recent developments on multimedia and secure networking technologies

Post on 09-Feb-2016

25 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Recent Developments on Multimedia and Secure Networking Technologies. Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University. Multimedia (Watermarking). Classifications: Visible watermarking Invisible watermarking - PowerPoint PPT Presentation

TRANSCRIPT

1

Recent Developments on Multimedia and Secure

Networking Technologies

Chair Professor Chin-Chen ChangFeng Chia UniversityNational Chung Cheng University National Tsing Hua University

2

Multimedia (Watermarking) Classifications:

Visible watermarking Invisible watermarking Robust watermarking Semi-fragile watermarking Fragile watermarking

3

Multimedia (Watermarking) (Cont.) Visible watermarking

Easy to embed Clear to see watermark

4

Multimedia (Watermarking) (Cont.) Invisible watermarking

Requirements: Good visual quality of watermarked image Robustness

Watermarking

Watermarked imageOriginal imageWatermark

5

Multimedia (Image authentication) Requirements:

Detect the tampered area Try to restore the tampered area

Solutions: Hamming codes

Image Tampered image Detected image Restored image

6

Multimedia (Steganography) Classification:

The target of modification Frequency domain (e.g. DCT, DWT, DFT) Spatial domain (e.g. pixel values) Compression domain (e.g. VQ, LAC, SOC)

Stego image restoration Irreversible data hiding Reversible data hiding

7

Multimedia (Steganography) (Cont.) Irreversible data hiding

Requirements: High capacity Good visual quality of stego images

Solutions: Using Sudoku Using wet paper codes concept Using Hamming codes

8

Multimedia (Steganography) (Cont.) Reversible

Requirements: Fully reconstructing cover image Good visual quality of stego image High capacity

Solutions: Data hiding in VQ indices Data hiding in LAC codes Data hiding in SOC codes …

9

Multimedia (Secret sharing) Classification:

Meaningless shadows Meaningful shadows

Meaningless shadows Requirements:

Unexpected user can not see the secret image

Good visual quality of reconstructed secret image

10

Multimedia (Secret sharing) (Cont.)

Shadow size: 256 256Image size: 512 512

Sharing

Reconstructing

PSNR=24 dB

(2,4)-threshold secretsharing scheme

11

Multimedia (Secret sharing) (Cont.) Meaningful shadows

Requirements: Good visual quality of stego image Secret image extraction and reconstruction

Solutions: Applying steganography techniques Applying image authentication mechanisms

12

Multimedia (Secret sharing) (Cont.)

Secret image

Stego-image

Stego-image

Hiding

Reconstructed secret image

Reconstructing

(n,2)-threshold secretsharing scheme

Stego-image

13

Multimedia (Visual cryptography) Requirements:

Secret message delivery Unexpected user can not see the

message from an individual share Solutions:

Using shadow patterns Using meaningful shadow images Using Circle Shares

14

Multimedia (Visual cryptography) (Cont.)

Shadow 1 Shadow 2

Secret

Staking

15

Multimedia (Visual cryptography) (Cont.)

Shadow 1 Shadow 2

Secret

Staking

16

Multimedia (Visual cryptography) (Cont.)

Share 1 Share 2

Secret 1 “VISUAL” Secret 2 “SECRET”

Staking Staking

Rotating 40o

17

Multimedia (Threshold) Requirements:

Segment the objects on image Low computation cost

Original image Segmented image

Threshold value T=53

Histogram

Class 2Class 1

18

Secure Networking Fast Computation Algorithms for Cryptography

Requirements: Large number computations Low computation cost

Solutions: Fast division algorithm using residue number system (RNS) Fast conversion algorithms in RNS using Aryabhata remainder theorem (ART) Fast RNS modular multiplication and exponentiation algorithms

19

Secure Networking (Cont.) Secure Communication

Secure E-mail protocols Requirements

Reduce the computation cost of client devices Achieve perfect forward secrecy

Solutions: Using low cost functions (e.g. one-way hash

functions)

20

Secure Networking (Cont.) Anonymity for Roaming Service

Requirements: Avoid possible attacks (e.g. replay attacks,

forgery attacks, known-key attacks) Achieve the property of anonymity

Solutions: Using low cost functions Using smart card Using nonce to replace timestamp

21

Secure Networking (Cont.) Authentication in WLAN

Requirements: Prevent impersonation attacks Protect personal privacy

Solutions: Using mutual authentication Feasible computational complexity Using session keys

22

Secure Networking (Cont.) Key Exchange

2. Service request1. Issue an IC card

Users

Authentication Center (AC)IC Card Issuing Center

Remote Server

3. Authentication and key exchange

23

Secure Networking (Cont.) Requirements:

Freely choose identity and password Password modification Mutual authentication Common session key distribution Reduce computation cost

24

Secure Networking (Cont.) E-commerce Application

Electronic check Payer’s identity appending E-checks generation Payer and payee verification

E-traveler’s check Unique identity for the e-traveler’s check E-traveler’s check can only be generated by check –issuing bank or an authorized organization

top related