An Information Hiding Method Based on Computational Intractable Problems

نویسندگان

  • Spyridoula M. Armeni
  • Dimitris Christodoulakis
  • Ioannis Kostopoulos
  • Polychronis D. Kountrias
  • Yannis C. Stamatiou
  • Michalis Nik Xenos
چکیده

This paper presents an information hiding method that can be used for proving copyright ownership of a digital object. In contrast with other methods, the identity of the owner of the object is proved by the owner’s ability to demonstrate knowledge of a certain property of the signature. The method utilizes Zero Knowledge Interactive Proof (ZKIP) protocols for computationally intractable, or NP-complete, problems and in particular for the 3-coloring problem. This problem requires an assignment of a color out of three available colors to the vertices of a graph so that no two adjacent vertices have the same color. The method prescribes the construction of signatures that represent adjacency matrices of graphs while proof of ownership is effected by knowledge of a 3-coloring by an individual. The computational intractability of the 3-coloring problem implies that knowledge of a coloring of the graph/signature presents sufficient evidence of ownership of any digital file containing this signature. The method has the additional advantage that the disclosure of the signature is of no consequence, since it is essentially the knowledge of the property of the signature (the 3-coloring of the graph it represents) that enables one to use it as proof of ownership of the cover data. The paper focuses on the design of the method and presents experiments from its application on high quality color images. From the experiments it is derived that it is feasible to add the 3-colored graph into color images without affecting image quality (PSNR measurements and HVS examples are presented). More importantly, experiments prove the signature Pre-print version of the paper published in Advanves in Informatics, Manolopoulos Y., Evripidou S., and Kakas A., (Eds.), pp. 262–278, Springer-Verlag, Vol. 2563, ISSN 0302-9743, 2003. tolerance against various attacks even against attacks that significantly reduce image quality.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Hiding Method Based on Graph Coloring and Pixel Block‘s Correlation in Color Image

An optimized method for data hiding into a digital color image in spatial domainis provided. The graph coloring theory with different color numbers is applied. To enhance thesecurity of this method, block correlations method in an image is used. Experimental results showthat with the same PSNR, the capacity is improved by %8, and also security has increased in themethod compared with other meth...

متن کامل

Secure Information Hiding based on Computationally Intractable Problems

1 In this work, a method for proving copyright ownership is presented that is based on Zero Knowledge Interactive Proof (ZKIP) protocols for computationally intractable problems. The utilized problem is the 3-coloring problem, which consists in assigning one of three available colors to the vertices of a graph so that no two adjacent vertices have the same color. Using the presumed computationa...

متن کامل

A survey on digital data hiding schemes: principals, algorithms, and applications

This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...

متن کامل

Improving security of double random phase encoding with chaos theory using fractal images

This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...

متن کامل

Information Hiding for Text by Paraphrasing

Digital fingerprinting becomes paid growing attention as a technology resolving copyright problems. Previously, researchers have been only interested in image based digital fingerprinting where secret information is hidden in images, and text have not been the main target of hiding information. In this paper, we propose an information hiding method for text. Our information hiding method is bas...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001