheme Experiment Result Analysis Conclusion Comment

3

Introduction Goal

Hiding secret data in PDF file to achieve the undetectability, perceptual transparency, and capacity.

Related Works TJ Operator Logical Chaotic Map

4

TJ Operator

2D vector-graph positioning model

5

Logistic Chaotic Map

Xn+1 = r × Xn × (1-Xn)0≦ Xn ≦1, 0 ≦ r ≦4

If 3.57 ≦ r ≦4, the iteration values are random

The Proposed Scheme(1/5)Secret data Key

Logistic chaotic map

Map 1 Map 2

Start point

Num1 Num2

0101|1010

5 | 10

SHA-1

01011011

91 mod 16

11

FlagStr2

IND6

SHA-1

01011010

90 mod 16

10

FlagStr1

Transformed data

FlagStr2

7

The Proposed Scheme(2/5)

[<01> 4 <02> -2 <03> 20 <04> 15 <05>]TJ

If the absolute value of the integer numeral is in

[1,16]

If the Num2 is bigger than φ

Replace the integer numeral by the numeral in IND

10,11,12

Replace the integer numeral by the numeral transformed

from Num1

yes no

yes

Keep the integer numeral constant

no

[<01> 10<02>11 <03> 20 <04>12 <05>]TJ

IND

8

The Proposed Scheme(3/5) Key

SHA-1

01011011

91 mod 16

11

FlagStr

FlagStr

Map 2

Start point

Num2

Logistic chaotic map

9

The Proposed Scheme(4/5)

If the absolute value of the integer numeral is in

[1,16]

If the Num2 is bigger than φ

Extract the integer numeral and

check the next integer numeral

Check the next integer numeral

yes no

yesno

[<01> 10<02>11 <03> 20 <04>12 <05>]TJ

10

The Proposed Scheme(5/5) CheckSt

rEmbedded

DataFlagStr

2

SHA-1

compare

Data have been extracted successfully

Data may have been tampered

noyes

11

Experiment Result

12

Analysis

13

Conclusion The proposed scheme is secure, and

the embedded capacity is high.

14

Comment How to calculate integer numeral by

the numeral transformed from Num1