session key sharing scheme using steganography without

8
1 1 †1 †1 †2 †3 †4 †5 AKE 20 19 Session Key Sharing Scheme Using Steganography without Third Party Hitoshi MIYAZAKI 1 Masaki FUKUMOTO †1 Kaori OKUMURA †1 Youji FUKUTA †2 Masanori HIROTOMO †3 Masami MOHRI †4 Yoshiaki SHIRAISHI †5 At a service window, we are sometimes identified directly by identification papers, and users and a teller communicate in a partitioned place to avoid other’s eye. These correspond to encryption with session keys which vary according to sessions. The session key exchange with direct user identification enables to realize online windows. In this paper, we propose an object-based session key exchange scheme using steganography. The scheme enables direct identification with continuous still image of users, and does not require agency. We conducted a user experiment, and made sure that 19 out of 20 users could exchange a session key with accurate identification. 1. [1] †1 Nagoya Institute of Technology †2 Aichi University of Education †3 Saga University †4 Gifu University †5 Kobe University [2] 2014 Information Processing Society of Japan 情報処理学会研究報告 IPSJ SIG Technical Report Vol.2014-GN-90 No.21 Vol.2014-CDS-9 No.21 Vol.2014-DCC-6 No.21 2014/1/24

Upload: others

Post on 07-Jun-2022

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Session Key Sharing Scheme Using Steganography without

1

†1 †1 †1

†2 †3 †4 †5

AKE

20 19

Session Key Sharing Scheme Using Steganography without Third Party

Hitoshi MIYAZAKI†1 Masaki FUKUMOTO†1 Kaori OKUMURA†1

Youji FUKUTA†2 Masanori HIROTOMO†3 Masami MOHRI†4 Yoshiaki SHIRAISHI†5

At a service window, we are sometimes identified directly by identification papers, and users and a teller communicate in a partitioned place to avoid other’s eye. These correspond to encryption with session keys which vary according to sessions. The session key exchange with direct user identification enables to realize online windows. In this paper, we propose an object-based session key exchange scheme using steganography. The scheme enables direct identification with continuous still image of users, and does not require agency. We conducted a user experiment, and made sure that 19 out of 20 users could exchange a session key with accurate identification.

1.

[1]

†1 Nagoya Institute of Technology †2 Aichi University of Education †3 Saga University

†4 Gifu University

†5 Kobe University

[2]

ⓒ 2014 Information Processing Society of Japan

情報処理学会研究報告 IPSJ SIG Technical Report

Vol.2014-GN-90 No.21Vol.2014-CDS-9 No.21Vol.2014-DCC-6 No.21

2014/1/24

Page 2: Session Key Sharing Scheme Using Steganography without

2

(AKE: Authenticated Key Exchange)AKE

AKE PKI(PKI: Public Key Infrastructure)AKE

AKE

PKI AKE

AKE

AKE

AKE

[3]

2

3

45

67

8

2.

1 1. 2.

1.

2

1-1.

1-2. 1-3. 1-4.

2.

1

Fig. 1 Step of identity verification at offline teller window.

ⓒ 2014 Information Processing Society of Japan

情報処理学会研究報告 IPSJ SIG Technical Report

Vol.2014-GN-90 No.21Vol.2014-CDS-9 No.21Vol.2014-DCC-6 No.21

2014/1/24

Page 3: Session Key Sharing Scheme Using Steganography without

3

3.

AKE(

AKE) (PKIAKE)

3.1 AKE AKE ISO-9798-2

[4]

()

AKE

3.2 PKI AKE PKI AKE ISO-9798-3

[5]

PKI AKE (CA: Certificate Authority)

PKI AKE

4.

4.1 AKE 3 AKE PKI AKE

AKE

2

Fig. 2 Step of identity verification at online teller window.

ⓒ 2014 Information Processing Society of Japan

情報処理学会研究報告 IPSJ SIG Technical Report

Vol.2014-GN-90 No.21Vol.2014-CDS-9 No.21Vol.2014-DCC-6 No.21

2014/1/24

Page 4: Session Key Sharing Scheme Using Steganography without

4

4.25 AKE

4.2

3

’ ( )

‘ ’

‘ ’

‘ ’

‘ ’

[6]

[6]‘ ’

[3][7] [8] [9]

2

5. AKE

4

4

(1) … Diffie-Hellman(DH) [10]

(2) …

(3) …

1 1

(4) …

3 Fig. 3 Model of steganography.

4

Fig. 4 Model of the authenticated key exchange without third party.

Embed ExtractCover data

Embedding data

Stego key Stego key

Embedding dataStego data

Modify

Extract embedding dataDetect embedding data

Sender side Receiver side

Others

Embed ExtractCover data

Embedding data

Stego key Stego key

Embedding dataStego data

Sender Receiver

Camera Display

DH key exchange

ⓒ 2014 Information Processing Society of Japan

情報処理学会研究報告 IPSJ SIG Technical Report

Vol.2014-GN-90 No.21Vol.2014-CDS-9 No.21Vol.2014-DCC-6 No.21

2014/1/24

Page 5: Session Key Sharing Scheme Using Steganography without

5

(3) (4)

( )

(2)

1

6.

6.1 DH

DH [10]

,

,

DH[10]

6.2

AES

7.

PSNR(dB)

7.1

ⓒ 2014 Information Processing Society of Japan

情報処理学会研究報告 IPSJ SIG Technical Report

Vol.2014-GN-90 No.21Vol.2014-CDS-9 No.21Vol.2014-DCC-6 No.21

2014/1/24

Page 6: Session Key Sharing Scheme Using Steganography without

6

PC

Web

LAN

(C) PC

(S)

C S

5

(1)

Step1-1 C S DH k

Step1-2 S k h()dk =h(k) tk

k, dk, tk Step1-3 C k dk k, dk

C mC S m m(i), i=1, 2,…, N

(2) (4) (2)

Step2-1 C dk Step2-2 dk

Step2-3 C

cov(i) (3)

Step3-1 Cdm(i)=h(i || N || m(i)) emb(i)={i,

N, m(i), dm(i)} Step3-2 C k ste(i)= Aemb(cov(i), emb(i), k, p) S Aemb()

p

Step3-3 S ts(i) ts(i) - tk < , ste(i) ts(i) S

(4) Step4-1 S kemb(i)=Aext(ste(i), k, p) i, N, m(i)

h(i || N || m(i))==dm(i) Aext()i, N, m(i)

m(i)

S Step4-2 S ste(i), i=1, 2,…

dk

dk

m(i), i=1, 2,…

C Java Android API 14(Android OS 4.0) UDP

ASUS Nexus7(2012) Android OS 4.4 S Java JDK7.0 Java MediaFramework2.1.1e UDP

Web HP HD WebcamPC OS Windows7 Pro 64bit 8GB

CPU Intel Core i5 3210M 2.5GHz NIC Realtek PCIe GBE Family Controller

emb(i), i=1,2,…, Npixs Remb pixs >> | emb(i)|, i=1,2,…,N

N, |emb(i)|, p Remb

Aemb()Aext()

MBNS [11]ppm R 256

MBNS

5

Fig. 5 Construction of the evaluation software program.

Stegosender

Stegoreceiver

Camera

Media recorder

Media player

Display

EmbedderExtractor

Key exchanger

Key exchangerClient

controllerServer

controller(1)

Stego keyStego key

Cover data

Display

Stego key digest

Stego key digest…

Sender

Stego dataEmbedding

data

Stego data

Stego data

Embeddingdata

Receiver

(2)

(3)

(3) (3)

(4)

(4)

(1)

Client Server

ⓒ 2014 Information Processing Society of Japan

情報処理学会研究報告 IPSJ SIG Technical Report

Vol.2014-GN-90 No.21Vol.2014-CDS-9 No.21Vol.2014-DCC-6 No.21

2014/1/24

Page 7: Session Key Sharing Scheme Using Steganography without

7

3p =1/

7.2

PSNR=10 log10(256-1)2/MSE, MSE=1/(h w) i j (P(i, j) - P’(i, j))2

h w 256

PSNR36dB

[12]

N ppm h wL

1/ UDPR PSNR(dB)

( /sec) PC

IEEE802.11n( 65Mbps) LAN1000Base-T LAN

|emb(i)|=19byte(|i|=1byte,|N|=1byte,|m(i)|=1byte,|dm(i)|=16byte)160x120 240x180 2

256bit240x180 1

240 180 3 = 1.296 10 byte 119byte

256bit 1bit256 i N

1byte1 8bit

2bit Step4-2

30 1PSNR

36dB

10 /sec 256bit10

7.3

22 25 20

1 PC

1 1

4

1 ppm 160x120, 240x180PSNR(dB) ( /sec) (N=256 L=2561/ =2.0 ) Table 1 Average PSNR(dB) and receiving speed of the stego images(frame/sec) for 160x120 and 240x180 ppm images (N=256, L=256, 1/ =2.0).

PSNR (dB)

( /sec)

160x120 59.7 17.1

240x180 63.5 11.1

ⓒ 2014 Information Processing Society of Japan

情報処理学会研究報告 IPSJ SIG Technical Report

Vol.2014-GN-90 No.21Vol.2014-CDS-9 No.21Vol.2014-DCC-6 No.21

2014/1/24

Page 8: Session Key Sharing Scheme Using Steganography without

8

2 20 19

1

8.

AKE

160x120 PSNR 59.7dB17.1 /sec 240x180

PSNR 63.5dB 11.1 /sec

20 19

AKE

AKE

1) Yahoo!JAPAN Yahoo!

( )<http://auctions.yahoo.co.jp/phtml/auc/jp/notice/instances/example.html>( 2013-12-19)

2)

2012 Vol.2012 No.3pp.547-554(2012)

3) A Vol.J93-A No.2 pp.52-61(2010)

4) ISO/IEC 9798-2 Information technology - Security techniques - Entity authentication-Part2:Mechanisms using symmetric encipherment algorithms.

5) ISO/IEC 9798-3 Information technology - Security techniques - Entity authentication-Part3:Mechanisms using digital signature techniques.

6) " " vol.44 no.3 pp.227-235(2003)

7)

D-II Vol.J88-D-II No.6 pp.1012-1023(2005) 8)

D Vol.J90-D No.12 pp.3246-3256(2007) 9) G.711

D Vol.J91-D No.4pp.1069-1081(2008)

10) Diffie, W. and Hellman, M.: New Directions in Cryptography., IEEE Trans. Information Theory, Vol.22, No.6, pp.644-654(1976).

11) Zhang, X. and Wang, S.: Steganography Using Multiple-Base Notational System and Human Vision Sensitivity, IEEE Signal Processing Letters, Vol.12, No.1, pp.67-70(2005).

12) Wu, N.,I., Wang, C.,M., and Hwang, M.,S.: Data Hiding: Current Status and Key Issues, International Journal of Network Security, Vol.4, No.1, pp.1-9(2007).

2 Table 2 Result of user experiment using the system for evaluations.

19 1

1 19

20 0

0 20

ⓒ 2014 Information Processing Society of Japan

情報処理学会研究報告 IPSJ SIG Technical Report

Vol.2014-GN-90 No.21Vol.2014-CDS-9 No.21Vol.2014-DCC-6 No.21

2014/1/24