• 沒有找到結果。

4. SYSTEM IMPLEMENTATION AND RESULTS

4.3.   Future work

embedded file and the origin one. Not only survey the color but also detect whether the size of them are changed. Some tools’ encoding process would change the image format, and this would appear something different to attackers.

4.2.3. Integrity:

We embedded the watermark into the selected images and extracted to find whether the watermark is correct.

4.2.4. Capacity:

We can embed maximum 256 MB data into videos and the carrier also limits the embedded image size. Actually, it is difficult to embed a big size of image cause we need to find the big enough video as a carrier.

Now, MIA[33] cannot inspect the correctness of the passwords and the capacity of the carrier. It can only save these input messages in the database and wait until the back-end processing. If there is any problem while processing the works, the return uploaded file in the profile page could not have the right to play.

4.3.Future work

In the future, we want to combine more steganography software into our website to provide a visible service in our Website for embedding watermarks and having better control of our service.

The next goal is for passive authentication to active code execution by binding a

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

scripting language runtime to the player. The specialized player is a program, which binds the sub process for processing modified video file. The player takes modified video file and the public key for encryption. As soon as the player is activated, the sub process is called and the video is played asynchronously. While the video is being played, a sub process decrypts it and reconstructed again. Using the exactly same public key, the reconstructed encrypted message is decrypted and the plain text is obtained. If the plain text is a script written in one of supported scripting languages, the corresponding interpreter will be loaded to execute the script. Under the circumstances that no data loss occurs during the redistribution, the framework provides an active authentication process. If the sub process exits without success, it indicates the user has no proper authentication.

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y 5.CONCLUSION

In the article, we apply cryptography and steganography techniques named OpenPuff [23] to hide data in digital contents, proposing a new service that helps content owners claim digital ownership for free. We implement a website to provide online service of encrypting and decrypting message, which can be image or text.

Moreover, the text we embedded can be bound as a scripting language runtime to the player. Hence, embedding text is the first step for passive authentication to active code execution. By using MIA [33], users can directly encrypt and decrypt their own media data without installing any software on PC. Our web server will handle whole the data processing and provide a convenient user interface for user to manipulate.

Thus they will not be limited by the operation system.

However, the technique used to embed message in video is fragile and therefore cannot resist attacks/modifications on the video. I.e., modification on videos may break the embedded messages. Following the generic embedding framework, an ongoing work is to replace its own implementation as modules that can be integrated with other data hiding techniques, and implement all of them into our online service.

1. Abbass, A. S., Soleit, E. A., & Ghoniemy, S. A. (2007). Blind video data hiding using integer wavelet transforms. Ubiquit Comput Commun J, 2(1).

2. Bhaumik, A. K., Choi, M., Robles, R. J., & Balitanas, M. O. (2009). Data hiding in video. International Journal of Database Theory and Application, 2(2), 9-16.

3. Chae, J. J., & Manjunath, B. S. (1999). Data hiding in video. In Image Processing, 1999. ICIP 99. Proceedings. 1999 International Conference on(Vol.

1, pp. 311-315). IEEE.

4. Hefeeda, M., & Mokhtarian, K. (2010). Authentication schemes for multimedia streams: Quantitative analysis and comparison. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP), 6(1), 6.

5. Ko, L. T. (2013). Design and Optimization for Digital Watermarking Applications(Doctoral dissertation).

6. Lee, C. W., & Tsai, W. H. (2010). A lossless data hiding method by histogram shifting based on an adaptive block division scheme. Pattern Recognition and Machine Vision, River Publishers, Aalborg, Denmark, 1-14.

7. Lei, B. Y., Feng, J., & Lo, K. T. (2010). Digital Watermarking Techniques for AVS Audio. INTECH Open Access Publisher.

8. Lin, C. C., & Shiu, P. F. (2010). High capacity data hiding scheme for DCT-based images. Journal of Information Hiding and Multimedia Signal

in digital video content protection. Proceedings of the IEEE, 93(1), 171-183.

11. Lu, C. S., & Liao, H. Y. (2001). Multipurpose watermarking for image authentication and protection. Image Processing, IEEE Transactions on, 10(10), 1579-1592.

12. Memon, N., & Wong, P. W. (1998). Protecting digital media content.Communications of the ACM, 41(7), 35-43.

13. Muhammad, K., Ahmad, J., Farman, H., & Zubair, M. (2014). A Novel Image Steganographic Approach for Hiding Text in Color Images Using HSI Color Model. Middle-East Journal of Scientific Research, 22(5), 647-654.

14. Mukherjee, D., Chae, J. J., & Mitra, S. K. (2000). A source and channel-coding framework for vector-based data hiding in video. Circuits and Systems for Video Technology, IEEE Transactions on, 10(4), 630-645.

15. Paruchuri, J. K., & Cheung, S. (2008, May). Joint optimization of data hiding and video compression. In Circuits and Systems, 2008. ISCAS 2008. IEEE International Symposium on (pp. 3021-3024). IEEE

16. Quan, X., & Zhang, H. (2006, August). Data hiding in MPEG compressed audio using wet paper codes. In Pattern Recognition, 2006. ICPR 2006. 18th International Conference on (Vol. 4, pp. 727-730). IEEE.

17. Reddy, R., Prasad, M. V., & Rao, D. S. (2009). Robust digital watermarking of color images under noise attacks. International Journal of Recent Trends in Engineering, 1(1), 334-338.

18. Sullivan, K., Bi, Z., Madhow, U., Chandrasekaran, S., & Manjunath, B. S. (2004, October). Steganalysis of quantization index modulation data hiding. In Image Processing, 2004. ICIP'04. 2004 International Conference on (Vol. 2, pp.

1165-1168). IEEE.

19. Swathi, A., & Jilani, D. S. Video Steganography by LSB Substitution Using Different Polynomial Equations. International Journal Of Computational Engineering Research (ijceronline. com) Vol, 2.

20. Wu, M., & Liu, B. (2003). Data hiding in image and video. I. Fundamental issues and solutions. Image Processing, IEEE Transactions on, 12(6), 685-695.

21. Wu, M., & Liu, B. (2003). Multimedia data hiding. Springer Science & Business Media.

22. Wu, M., Yu, H., & Liu, B. (2003). Data hiding in image and video. II. Designs and applications. Image Processing, IEEE Transactions on, 12(6), 696-705.

23. OpenPuff 4.00

28. Digital rights management (DRM)

Available at: http://en.wikipedia.org/wiki/Digital_rights_management 29. Roust

Buchanan, J. M. (2004). Creating a robust form of Steganography (Doctoral dissertation, WAKE FOREST UNIVERSITY).

30. Integrity

de Carvalho, D. F., Chies, R., Freire, A. P., Martimiano, L. A., & Goularte, R.

(2008, September). Video steganography for confidential documents: integrity, privacy and version control. In Proceedings of the 26th annual ACM international conference on Design of communication (pp. 199-206). ACM.

31. Transparency

Kraetzer, C., Dittmann, J., & Lang, A. (2006, February). Transparency benchmarking on audio watermarks and steganography. In Electronic Imaging 2006 (pp. 60721L-60721L). International Society for Optics and Photonics.

32. Model view controller (MVC)

http://en.wikipedia.org/wiki/Model%E2%80%93view%E2%80%93controller 33. multimedia intelligent authentication (MIA)

立 政 治 大 學

N a tio na

l C h engchi U ni ve rs it y

http://140.119.19.91:9000/MIA/#/

34. Adobe Photoshop

http://www.photoshop.com/products/photoshop 35. Angularjs

https://angularjs.org/

相關文件