Upload
jeffery-austin
View
217
Download
0
Tags:
Embed Size (px)
Citation preview
1
Data Hiding in a Kind of PDF Texts for Secret Communication
Authors : S.P. Zhong, X.Q. Cheng, and T.R. Chen
Source : International Journal of Network Security, vol. 4, no. 1, pp. 17-26, 2007
Presenter : Ping-Kun Hsu(許鈵昆 )
Date : 2011/01/21
2
Outline
Introduction TJ Operator Logistic Chaotic Map The Proposed Scheme Experiment Result Analysis Conclusion Comment
3
Introduction
Goal Hiding secret data in PDF file to achieve
the undetectability, perceptual transparency, and capacity.
Related Works TJ Operator Logical Chaotic Map
5
Logistic Chaotic Map
Xn+1 = r × Xn × (1-Xn)0≦ Xn ≦1, 0 ≦ r ≦4
If 3.57 ≦ r ≦4, the iteration values are random
The Proposed Scheme(1/5)Secret data
Key
Logistic chaotic map
Map 1Map
2
Start point
Num1 Num2
0101|1010
5 | 10
SHA-1
01011011
91 mod 16
11
FlagStr2
IND6
SHA-1
01011010
90 mod 16
10
FlagStr1
Transformed data
FlagStr2
7
The Proposed Scheme(2/5)
[<01> 4 <02> -2 <03> 20 <04> 15 <05>]TJ
If the absolute value of the integer numeral is in
[1,16]
If the Num2 is bigger than φ
Replace the integer numeral by the numeral in IND
10,11,12
Replace the integer numeral by the numeral transformed
from Num1
yes no
yes
Keep the integer numeral constant
no
[<01> 10<02>11 <03> 20 <04>12 <05>]TJ
IND
8
The Proposed Scheme(3/5) Key
SHA-1
01011011
91 mod 16
11
FlagStr
FlagStr
Map 2
Start point
Num2
Logistic chaotic map
9
The Proposed Scheme(4/5)
If the absolute value of the integer numeral is in
[1,16]
If the Num2 is bigger than φ
Extract the integer numeral and
check the next integer numeral
Check the next integer numeral
yes no
yesno
[<01> 10<02>11 <03> 20 <04>12 <05>]TJ
10
The Proposed Scheme(5/5) CheckSt
rEmbedded
DataFlagStr
2
SHA-1
compare
Data have been extracted successfully
Data may have been tampered
noyes