利用網路聊天室傳送機密訊息 chair professor chin-chen chang feng chia university...
TRANSCRIPT
利用網路聊天室傳送機密訊息
Chair Professor Chin-Chen ChangFeng Chia University
National Chung Cheng University National Tsing Hua Universityhttp://msn.iecs.fcu.edu.tw/~ccc
http://msn.iecs.fcu.edu.tw/
2
Information hiding in general text Synonym substitution
Syntactic transformation
Translation
Semantic transformation
Information hiding in hypertext
Information hiding in binary text
Inter-word spacing schemes
Information hiding in chat text Text steganography in chat
Emoticon-based steganography in chat
3
Synonym substitution
Taichung is a 0 wonderful1 decent2 fine3 great4 nice
little0 city1 town
Secret message: (3)5(1)2
Taichung is a great little town
4
Syntactic transformationsSyntactic: the way that words and phrases are put together to form sentences in a language
5
Semantic transformation
• Grafting: adding or repeating information
• Pruning: removing repeated information
• Substitution: replacing information
Semantic :Describe things that deal with the meanings of words and sentences
6
Grafting
He is detained in Japan.
He, an American citizen, is detained in Japan.
7
Pruning
The Pentagon ordered two new spy planes to the region to start flying over Afghanistan.
Afghanistan has been under attack since October, and the Pentagon ordered two new spy planes to the region to start flying over there.
Afghanistan has been under attack since October
8
Substitution
The Pentagon ordered two new spy planes to the region to start flying over Afghanistan.
Afghanistan Taliban ruled country
The Pentagon ordered two new spy planes to the region to start flying over the Taliban ruled country.
9
Translation法文 : C’est la vie
英文 :That’s life.That is the life.It is the life.It’s life.
Message
Alice Bob
Stego object
Cover object
10
Rule # Rule CodeProb
.
(1) S -> AB 0 0.5
(2) S -> CB 1 0.5
(3) A -> It is 0 0.5
(4) A -> It’s 1 0.5
(5) C -> That is 0 0.5
(6) C -> That’s 1 0.5
(7) B -> life 0 0.5
(8) B -> the life 10 0.25
(9) B -> a life 11 0.25
Prefix Rule Output
1 (2) CB
0 (5) That is B
10 (8) That is the life
Secret: 1010
Translation
11
Inter-word spacing scheme 1
• This scheme exploits inter-word space of text to encode data.
Thisisabook.
Secret bits: {0 1 0}
Thisisabook.
12
Inter-word spacing scheme 2
Weemploythecombinationoftherepeatedwords…
Secret bits: { 1 0 1 1}Space change: + - +
We employthecombinationof therepeated words…
• Keep spaces between groups unchanged.
13
Add-pattern Delete-pattern
Information hiding in binary text
Binary image
14
Information hiding in binary text
• Embedding
Secret bit 0 : A-pattern D-pattern
D-pattern D-pattern
Secret bit 1 : D-pattern A-pattern
A-pattern A-pattern
• Extracting
D-pattern Secret bit 0
A-pattern Secret bit 1
15
Information hiding in hypertext
ExtractionExtractionSecret message
Secret message
EmbeddingEmbedding
Cover hypertext
Stego hypertext
Secret key
16
<html><head><meta http-equiv="Content-Type" content="text/html; charset=big5"><title> 多媒體暨網路安全實驗室 </title></head><body bgcolor="#D27D1O"><p align="center"><img border="0" src="msn.jpg" width="338" height="345"></p><p align="center"><font face=" 標楷體 " color="#f4efe8" size="7">~ 歡迎加入~</font></p></body></html>
Tagstext file
Secret: 010110…
<META
capital letterssmall letters
01
:the written states
01
</title>1
2
3
4
5
6
<HTML>
</HTML>
0110
<body
<p
Information hiding in hypertext
17
Secret: 010110…
<html><head><meta http-equiv="Content-Type" content="text/html; charset=big5"><title> 多媒體暨網路安全實驗室 </title></head><body bgcolor="#D27D1O"><p align="center"><img border="0" src="msn.jpg" width="338" height="345"></p><p align="center"><font face=" 標楷體 " color="#f4efe8" size="7">~ 歡迎加入~</font></p></body></html>
text file
<META12
3
4
5
6
<HTML>
</HTML>
<body
<p
capital letterssmall letters
01
:the written states
Information hiding in hypertext
18
Text steganography in chat
Shirali-Shahreza, M.H., Shirali-Shahreza, M., “Text Steganography in Chat,” Proceedings of the Third IEEE/IFIP International Conference in Central Asia on Internet the Next Generation of Mobile, Wireless and Optical Communications Networks, Tashkent, Uzbekistan, Sep. 2007, pp. 1-5.
19
Text steganography in chat
SMS-Texting
20
Text steganography in chat
Usual abbreviated words
• univ. university
• PC Personal Computer
• M.S. master of science
• UN United Nations
• Dr doctor
21
Text steganography in chat
• SMS list + abbreviated words list
Check list
• 0 full formfull form, 1 abbreviated formabbreviated form
22
Text steganography in chatEmbedding :
“Please call me when you feel upset.”
secret “10”
“Please CM when you feel upset.”
Extracting :
“Please CM when you feel upset.”
secret bits “10”
Check list
23
Emoticon-based steganography in chat
Emoticon-based Text Steganography in Chat
24
Phase1: Classify the emoticons by their meaning
Emoticon-based steganography in chat
25
Example: N = 16
hide log2N = 4 bits per emoticon sender uses second symbol receiver can extract 4 bits “0001”
Emoticon-based steganography in chat
26
Phase2: emoticon || sentence : secret = 0 sentence || emoticon : secret = 1
I lost my bag
I lost my bag
secret = 0
secret = 1
Emoticon-based steganography in chat
27
Phase3: emoticon , sentence : secret = 0 emoticon , sentence : secret = 1
, I lost my bag secret = 0
secret = 1I lost my bag
Emoticon-based steganography in chat
28
Zhihui wants to send secret bits “11100000111” to Alan3c.
1110
001||1||1Phase1Phase2
Alan3c says:Just a kidding, you are the nicest guy I know in the world.Zhihui says:
0 0Phase3
Alan3c says : You are a bad student!Zhihui says:
Emoticon-based steganography in chat
29
Future Research Direction
• Chinese text steganography
壞的毛病 壞毛病 山東的蘋果 山東蘋果 我的媽媽 我媽媽 主要的問題 主要問題 另外的一件事 另外一件事 其他的問題 其他問題 北京的大學 北京大學
30