session key sharing scheme using steganography without
TRANSCRIPT
1
†1 †1 †1
†2 †3 †4 †5
AKE
20 19
Session Key Sharing Scheme Using Steganography without Third Party
Hitoshi MIYAZAKI†1 Masaki FUKUMOTO†1 Kaori OKUMURA†1
Youji FUKUTA†2 Masanori HIROTOMO†3 Masami MOHRI†4 Yoshiaki SHIRAISHI†5
At a service window, we are sometimes identified directly by identification papers, and users and a teller communicate in a partitioned place to avoid other’s eye. These correspond to encryption with session keys which vary according to sessions. The session key exchange with direct user identification enables to realize online windows. In this paper, we propose an object-based session key exchange scheme using steganography. The scheme enables direct identification with continuous still image of users, and does not require agency. We conducted a user experiment, and made sure that 19 out of 20 users could exchange a session key with accurate identification.
1.
[1]
†1 Nagoya Institute of Technology †2 Aichi University of Education †3 Saga University
†4 Gifu University
†5 Kobe University
[2]
ⓒ 2014 Information Processing Society of Japan
情報処理学会研究報告 IPSJ SIG Technical Report
Vol.2014-GN-90 No.21Vol.2014-CDS-9 No.21Vol.2014-DCC-6 No.21
2014/1/24
2
(AKE: Authenticated Key Exchange)AKE
AKE PKI(PKI: Public Key Infrastructure)AKE
AKE
PKI AKE
AKE
AKE
AKE
[3]
2
3
45
67
8
2.
1 1. 2.
1.
2
1-1.
1-2. 1-3. 1-4.
2.
1
Fig. 1 Step of identity verification at offline teller window.
ⓒ 2014 Information Processing Society of Japan
情報処理学会研究報告 IPSJ SIG Technical Report
Vol.2014-GN-90 No.21Vol.2014-CDS-9 No.21Vol.2014-DCC-6 No.21
2014/1/24
3
3.
AKE(
AKE) (PKIAKE)
3.1 AKE AKE ISO-9798-2
[4]
()
AKE
3.2 PKI AKE PKI AKE ISO-9798-3
[5]
PKI AKE (CA: Certificate Authority)
PKI AKE
4.
4.1 AKE 3 AKE PKI AKE
AKE
2
Fig. 2 Step of identity verification at online teller window.
ⓒ 2014 Information Processing Society of Japan
情報処理学会研究報告 IPSJ SIG Technical Report
Vol.2014-GN-90 No.21Vol.2014-CDS-9 No.21Vol.2014-DCC-6 No.21
2014/1/24
4
4.25 AKE
4.2
3
‘
’ ( )
‘ ’
‘ ’
‘ ’
‘ ’
[6]
[6]‘ ’
[3][7] [8] [9]
2
5. AKE
4
4
(1) … Diffie-Hellman(DH) [10]
(2) …
(3) …
1 1
(4) …
3 Fig. 3 Model of steganography.
4
Fig. 4 Model of the authenticated key exchange without third party.
Embed ExtractCover data
Embedding data
Stego key Stego key
Embedding dataStego data
Modify
Extract embedding dataDetect embedding data
Sender side Receiver side
Others
Embed ExtractCover data
Embedding data
Stego key Stego key
Embedding dataStego data
Sender Receiver
Camera Display
DH key exchange
ⓒ 2014 Information Processing Society of Japan
情報処理学会研究報告 IPSJ SIG Technical Report
Vol.2014-GN-90 No.21Vol.2014-CDS-9 No.21Vol.2014-DCC-6 No.21
2014/1/24
5
(3) (4)
( )
(2)
1
6.
6.1 DH
DH [10]
,
,
DH[10]
6.2
AES
7.
PSNR(dB)
7.1
ⓒ 2014 Information Processing Society of Japan
情報処理学会研究報告 IPSJ SIG Technical Report
Vol.2014-GN-90 No.21Vol.2014-CDS-9 No.21Vol.2014-DCC-6 No.21
2014/1/24
6
PC
Web
LAN
(C) PC
(S)
C S
5
(1)
Step1-1 C S DH k
Step1-2 S k h()dk =h(k) tk
k, dk, tk Step1-3 C k dk k, dk
C mC S m m(i), i=1, 2,…, N
(2) (4) (2)
Step2-1 C dk Step2-2 dk
Step2-3 C
cov(i) (3)
Step3-1 Cdm(i)=h(i || N || m(i)) emb(i)={i,
N, m(i), dm(i)} Step3-2 C k ste(i)= Aemb(cov(i), emb(i), k, p) S Aemb()
p
Step3-3 S ts(i) ts(i) - tk < , ste(i) ts(i) S
(4) Step4-1 S kemb(i)=Aext(ste(i), k, p) i, N, m(i)
h(i || N || m(i))==dm(i) Aext()i, N, m(i)
m(i)
S Step4-2 S ste(i), i=1, 2,…
dk
dk
m(i), i=1, 2,…
C Java Android API 14(Android OS 4.0) UDP
ASUS Nexus7(2012) Android OS 4.4 S Java JDK7.0 Java MediaFramework2.1.1e UDP
Web HP HD WebcamPC OS Windows7 Pro 64bit 8GB
CPU Intel Core i5 3210M 2.5GHz NIC Realtek PCIe GBE Family Controller
emb(i), i=1,2,…, Npixs Remb pixs >> | emb(i)|, i=1,2,…,N
N, |emb(i)|, p Remb
Aemb()Aext()
MBNS [11]ppm R 256
MBNS
5
Fig. 5 Construction of the evaluation software program.
Stegosender
Stegoreceiver
Camera
Media recorder
Media player
Display
EmbedderExtractor
Key exchanger
Key exchangerClient
controllerServer
controller(1)
Stego keyStego key
Cover data
Display
Stego key digest
Stego key digest…
Sender
Stego dataEmbedding
data
Stego data
Stego data
Embeddingdata
Receiver
(2)
(3)
(3) (3)
(4)
(4)
(1)
Client Server
ⓒ 2014 Information Processing Society of Japan
情報処理学会研究報告 IPSJ SIG Technical Report
Vol.2014-GN-90 No.21Vol.2014-CDS-9 No.21Vol.2014-DCC-6 No.21
2014/1/24
7
3p =1/
7.2
PSNR=10 log10(256-1)2/MSE, MSE=1/(h w) i j (P(i, j) - P’(i, j))2
h w 256
PSNR36dB
[12]
N ppm h wL
1/ UDPR PSNR(dB)
( /sec) PC
IEEE802.11n( 65Mbps) LAN1000Base-T LAN
|emb(i)|=19byte(|i|=1byte,|N|=1byte,|m(i)|=1byte,|dm(i)|=16byte)160x120 240x180 2
256bit240x180 1
240 180 3 = 1.296 10 byte 119byte
256bit 1bit256 i N
1byte1 8bit
2bit Step4-2
30 1PSNR
36dB
10 /sec 256bit10
7.3
22 25 20
1 PC
1 1
4
1 ppm 160x120, 240x180PSNR(dB) ( /sec) (N=256 L=2561/ =2.0 ) Table 1 Average PSNR(dB) and receiving speed of the stego images(frame/sec) for 160x120 and 240x180 ppm images (N=256, L=256, 1/ =2.0).
PSNR (dB)
( /sec)
160x120 59.7 17.1
240x180 63.5 11.1
ⓒ 2014 Information Processing Society of Japan
情報処理学会研究報告 IPSJ SIG Technical Report
Vol.2014-GN-90 No.21Vol.2014-CDS-9 No.21Vol.2014-DCC-6 No.21
2014/1/24
8
2 20 19
1
8.
AKE
160x120 PSNR 59.7dB17.1 /sec 240x180
PSNR 63.5dB 11.1 /sec
20 19
AKE
AKE
1) Yahoo!JAPAN Yahoo!
( )<http://auctions.yahoo.co.jp/phtml/auc/jp/notice/instances/example.html>( 2013-12-19)
2)
2012 Vol.2012 No.3pp.547-554(2012)
3) A Vol.J93-A No.2 pp.52-61(2010)
4) ISO/IEC 9798-2 Information technology - Security techniques - Entity authentication-Part2:Mechanisms using symmetric encipherment algorithms.
5) ISO/IEC 9798-3 Information technology - Security techniques - Entity authentication-Part3:Mechanisms using digital signature techniques.
6) " " vol.44 no.3 pp.227-235(2003)
7)
D-II Vol.J88-D-II No.6 pp.1012-1023(2005) 8)
D Vol.J90-D No.12 pp.3246-3256(2007) 9) G.711
D Vol.J91-D No.4pp.1069-1081(2008)
10) Diffie, W. and Hellman, M.: New Directions in Cryptography., IEEE Trans. Information Theory, Vol.22, No.6, pp.644-654(1976).
11) Zhang, X. and Wang, S.: Steganography Using Multiple-Base Notational System and Human Vision Sensitivity, IEEE Signal Processing Letters, Vol.12, No.1, pp.67-70(2005).
12) Wu, N.,I., Wang, C.,M., and Hwang, M.,S.: Data Hiding: Current Status and Key Issues, International Journal of Network Security, Vol.4, No.1, pp.1-9(2007).
2 Table 2 Result of user experiment using the system for evaluations.
19 1
1 19
20 0
0 20
ⓒ 2014 Information Processing Society of Japan
情報処理学会研究報告 IPSJ SIG Technical Report
Vol.2014-GN-90 No.21Vol.2014-CDS-9 No.21Vol.2014-DCC-6 No.21
2014/1/24