• 沒有找到結果。

Hiding Binary Images behind Noise with Authentication Capability: A New Approach to Covert Communication*

N/A
N/A
Protected

Academic year: 2022

Share "Hiding Binary Images behind Noise with Authentication Capability: A New Approach to Covert Communication*"

Copied!
5
0
0

加載中.... (立即查看全文)

全文

(1)

Hiding Binary Images behind Noise with Authentication Capability:

A New Approach to Covert Communication*

Chih-Hsuan Tzeng

Department of Computer and Information Science, National Chiao Tung University

Hsinchu, Taiwan 300, Republic of China Tel: +886-3-5728368

chtzeng@cis.nctu.edu.tw

Abstract

A new approach to hiding secret binary images behind noise images for covert communication with a capability of secret authentication is proposed. A secret image to be transmitted is transformed into a random noise image at a sender site with a given key, with the aim of both covering the secret and cheating illicit interceptors. Authentication bits are also embedded imperceptibly in the noise image. At the receiver site, the secret image is recovered from the noise image with the same key and verified by checking the existence of the authentication bits. Experimental results show the feasibility of the approach for real applications.

Keywords: covert communication, information hiding, binary noise image, image

authentication.

1.

Introduction

Covert communication means secret information exchanges between two sites with the purpose of preventing the secret from illicit interceptions. Such communication mechanisms are useful for many business or military applications. Most relate'd studies dealt

This work is supported partially by the MOE Program for Promoting Academic Excellency of Universities under Grant No. 89-1-FAO4-1-4.

To whom all correspondence should be sent.

Wen-Hsiang Tsais

Department of Computer and Information Science, National Chiao Tung University Hsinchu, Taiwan 300, Republic of China

Tel: +886-3-5728368 whtsai @cis.ncN.edu.tw

with the problem from the viewpoint of signal processing or communication theory [l-21.

With the advance of digital multimedia technologies and Internet communication, it is frequently found necessary to transmit secret images between two sites. An intuitive way for this is to use the cryptographic approach in which secret data are encrypted at a sender site and decrypted at a receiver site [3]. However, it is sometimes inconvenient to apply the traditional encryption-decryption approach to images because of the usually large volumes of image data. Thus it is interesting to investigate more specific mechanisms for covert communication of images. In this paper, a new scheme for this purpose is proposed, which is based on a new concept, namely, secret hiding in noise.

The image type we deal with is binary.

There were only a few studies [4-71 in the past about hiding information behind binary images, which is usually difficult because of the limited data embedding capacity as well as the low data content complexity of binary images. Wu, et al. [4] embedded bits in image blocks selected by pattern matching. The method can be used for data hiding behind meaningful cover images or for image authentication.

Tseng, et al.

[SI

changed pixels' values in image blocks and mapped block contents into the data to be hidden. The employed cover images again are meaningful. In [6, 71, spacings between words or lines in textural document images were changed to embed watermark signals for copyright protection. In this study, we investigate hiding secret binary

(2)

of covert communication with an additional capability of checking the authenticity of the recovered secret image.

More specifically, in the proposed method a secret image is hidden at a sender site behind an artificially created image that is full of random noise. This noise image has the effects of both covering the secret and cheating

an

illicit interceptor or receiver. It will be called a cover noise image in the sequel in this paper.

The creation of the cover noise image is based on a transformation of the given secret image data into noise through the use of the exclusive-OR bit operation as well as a preselected key. Furthermore, some randomly generated bits, called authentication bits in this study, are inserted in the cover noise image for the purpose of secret authentication. Such bits also appear to be noise due to their randomness nature. The secret image can be recovered from the cover noise image at a receiver site with their fidelity being authenticated to achieve the goal of secure covert communication.

In the remainder of this paper, we describe the proposed method by giving an algorithm for hiding a secret binary image behind a cover noise image in Section U, and a corresponding algorithm for recovering the secret image from the cover noise image and authenticating the recovered image in Section III. Some experimental results are given in Section IV, followed by some conclusions and discussions on the merits of the proposed approach.

2.

Hiding Secret Binary Images behind Cover Noise Images

The proposed algorithm for hiding a given secret binary image processes the image block by block by creating a noise image block from each given secret image block. Each noise block is created to be a little bit larger than the original secret block, allowing extra pixels for embedding authentication bits. The details are as follows. See Figure 1 for illustrations of the intermediate results of the algorithm.

Algorithm 1: Hiding a secret binary image behind a cover noise image that includes authentication bits.

(a) A secret image block

Bi.

I I

1 0 1 1 1 0 1 0 1 (b) Created noise block

Bi

I .

(c) Selected pixel sets Ai (x's) and Ci (circled 1's & 0's) for authentication and secret covering.

(d) Final noise block

Bi

' covering the secret and including authentication bits.

Figure 1. Illustrations of intermediate results of Algorithm 1.

(3)

Input: A given secret binary image I of MxM blocks, with each block of size nxn, and a selected secret key K.

Output: A cover noise image I' of MxM blocks, with each block of size mxm and including authentication bits, where

=mxm-nxn>O.

Steps.

1. For each image block Bi of I where i = 1, 2 ,

. . .

, MxM, perform the following steps until all blocks of I are processed.

2. (Generating a key for use in each block) Use a random number generator gl, with the input key K as the seed, to create a key ICi for Bi.

3. (Creating a random noise block) Use another random number generator gl,

with Ki as the seed, to generate sequentially mxm random bmary values (Os or 1's) to create a noise image block Bi' O f I ' .

4. (Selecting pixels for secret covering and authentication) Use a third random generator gj, with Ki as the seed again, to select randomly pixels in B,' as a set

5 .

6.

A, for embedding authentication bits later.

And collect the remaining nxn pixels as another set C, for covering the secret data of B, later.

(Covering the secret by noise) In a manner of raster-scanning the secret image block B, and the noise pixel set C,, apply the exclusive-OR operation to the binary values of every pair of corresponding pixels, one pixel p i from B, and the other pz from C,, and fill the resulting value into p ~ . Collect all the resulting bits in C, in a raster scanning sequence to form an nxn-bit binary number X,.

(Creating the authentication bits) Use a fourth random number generator g4, with X , as the seed, to generate an -bit binary number Y,, and fill the bits of

Y,

in a raster scanning sequence into the pixels of A , as the authentication bits.

3. Secret Image Recovering and Authentication

The process of secret image recovering and authentication, described as Algorithm 2 below, is basically a reverse process of the secret hiding process described by Algorithm 1. Also, if any image block is checked to be tampered, the entire image is claimed to be unauthentic and the algorithm is stopped.

Algorithm 2: Recovering a secret image from a cover noise image and checking its authenticity.

Input: A cover noise image I of MxM blocks with each block of size rnxm, and the selected secret key K used in secret hiding.

Output: A recovered secret image I with each block of size nxn, and the authenticity of I, where mxm - nxn =

.

Steps : 1.

2.

3.

4.

For each block Bi' of I' where i = 1, 2,

...,

MxM, perform the following steps until all blocks of I' are processed.

(Generating a key for use in each block) Use the random number generator gl employed in Algorithm 1, with the input key K as the seed, to create a key K, for

Bi'.

(Selecting pixels for extracting authentication bits and recovering the secret) Use the third random generator g3 employed in Algorithm 1, with &, as the seed, to select pixels in Bi ' as a set Ai for extracting authentication bits later.

And collect the remaining nxn pixels as another set Ci for recovering the secret data later.

(Extracting the authentication bits) Collect the values of the pixels of C, in a raster scanning sequence to form an nxn-bit binary number

Xi,

and use the fourth random number generator g4 employed in Algorithm 1, with X , as the

(4)

Yi.

5. (Checking the authenticity of the secret image block) Collect the values of the pixels of Ai in a raster scanning sequence to form an -bit binary number

Y,

' , and compare Y;' with Yi. If they are not identical, report that the corresponding secret image block Bi is tampered and stop the algorithm; otherwise, perform the following steps to recover Bi.

6. (Creating a random noise block) Use the random number generator gl employed in Algorithm 1, with Ki as the seed, to yield a sequence of random binary values (0's or 1's) to create an mxm noise image block R,.

7. (Recovering the secret image block) In a manner of raster-scanning the noise blocks Ri and Ci, apply the exclusive-OR operation to the values of every pair of corresponding pixels, one pixel PI from

Ri

and the other pz from Ci, and fill the resulting binary value into p2. Collect all the resulting bits in C, to form an nxn block Bi in the recovered secret image I.

It is noted here that the exclusive-OR operations conducted in Step 7 above indeed will recover the original secret bit because of the following property of the operation

(denoted as 0): if b1@b2 =

&

(computed in Step 5 in Algorithm I), then b@b* = (computed in Step 7 in Algorithm 2), where bl, b2, and b3 are binary values, and b, is the secret bit.

(b10b2)0b2 = bl0(b&b2) = b100 = bl

4. Experimental Results

Some binary images have been tested in our experiments. An example of the results is shown in Figure 2. Figure 2(a) shows a secret binary image of size 1024x768 to be transmitted in a covert communication session, and Figure 2(b) shows the cover noise image of size 1152x864 resulting from Algorithm 1 with a key K = 1234, which can be seen to be random enough to cover the original secret image effectively. The block sizes adopted in the algorithms are nxn = 8x8 = 64 and mxm = 9x9 = 81, so that the number of extra authentication bits in each block is = 81 -

64 = 17. This number may be reduced if the requirement for each block in the cover noise image to be square is relaxed. In this case, we may take a block in the noise image, say, to be nxm, so that = n = 8 here. The recovered secret image after applying Algorithm 2 to the image of Figure 2(b) is exactly that shown in

(b) Cover noise image resulting from Algorithm 1

of experimental results.

(5)

Figure 2(a). When an erroneous key is input to Algorithm 2, the algorithm will stop at Step 5 with no output.

5. Conclusions

A new approach to covert communication has been proposed, which may be employed to hide secret binary images behind noise ones with an additional capability of secret authentication. There is no need to seek a meaningful cover image for hiding the secret;

instead, the cover image, which is full of random noise, is created directly from the secret image itself. This provides an alternative way for steganography. Since noise images tend to be ignored when they are intercepted in a communication process, hopefully more steganographic or cheating effect can be achieved in covert communication applications.

Another merit of the proposed approach is that a larger data-embedding capacity can be provided by the cover noise image, because each pixel of a cover noise image can be utilized to hide a secret data bit imperceptibly.

This merit is not found in other approaches dealing with binary data. Furthermore, differing from most data hiding techniques by which secret binary images cannot be recovered perfectly after they are embedded, the proposed method ensures full recoverability of hidden secret data from cover noise images.

References

R

Om,

et al., “Covert communications employing wavelet technology,” The Twenty-Seventh Asilomar Conference on Signals, Systems and Computers, Pacific Grove, California, November 1993.

J. T. Wittbold, “Controlled signaling systems and covert channels,”

Proceedings of the 1989 Computer Security Foundations Workshop II, Franconia, N. H., June, 1989, pp. 87-104.

B. Schneier, AppIied Cryptography:

Protocols, Algorithms, and Source Code

in C, 2nd ed. John Wiley & Sons, New York, 1995.

M. Wu, E. Tang, and B. Liu, “Data hiding in digital binary images,” presented at the IEEE International Conference on Multimedia and Expositions, New York, 2000.

Y.-C. Tseng, Y.-Y. Chen, and H.-K. Pan,

“A secure data hiding scheme for binary images,” IEEE Transactions on Communications, vol. 50, no. 8, August

S . H. Low, N. F. Maxemchuk, and A. M.

Lapone, “Document identification for copyright protection using centroid detection,” IEEE Transactions on Communications, vol. 46, no. 3, March [7] D. Huang and H. Yan, “Jntenvord distance changes represented by sine waves for watermarking text images,”

IEEE Transactions on Circuits and Systems for Wdeo Technology, vol. 11, no.

12, pp. 1237-1245, December 2001.

[4]

[5]

2002, pp. 1227-1231.

[6]

1998, pp. 372-383.

數據

Figure  1. Illustrations of intermediate results  of Algorithm  1.

參考文獻

相關文件

In this paper, we propose a practical numerical method based on the LSM and the truncated SVD to reconstruct the support of the inhomogeneity in the acoustic equation with

In this paper we prove a Carleman estimate for second order elliptic equa- tions with a general anisotropic Lipschitz coefficients having a jump at an interface.. Our approach does

In this paper, we have studied a neural network approach for solving general nonlinear convex programs with second-order cone constraints.. The proposed neural network is based on

In this paper, we extended the entropy-like proximal algo- rithm proposed by Eggermont [12] for convex programming subject to nonnegative constraints and proposed a class of

In this paper, we build a new class of neural networks based on the smoothing method for NCP introduced by Haddou and Maheux [18] using some family F of smoothing functions.

In summary, the main contribution of this paper is to propose a new family of smoothing functions and correct a flaw in an algorithm studied in [13], which is used to guarantee

For the proposed algorithm, we establish a global convergence estimate in terms of the objective value, and moreover present a dual application to the standard SCLP, which leads to

For the proposed algorithm, we establish its convergence properties, and also present a dual application to the SCLP, leading to an exponential multiplier method which is shown