+ All Categories
Home > Documents > Data Hiding in a Kind of PDF Texts for Secret Communication

Data Hiding in a Kind of PDF Texts for Secret Communication

Date post: 22-Feb-2016
Category:
Upload: mura
View: 36 times
Download: 0 times
Share this document with a friend
Description:
Data Hiding in a Kind of PDF Texts for Secret Communication. Authors : S.P. Zhong, X.Q. Cheng, and T.R. Chen Source : International Journal of Network Security, vol. 4, no. 1, pp. 17-26, 2007 Presenter : Ping-Kun Hsu( 許鈵昆 ) Date : 2011/01/21. Outline. Introduction - PowerPoint PPT Presentation
Popular Tags:
14
Data Hiding in a Kind of PDF Texts for Secret Communication Authors : S.P. Zhong, X.Q. Cheng, and T.R. Chen Source : International Journal of Network Security, vol. 4, no. 1, pp. 17-26, 2007 Presenter : Ping-Kun Hsu( 許許許 ) Date : 2011/01/21 1
Transcript
Page 1: Data Hiding in a Kind of PDF Texts for  Secret Communication

1

Data Hiding in a Kind of PDF Texts for Secret Communication

Authors : S.P. Zhong, X.Q. Cheng, and T.R. ChenSource : International Journal of Network Security, vol. 4, no. 1, pp. 17-26, 2007Presenter : Ping-Kun Hsu(許鈵昆 )Date : 2011/01/21

Page 2: Data Hiding in a Kind of PDF Texts for  Secret Communication

2

Outline Introduction TJ Operator Logistic Chaotic Map The Proposed Scheme Experiment Result Analysis Conclusion Comment

Page 3: Data Hiding in a Kind of PDF Texts for  Secret Communication

3

Introduction Goal

Hiding secret data in PDF file to achieve the undetectability, perceptual transparency, and capacity.

Related Works TJ Operator Logical Chaotic Map

Page 4: Data Hiding in a Kind of PDF Texts for  Secret Communication

4

TJ Operator

2D vector-graph positioning model

Page 5: Data Hiding in a Kind of PDF Texts for  Secret Communication

5

Logistic Chaotic Map

Xn+1 = r × Xn × (1-Xn)0≦ Xn ≦1, 0 ≦ r ≦4

If 3.57 ≦ r ≦4, the iteration values are random

Page 6: Data Hiding in a Kind of PDF Texts for  Secret Communication

The Proposed Scheme(1/5)Secret data Key

Logistic chaotic map

Map 1 Map 2

Start point

Num1 Num2

0101|1010

5 | 10

SHA-1

01011011

91 mod 16

11

FlagStr2

IND6

SHA-1

01011010

90 mod 16

10

FlagStr1

Transformed data

FlagStr2

Page 7: Data Hiding in a Kind of PDF Texts for  Secret Communication

7

The Proposed Scheme(2/5)

[<01> 4 <02> -2 <03> 20 <04> 15 <05>]TJ

If the absolute value of the integer numeral is in

[1,16]

If the Num2 is bigger than φ

Replace the integer numeral by the numeral in IND

10,11,12

Replace the integer numeral by the numeral transformed

from Num1

yes no

yes

Keep the integer numeral constant

no

[<01> 10<02>11 <03> 20 <04>12 <05>]TJ

IND

Page 8: Data Hiding in a Kind of PDF Texts for  Secret Communication

8

The Proposed Scheme(3/5) Key

SHA-1

01011011

91 mod 16

11

FlagStr

FlagStr

Map 2

Start point

Num2

Logistic chaotic map

Page 9: Data Hiding in a Kind of PDF Texts for  Secret Communication

9

The Proposed Scheme(4/5)

If the absolute value of the integer numeral is in

[1,16]

If the Num2 is bigger than φ

Extract the integer numeral and

check the next integer numeral

Check the next integer numeral

yes no

yesno

[<01> 10<02>11 <03> 20 <04>12 <05>]TJ

Page 10: Data Hiding in a Kind of PDF Texts for  Secret Communication

10

The Proposed Scheme(5/5) CheckSt

rEmbedded

DataFlagStr

2

SHA-1

compare

Data have been extracted successfully

Data may have been tampered

noyes

Page 11: Data Hiding in a Kind of PDF Texts for  Secret Communication

11

Experiment Result

Page 12: Data Hiding in a Kind of PDF Texts for  Secret Communication

12

Analysis

Page 13: Data Hiding in a Kind of PDF Texts for  Secret Communication

13

Conclusion The proposed scheme is secure, and

the embedded capacity is high.

Page 14: Data Hiding in a Kind of PDF Texts for  Secret Communication

14

Comment How to calculate integer numeral by

the numeral transformed from Num1


Recommended