Title: Recent Developments on Multimedia and Secure Networking Technologies
1???????????
- ???
- ???? ????
- ???? ????
- ???? ????
2 - Watermarking
- Image authentication
- Secret sharing
- Visual cryptography
- Steganography
3Watermarking
- Visible watermarking
- Easy to embed
- Clear to see watermark
4Watermarking (Cont.)
- Invisible watermarking
- Requirements
- Good visual quality of watermarked image
- Robustness
Watermarking
Watermarked image
Original image
Watermark
5Image authentication
- Requirements
- Detect the tampered area
- Try to restore the tampered area
Tampered image
Detected image
Restored image
Image
6Secret sharing
- Classification
- Meaningless shadows
- Meaningful shadows
7Secret sharing (Cont.)
Sharing
Shadow size 256 ? 256
Image size 512 ? 512
Reconstructing
(2,4)-threshold secret sharing scheme
PSNR24 dB
8Secret sharing (Cont.)
Reconstructing
Hiding
Stego-image
Reconstructed secret image
Secret image
Stego-image
(2, n)-threshold secret sharing scheme
Stego-image
9Visual cryptography
Stacking
Shadow 1
Shadow 2
Secret
10Visual cryptography (Cont.)
shadow1
cover image1
stego image1
cover image2
stego image2
shadow2
11Visual cryptography (Cont.)
stego image1
stego image2
stacked result
12Visual cryptography (Cont.)
shadow1
cover image1
stego image1
cover image2
stego image2
shadow2
13Visual cryptography (Cont.)
stego image1
stego image2
stacked result
14Visual cryptography (Cont.)-Meaningful and
Progressive
- Meaningful shares friendly content
- Progressive visual cryptography
- Improve the stacked result progressively
-
15Visual cryptography (Cont.) -Progressive Visual
Cryptography (t, 6)
(2, 6)
(3, 6)
(4, 6)
(5, 6)
(6, 6)
16Visual cryptography (Cont.) -Experimental Results
(2, 6)
(3, 6)
(4, 6)
(5, 6)
(6, 6)
17Visual cryptography (Cont.)
Stacking
Shadow 1
Shadow 2
Secret
1818
Visual cryptography (Cont.)-Authentication
Participant 1
Share 1
Recovered secret image
Participant 2
Share 2
19Visual cryptography (Cont.)
Share 1
Share 2
20Visual cryptography (Cont.)
Tampered share 1
Share 2
21Visual cryptography (Cont.)
Rotating 40o
Stacking
Stacking
Share 2
Share 1
Secret 1 VISUAL
Secret 2 SECRET
22Steganography
- The targets
- Frequency domain (e.g. DCT, DWT, DFT)
- Spatial domain (e.g. pixel values)
- Compression domain (e.g. VQ)
- Text
- Restoration
- Irreversible
- Reversible
23Steganography (Cont.)
24Steganography (Cont.) -Kim et al.s Method
9 0 1 2 3 4 5 6 7 8 0
8 6 7 8 0 1 2 3 4 5 6
7 3 4 5 6 7 8 0 1 2 3
6 0 1 2 3 4 5 6 7 8 0
5 6 7 8 0 1 2 3 4 5 6
4 3 4 5 6 7 8 0 1 2 3
3 0 1 2 3 4 5 6 7 8 0
2 6 7 8 0 1 2 3 4 5 6
1 3 4 5 6 7 8 0 1 2 3
0 0 1 2 3 4 5 6 7 8 0
0 1 2 3 4 5 6 7 8 9
25Kim et al.s Method (Embedding)
5 8 8 3 4 8 7 6
8 6 7 7 8 3 1 2
6 3 5 6 8 2 1 5
6 5 4 7 3 5 2 8
6 5 4 3 2 1 5 1
1 2 5 1 3 4 1 6
8 2 3 3 1 6 4 5
1 8 7 5 3 2 6 3
9 0 1 2 3 4 5 6 7 8 0
8 6 7 8 0 1 2 3 4 5 6
7 3 4 5 6 7 8 0 1 2 3
6 0 1 2 3 4 5 6 7 8 0
5 6 7 8 0 1 2 3 4 5 6
4 3 4 5 6 7 8 0 1 2 3
3 0 1 2 3 4 5 6 7 8 0
2 6 7 8 0 1 2 3 4 5 6
1 3 4 5 6 7 8 0 1 2 3
0 0 1 2 3 4 5 6 7 8 0
0 1 2 3 4 5 6 7 8 9
Cover Image
Cover Image
6 9 7 3 9 8 7 6
8 9 7 7 9 3 1 2
6 3 5 6 8 2 1 5
6 5 4 7 9 5 2 8
6 5 9 3 2 1 5 1
1 2 5 1 3 4 1 6
8 2 9 3 9 6 4 5
1 8 7 5 3 2 6 9
Stego Image
Stego Image
26Kim et al.s Method (Embedding)
6 9 7 3 9 8 7 6
8 9 7 7 9 3 1 2
6 3 5 6 8 2 1 5
6 5 4 7 9 5 2 8
6 5 9 3 2 1 5 1
1 2 5 1 3 4 1 6
8 2 9 3 9 6 4 5
1 8 7 5 3 2 6 9
9 0 1 2 3 4 5 6 7 8 0
8 6 7 8 0 1 2 3 4 5 6
7 3 4 5 6 7 8 0 1 2 3
6 0 1 2 3 4 5 6 7 8 0
5 6 7 8 0 1 2 3 4 5 6
4 3 4 5 6 7 8 0 1 2 3
3 0 1 2 3 4 5 6 7 8 0
2 6 7 8 0 1 2 3 4 5 6
1 3 4 5 6 7 8 0 1 2 3
0 0 1 2 3 4 5 6 7 8 0
0 1 2 3 4 5 6 7 8 9
Stego Image
Stego Image
27Zhang and Wangs Method(Embedding)
8 7 9 4
79 54 55 11
20 21 12 24
12 10 10 9
Secret data 1000 1011
p2
255
0
1
2
3
4
0
1
2
3
4
0
1
10002 1 35
11
2
3
4
0
1
2
3
4
0
1
2
3
2
10
0
1
2
3
4
0
1
2
3
4
0
1
0
Cover image
9
3
4
0
1
2
3
4
0
1
2
3
4
3
8
1
2
3
4
0
1
2
3
4
0
1
2
1
7
4
0
1
2
3
4
0
1
2
3
4
0
4
6
2
3
4
0
1
2
3
4
0
1
2
3
2
7 7 10 4
5
0
1
2
3
4
0
1
2
3
4
0
1
0
4
3
4
0
1
2
3
4
0
1
2
3
4
3
3
1
2
3
4
0
1
2
3
4
0
1
2
1
2
4
0
1
2
3
4
0
1
2
3
4
0
4
1
2
3
4
0
1
2
3
4
0
1
2
3
2
0
1
2
3
4
0
0
1
2
3
4
0
1
0
Stego image
p1
0
1
2
3
4
5
6
7
8
9
10
11
255
Magic Matrix
28Zhang and Wangs Method (Extracting)
p2
7 7 10 4
255
0
1
2
3
4
0
1
2
3
4
0
1
11
2
3
4
0
1
2
3
4
0
1
2
3
2
10
0
1
2
3
4
0
1
2
3
4
0
1
0
9
3
4
0
1
2
3
4
0
1
2
3
4
3
8
1
2
3
4
0
1
2
3
4
0
1
2
1
Stego image
7
4
0
1
2
3
4
0
1
2
3
4
0
4
6
2
3
4
0
1
2
3
4
0
1
2
3
2
5
0
1
2
3
4
0
1
2
3
4
0
1
0
4
3
4
0
1
2
3
4
0
1
2
3
4
3
3
1
2
3
4
0
1
2
3
4
0
1
2
1
2
4
0
1
2
3
4
0
1
2
3
4
0
4
1 35
1
2
3
4
0
1
2
3
4
0
1
2
3
2
0
1
2
3
4
0
0
1
2
3
4
0
1
0
p1
0
1
2
3
4
5
6
7
8
9
10
11
255
Magic Matrix
Extracted secret data 10002
29Sudoku
- A logic-based number placement puzzle
30Sudoku (Cont.)
- A Sudoku grid contains nine 3 3 matrices, each
contains different digits from 1 to 9. - Each row and each column of a Sudoku grid also
contain different digits from 1 to 9.
Possible solutions 6,670,903,752,021,072,936,960
(i.e. 6.6711021)
31Data Hiding Using Sudoku
- 1
Reference Matrix M
32Data Hiding Using Sudoku (Embedding) (Cont.)
8 7 11 12
79 54 55 11
20 21 12 24
12 10 10 9
Secret data 011 001 10
279
Cover Image
min.
d( , ) ((8-8)2(4-7)2)1/23 d( , )
((9-8)2(7-7)2)1/21 d( , )
((6-8)2(8-7)2)1/22.24
9 7
Stego Image
33Data Hiding Using Sudoku (Embedding) (Cont.)
8 7 11 12
79 54 55 11
20 21 12 24
12 10 10 9
Secret data 011 001 10
279
Cover Image
d( , ) ((11-11)2(15-12)2)1/23 d( , )
((15-11)2(12-12)2)1/24 d( , )
((9-11)2(14-12)2)1/22.83
min.
9 7 9 14
Stego Image
34Data Hiding Using Sudoku (Extracting) (Cont.)
9 7 9 14
Stego Image
Extracted data 279 011 0012
35Experimental Results
36Steganography (Cont.)
- Text
- ???? ???
- ????? ????
- ???? ???
- ????? ????
- ?????? ?????
- ????? ????
- ????? ????
- Video
- Sound
-
37Synonym substitution
0 wonderful 1 decent 2 fine 3 great 4
nice
Taichung is a
0 city 1 town
little
Secret message (3)5(1)2
Taichung is a great little town
37
38Information hiding in hypertext
Secret message
Embedding
Secret key
Extraction
Secret message
38
39Information hiding in hypertext
Secret 010110
0
Tags
text file
lthtmlgt ltheadgt ltmeta http-equiv"Content-Type"
content"text/html charsetbig5"gt lttitlegt
??????????? lt/titlegt lt/headgt ltbody
bgcolor"D27D1O"gt ltp align"center"gtltimg
border"0" src"msn.jpg" width"338"
height"345"gtlt/pgt ltp align"center"gtltfont
face"???" color"f4efe8" size"7"gt????lt/fontgtlt
/pgt lt/bodygt lt/htmlgt
ltMETA
39
40Information hiding in hypertext
text file
lthtmlgt ltheadgt ltmeta http-equiv"Content-Type"
content"text/html charsetbig5"gt lttitlegt
??????????? lt/titlegt lt/headgt ltbody
bgcolor"D27D1O"gt ltp align"center"gtltimg
border"0" src"msn.jpg" width"338"
height"345"gtlt/pgt ltp align"center"gtltfont
face"???" color"f4efe8" size"7"gt????lt/fontgtlt
/pgt lt/bodygt lt/htmlgt
ltHTMLgt
ltMETA
ltbody
ltp
lt/HTMLgt
Secret 010110
40
41Text steganography in chat
- Shirali-Shahreza, M.H., Shirali-Shahreza,
M., Text Steganography in Chat, Proceedings of
the Third IEEE/IFIP International Conference in
Central Asia on Internet the Next Generation of
Mobile, Wireless and Optical Communications
Networks, Tashkent, Uzbekistan, Sep. 2007, pp.
1-5.
41
42Text steganography in chat
SMS-Texting
42
43Text steganography in chat
- univ. ? university
- PC ? Personal Computer
- M.S. ? master of science
- UN ? United Nations
- Dr ? doctor
43
44Text steganography in chat
- SMS list abbreviated words list
- ? Check list
- 0 ? full form, 1 ? abbreviated form
44
45Text steganography in chat
- Embedding
- Please call me when you
feel upset. -
secret 10 - Please CM when you
feel upset. - Extracting
- Please CM when you feel
upset.
Check list
secret bits 10
45
46Thanks for your listening