• Aucun résultat trouvé

Robust Hashing and Data - - Hiding Hiding

N/A
N/A
Protected

Academic year: 2022

Partager "Robust Hashing and Data - - Hiding Hiding"

Copied!
24
0
0

Texte intégral

(1)

Stochastic Image Processing Group

Computer Vision and Multimedia Laboratory University of Geneva

Tamper

Tamper - - proofing of Electronic and proofing of Electronic and Printed Text Documents via

Printed Text Documents via Robust Hashing and Data

Robust Hashing and Data - - Hiding Hiding

R. Villán, S. Voloshynovskiy, O. Koval, F. Deguillaume, and T. Pun

(2)

Outline

§ Introduction

§ Self-Authentication of Documents

§ Gel'fand-Pinsker Text Data-Hiding

§ Robust Hashing of Text Documents

§ OCR + MAC Text Hashing

§ Random Tiling Text Hashing

§ Experimental Results

§ Conclusions

(3)

Introduction

K

H

§ Problems (for both electronic and printed docs):

§ Text document authenticationauthentication:

Is the document authentic? (global decision)

§ Text document tampertamper--proofing:proofing

Is the document locally modified? (local decision)

§ Possible solution:

Generation of the document's hash based on a secret key .

(4)

Introduction

Open issues:

§§ Hash storage:Hash storage

§§ Hash requirements:Hash requirements

in a remote electronic database,

onto the document itself using special means such as 2D bar codes, special inks or crystals, magnetic stripes, memory chips, etc.,

onto the document's content itself using data-hiding techniques (self-authentication).

robustness to legitimate modifications, sensitivity to attacks,

security.

(5)

Introduction

§§ Main advantagesMain advantages of the self-authentication approach:

§ authentication of the document is performed directly without accessing a hash database,

§ hash cannot be easily separated from the document like it is, if a dense 2D bar code is used for storing the hash.

§§ Main concernsMain concerns of the self-authentication approach:

§ limited data storage rate offered by current text data-hiding methods,

§ lack of reliable and secure robust text hashing functions.

§§ Main goalMain goal of our study:

§ to address the problem of limited data storage capacity of current text data-hiding technologies,

§ to study the properties of possibly good candidates for robust text hashing.

(6)

Self-Authentication of Documents

M ∈ M = {1, 2, . . . , |M|}, |M| = 2

N RDH

M ˜ ∈ M ˜ = {1, 2, . . . , | M|}, ˜ | M| ˜ = 2

N RH

K

DH

∈ K

DH

= {1, 2, . . . , |K

DH

|}

K

H

∈ K

H

= {1, 2, . . . , |K

H

|}

X ∈ X

N

, W ∈ W

N

, Y ∈ Y

N

, V ∈ V

N

p(v|y) =

N i=1

p

V|Y

(v

i

|y

i

)

( | ) p v y W V

H KH

X

KDH

M Y

H KH

Mˆ Mˆɶ

KDH

η

fN ψN gN

{0,1}

(7)

§ A self-authentication system consists of 3 parts:

§ hash function with rate ,

§ text data-hiding encoder and decoder with rate ,

§ authentication function .

§§ Hashing:Hashing

§§ Text data-Text data-hiding:hiding

§ Encoder:

§ Embedder:

§ Decoder:

Self-Authentication of Documents

(f

N

, ψ

N

) R

DH

R

H

H

η

f

N

: M × X

N

× K

DH

→ W

N

ψ

N

: W

N

× X

N

→ Y

N

g

N

: V

N

× K

DH

→ M

g

N

H : K

H

× X

N

→ M ˜

Distortion metric:

( ) ( )

1

1 ,

N

N i i

i

d , d x y

N =

=

x y

(8)

§ Constraints:

§ Probability of error:

§ Data-hiding capacity for a fixed channel:

Self-Authentication of Documents

P

e(N)

= 1

|K

DH

||M|

kDH∈KDH

m∈M

Pr {g (V, k

DH

) = m|K

DH

= k

DH

, M = m}

C = max

p(u,w|x)

[I (U ; V ) − I (U ; X )]

y∈YN

v∈VN

d(y, v)p(v|y)p(y) ≤ D

A

1

|K

DH

||M|

kDH∈KDH

m∈M

x∈XN

d( x, ψ

N

(f

N

(m, x, k

DH

), x ))p

X

( x ) ≤ D

E

auxiliary r.v.

U ∈ U

(9)

§§ Authentication:Authentication

§ Authentication based on the hashing data-hiding separation principle [SPIE2006]:

Self-Authentication of Documents

If is a finite alphabet stochastic process that satisfies the asymptotic equipartition property, then there is a hashing data-hiding scheme with specified probability of authentication error, if the rate of the hashing code satisfies .

Decision is taken w.r.t. to a predefined threshold.

η : ˜ M × M → {0, ˜ 1}

X

R

H

R

H

≤ R

DH

< C

(10)

Gel'fand-Pinsker Text Data-Hiding

§ Let be the text object, where is to be hidden.

§ Each character is a data structure consisting of multiple quantifiable

quantifiable component fieldscomponent fields (features): shape (geometric definition), position, orientation, size, color, etc.

§ Example:

§ In the so-called Scalar Costa Scheme (SCS) the auxiliary random variable is approximated by:

§ The resulting stego data is:

U = W + α

X = α

Q

m

(X )

high rate scalar quantizer compensation parameter

factor

Y = W + X = α

Q

m

(X ) + (1 − α

)X

(« )

U

X

n

m

X = (X

1

, . . . , X

N

)

(11)

§ Example (continued):

§ The underlying codebook and encoding mechanism:

1

A Q1(A) B Q1(B)

...

Z Q1(Z)

... ...

|M|

A Q|M|(A) B Q|M|(B)

...

Z Q|M|(Z)

1

A Q1(A) B Q1(B)

...

Z Q1(Z)

... ...

|M|

A Q|M|(A) B Q|M|(B)

...

Z Q|M|(Z)

x = B x = B

α α 1 α 1 α

y = B y = B TRABAJAR MUCHO TRABAJAR MUCHO

m = |M|

m = |M|

Gel'fand-Pinsker Text Data-Hiding

(12)

Color Index Modulation (CIM)

§ The stego text is obtained via (« ), where and the character feature to quantize is colorcolor:

§ Main idea: quantize the color intensitycolor intensity of each character in such a way the HVS cannot make the difference between original and quantized characters, but it is possible for an specialized reader.

§ Embedding rate: 1-2 bits per character.

§ Automation: correct character segmentation is needed for decoding; however OCR is not necessary.

Note: CIM printing halftone index modulation (HIM).

VAMOS A TRABAJAR

VAMOS A TRABAJAR VAMOS VAMOS A A TRABAJAR TRABAJAR

α

= 1

(13)

Location Index Modulation (LIM)

§ The stego text is obtained via (« ), where and the character feature to quantize is locationlocation.

§ This method quantizes either the horizontal coordinate , the vertical coordinate , or both.

α

= 1

( ,h v) x = x x

0( )

1( ) Q x

Q x Q x0( )

1( ) Q x

0( )

1( ) Q x Q x

2( )

Q x Q x3( )

X

h

X

v

(14)

Hybrid Schemes

§ Consider simultaneously multiple independent character features instead of a single one.

§ Main advantage: higher data storage rate of the resulting scheme.

§ Example: CIM + LIM

§

(Raw) data storage rate: 2 bits/character.

§

Capable of authenticating a text document (based on LIM and robust text hashing), and of distinguishing the original from its copies (based on CIM).

2( )

1( ) Q x Q x

3( )

Q x Q x4( ) 1

m = m = 2 m = 3 m = 4

(15)

Hybrid Schemes – IT framework

Encoder 1 W

Decoder M1

X

K1

V

ˆ 2

M

K2

M 2

Encoder

K2

W2

M Channel

Decoder 1 Mˆ

Mˆ K1

Embedder Y 2N R1

2N R2

Multiple Access Channel with side information 1

2

( )

M C IM H IM M P IM

§ Rate splitting

§ Joint constraint on embedding distortion (R R1, 2 )

D E

(16)

Error Control Coding (ECC) for Print-and-Scan Channels

p

V|Y

(v|y)

§ An outer layer of coding can be used taking into account the print-and-scan channel.

§ Some modifications to get full benefit of soft-decision

decoding techniques.

(17)

Robust Hashing of Text Documents

§ We consider two text hashing techniques.

§ The hash value is required to be:

§ invariant under legitimate modifications of the text object including conversion between electronic formats, data-hiding, printing, scanning, photocopying, faxing, etc.

§ sensitive to illegitimate modifications which change the semantics of .

OCR + MAC Text Hashing OCR + MAC Text Hashing:

H = H (k

H

, x)

x

x

OCR MAC

hexadecimal ASCII code

The quick brown fox...

54 68 65 20 71 75 69 63 6B 20 62 72 6F 77 6E

20 66 6F 78... 01011101011001...

hash value text object

(18)

Robust Hashing of Text Documents OCR + MAC Text Hashing

OCR + MAC Text Hashing (continued):

ASCII code: 64 65 63 61 64 65

101101011010101...

text object:

hash value:

(19)

R

Rp

Robust Hashing of Text Documents Random Tiling Text Hashing

Random Tiling Text Hashing

§ Preprocessing: skew correction, segmentation, and bitmap conversion.

§ Generate at random rectangles .

P R

p

µ

1

≶ T

1 ...

µ

p

≶ T

p ...

µ

P

≶ T

P

1 ... 0 ... 1

key-dependent threshold

hash value:

text object:

key-dependent

µ

p

= 1

|R

p

|

r∈R

λ

kH

(r)

r∈R

l(r)λ

kH

(r)

luminance value of pixel located at r comparison:

(20)

Experimental Results

§ Standard office equipment was used.

§ All digital images containing text linestext lines were created/processed at 600 ppi.

§§ OCR + MAC text hashing:OCR + MAC text hashing

§ ABBYY FineReader as OCR tool,

§ HMAC SHA-1 truncated to 80 bits as MAC ( ).

§§ Random tiling text hashing:Random tiling text hashing

§ , for all ,

§ The width and height (in pixels) of drawn uniformly at random from [5,10], [5,50], respectively.

§ We used the relative Hamming distance to compare any two hash values and .

R

H

≤ R

DH

P = 1024 λ

kH

(r) = 1 r ∈ R

p

R

p

d

H

(h

1

, h

2

)

h

1

h

2

(21)

Experimental Results

§ Tested legitimate modificationslegitimate modifications:

§ Electronic format conversion (Word PostScript PDF), printing and scanning, photocopying, and faxing.

§ Provided the OCR tool does not make a mistake, both text hashing methods show good effectiveness.

§ Tested illegitimate modificationsillegitimate modifications (digital form):

(a) addition of one new character

(c) replacement with visually different character

(b) suppression of one character

(d) replacement with visually similar character

document → dooument authentication → autentication level → levels

system → sistem

(22)

§ OCR + MAC text hashing:

§ Random tiling text hashing:

Experimental Results – illegal modifications

(a) addition (b) suppression (c) replacement-d (d) replacement-s

(a) addition (b) suppression (c) replacement-d (d) replacement-s

(23)

Conclusions

§ The combination of robust text hashing and text data-hiding is a promising solution to the problem of authentication and tamper- proofing of electronic and printed text documents.

§ By combining independent text data-hiding methods (e.g. CIM and LIM) it is possible to increase the data storage rate (IT framework).

§ OCR + MAC text hashing shows better applicability than random tiling text hashing. However, OCR + MAC text hashing method highly relies on the accuracy of the OCR tool.

Future research:

Future research:

§ Countermeasures for the weaknesses and security analysis of OCR+MAC text hashing and random tiling text hashing.

Document authentication with mobile phones.

(24)

Conclusions

Server

Database

Mobile Tower

Mobile Tower

Mobile Network GSM Phones

GSM Modems

GSM Gateway

Authentication Server

Database

Authentication request (acquired data)

Portable device Portable

device

Références

Documents relatifs

In the 2eld ofdigital watermarking he has published several papers in leading international journals, in- cluding Signal Processing, Proceedings ofthe IEEE, IEEE Transactions on

In the simplest case of Gaussian image model, it is evident from the presented results that the image regions with higher variance provide higher security (both the probability

Keywords: security analysis, robust data-hiding, structured codebooks, geometrical synchronization, achievable rate, Multiple Access Channel, random coding, random binning,

In this paper, the achievable rates of reliable robust data-hiding in channels with geometrical transformations are investigated from an informationtheoretic point of view

Furthermore, considering template-based and redundant- based design of geometrically robust data-hiding systems, we pro- vide the analysis of general attacking strategies and

Once the list of matching pairs is generated between a pair of source and suspicious documents, the next step is the extension or merging of these matches into contiguous,

Still, the hypothetical frame rule ensures that a proof of client code can be used with any (precise) representation invariant, so there is an obvious intuitive analogy with

SIGIR Forum (Special Interest Group on Information Retrieval), volume 24, issue 3,