An Advanced Least-Significant-Bit Embedding Scheme for Steganographic Encoding
Yeuan-Kuen Lee, Graeme Bell, Shih-Yu Huang,
Ran-Zan Wang and Shyong Jian Shyu
The 3rd Pacific-Rim Symposium on Image and Video Technology ( PSIVT 2009 )
Tokyo, Japan, January 13th - 16th, 2009
Official Website: http://psivt2009.nii.ac.jp/
Presentation PPT
Sunday, December 06, 2009
Wednesday, October 07, 2009
Arabic Text Staganography Using Multiple Diacritics
Adnan A. Gutub, Yousef S. Elarian, Sameh M. Awaideh and Aleem K. Alvi, 'Arabic Text Staganography Using Multiple Diacritics,' 2008 5th IEEE International Workshop on Signal Processing and Its Applications (WoSPA 2008), 18-20 March 2008, University of Sharjah, Sharjah, United Arab Emirates. [ PDF ]
Abstract
Steganography techniques are concerned with hiding the existence of data in other cover media. Today, text steganography has become particularly popular. This paper presents a new idea for using Arabic text in steganography. The main idea is to superimpose multiple invisible instances of Arabic diacritic marks over each other. This is possible because of the way in which diacritic marks are displayed on screen and printed to paper. Two approaches and several scenarios are proposed. The main advantage is in terms of the arbitrary capacity. The approach was compared to other similar methods in terms of overhead on capacity. It was shown to exceed any of these easily, provided the correct scenario is chosen.
要弄懂這篇論文所提出來的嵌入技術之前, 確實是需要對阿拉伯文的組成有些基本了解。論文的第二節就提供了關於阿拉伯文的背景知識。
點(dots) 和連接符號(connectivity) 是阿拉伯文字演進所遺留下的兩項特性。
有些阿拉伯字母有 1 個點, 有些有 2 個點, 有些則有 3 個點, 點的旁邊還可以再加上音標(diacritic marks), 我們可以從 Fig. 7 中看到一些例子, 包括點還有出現在文字上下的扭曲音標符號。
在 21 世紀電腦辭典中, Hamzah 是阿拉伯文字中, 代表閉鎖音之符號;
Merriam-Webster 線上字典的解釋如下:
Hamzah
the sign for a glottal stop in Arabic orthography usually represented in English by an apostrophe
連接符號(connectivity)是書寫阿拉伯文所自然產生的特性, 可將字母完美地連接在一起, 在文件中是完全沒有意義的, 一般稱為 Kashida。
這篇論文的主要構想(idea)來自於電腦如何顯示(或)列印這些阿拉伯文音標!
當電腦要顯示一篇阿拉伯文章時, 讀取下一個內碼, 如果是一個音標, 音標顯示完成後, 游標並不會往前移動, 而是留在原處不動, 並繼續讀取下一個內碼。因此, 如果檔案中存在連續好幾個相同的音標, 或是只存在一個音標, 螢幕顯示的結果都是完全一樣的。因此, 如果用人眼看, 是完全看不出異樣的!
作者提出了 2 個方法來實作這個構想: 文字法(textual approach) 和 影像法(image approach)。
文字法最主要是討論如何將機密訊息編碼, 再嵌入到文章之中。以機密訊息為 110001 為例: 由於二進位的 110001 等於十進位的 49, 因此最簡單的做法就是直接將額外的 49 個相同音標放到文件的第一個音標之後。這樣做的好處是可以嵌入任意大小的機密訊息, 完全不受限制。然而, 機密訊息越長, 要嵌入的音標個數會呈指數成長, 實際上並不可行。
一個變通的方法就是將機密訊息切成一個一個區塊 , 再將區塊中的機密訊息轉成十進位數字, 然後再將額外的音標, 增加到文章中不同的音標後面。同樣以機密訊息 110001 為例, 如果區塊大小為 2, 那麼就會切成 (11)=3, (00)=0, (01)=1, 那麼文章中第 1 個音標後面就會再增加 3 個相同音標, 文章的第二個音標就會增加 0 個音標, 文章中第 3 個音標就會增加 1 個額外的相同音標。所增加的音標總數為 3 + 0 + 1 = 4。
作者提出另一種編碼的方式是同值長度編碼(run length encoding, RLE), 同樣以機密訊息 110001 為例, 經過 RLE 編碼後, 得到 2, 3, 1 , 由於每個 run 的長度不可能為 0, 因此, 只要將每個音標的個數變成 2, 3, 1 即可, 換句話說, 文章中第 1 個音標後面就會再增加 1 個相同音標, 文章的第 2 個音標就會增加 2 個音標, 文章中第 3 個音標就會增加 0 個額外的相同音標, 所增加的音標總數為 (2-1) + (3-1) + (1-1) = 3。
影像法是用來處理文件列印的情況, 分成 softcopy 和 hardcopy 兩種, 前者指的是將文件輸出成列印的檔案, 如 PDF 檔案; 後者則是確實輸出到紙張上。
作者指出在同一個位置重覆列印音標確實會使得該音標看起來較暗一些, 由於亮度並不容易區別, 因此建議採用較小的區塊(2 位元)來編碼, 換句話說, 重覆列印的次數不大於 4 次。
論文的 § 5 Comparison to Similar Techniques, 作者從 capacity 的角度和其他方法做比較。但我還是覺得如果沒有解決 security 的問題, 即使 capacity 再大, 也是枉然。基本上, 作者所提出的技術演算法公開了, stego-text 是很容易被自動分辨出來的, 所以並不符合所謂的「柯克霍夫原則 (Kerckhoffs' Principle)」。
PS: 柯克霍夫原則 (Kerckhoffs' Principle)
密碼系統的安全性不在於防止敵人洞悉密碼演算法, 鑰匙的保密才是決定密碼安全性的唯一關鍵。The Security of cryptosystem must not depend on keeping secret of crypto-algorithm. The security depends only on keeping secret the key.
Abstract
Steganography techniques are concerned with hiding the existence of data in other cover media. Today, text steganography has become particularly popular. This paper presents a new idea for using Arabic text in steganography. The main idea is to superimpose multiple invisible instances of Arabic diacritic marks over each other. This is possible because of the way in which diacritic marks are displayed on screen and printed to paper. Two approaches and several scenarios are proposed. The main advantage is in terms of the arbitrary capacity. The approach was compared to other similar methods in terms of overhead on capacity. It was shown to exceed any of these easily, provided the correct scenario is chosen.
要弄懂這篇論文所提出來的嵌入技術之前, 確實是需要對阿拉伯文的組成有些基本了解。論文的第二節就提供了關於阿拉伯文的背景知識。
點(dots) 和連接符號(connectivity) 是阿拉伯文字演進所遺留下的兩項特性。
有些阿拉伯字母有 1 個點, 有些有 2 個點, 有些則有 3 個點, 點的旁邊還可以再加上音標(diacritic marks), 我們可以從 Fig. 7 中看到一些例子, 包括點還有出現在文字上下的扭曲音標符號。
From StegoRN |
在 21 世紀電腦辭典中, Hamzah 是阿拉伯文字中, 代表閉鎖音之符號;
Merriam-Webster 線上字典的解釋如下:
Hamzah
the sign for a glottal stop in Arabic orthography usually represented in English by an apostrophe
連接符號(connectivity)是書寫阿拉伯文所自然產生的特性, 可將字母完美地連接在一起, 在文件中是完全沒有意義的, 一般稱為 Kashida。
這篇論文的主要構想(idea)來自於電腦如何顯示(或)列印這些阿拉伯文音標!
當電腦要顯示一篇阿拉伯文章時, 讀取下一個內碼, 如果是一個音標, 音標顯示完成後, 游標並不會往前移動, 而是留在原處不動, 並繼續讀取下一個內碼。因此, 如果檔案中存在連續好幾個相同的音標, 或是只存在一個音標, 螢幕顯示的結果都是完全一樣的。因此, 如果用人眼看, 是完全看不出異樣的!
作者提出了 2 個方法來實作這個構想: 文字法(textual approach) 和 影像法(image approach)。
文字法最主要是討論如何將機密訊息編碼, 再嵌入到文章之中。以機密訊息為 110001 為例: 由於二進位的 110001 等於十進位的 49, 因此最簡單的做法就是直接將額外的 49 個相同音標放到文件的第一個音標之後。這樣做的好處是可以嵌入任意大小的機密訊息, 完全不受限制。然而, 機密訊息越長, 要嵌入的音標個數會呈指數成長, 實際上並不可行。
一個變通的方法就是將機密訊息切成一個一個區塊 , 再將區塊中的機密訊息轉成十進位數字, 然後再將額外的音標, 增加到文章中不同的音標後面。同樣以機密訊息 110001 為例, 如果區塊大小為 2, 那麼就會切成 (11)=3, (00)=0, (01)=1, 那麼文章中第 1 個音標後面就會再增加 3 個相同音標, 文章的第二個音標就會增加 0 個音標, 文章中第 3 個音標就會增加 1 個額外的相同音標。所增加的音標總數為 3 + 0 + 1 = 4。
作者提出另一種編碼的方式是同值長度編碼(run length encoding, RLE), 同樣以機密訊息 110001 為例, 經過 RLE 編碼後, 得到 2, 3, 1 , 由於每個 run 的長度不可能為 0, 因此, 只要將每個音標的個數變成 2, 3, 1 即可, 換句話說, 文章中第 1 個音標後面就會再增加 1 個相同音標, 文章的第 2 個音標就會增加 2 個音標, 文章中第 3 個音標就會增加 0 個額外的相同音標, 所增加的音標總數為 (2-1) + (3-1) + (1-1) = 3。
影像法是用來處理文件列印的情況, 分成 softcopy 和 hardcopy 兩種, 前者指的是將文件輸出成列印的檔案, 如 PDF 檔案; 後者則是確實輸出到紙張上。
作者指出在同一個位置重覆列印音標確實會使得該音標看起來較暗一些, 由於亮度並不容易區別, 因此建議採用較小的區塊(2 位元)來編碼, 換句話說, 重覆列印的次數不大於 4 次。
論文的 § 5 Comparison to Similar Techniques, 作者從 capacity 的角度和其他方法做比較。但我還是覺得如果沒有解決 security 的問題, 即使 capacity 再大, 也是枉然。基本上, 作者所提出的技術演算法公開了, stego-text 是很容易被自動分辨出來的, 所以並不符合所謂的「柯克霍夫原則 (Kerckhoffs' Principle)」。
PS: 柯克霍夫原則 (Kerckhoffs' Principle)
密碼系統的安全性不在於防止敵人洞悉密碼演算法, 鑰匙的保密才是決定密碼安全性的唯一關鍵。The Security of cryptosystem must not depend on keeping secret of crypto-algorithm. The security depends only on keeping secret the key.
Monday, September 28, 2009
Arabic Diacritics Based Steganography
Mohammed A. Aabed, Sameh M. Awaideh, Abdul-Rahman M. Elshafei and Adnan A. Gutub, 'Arabic Diacritics Based Steganography,' 2007 IEEE International Conference on Signal Processing and Communications (ICSPC 2007), 24-27 November 2007, Dubai, United Arab Emirates. [ PDF ]
Abstract
New steganography methods are being proposed to embed secret information into text cover media in order to search for new possibilities employing languages other than English. This paper utilizes the advantages of diacritics in Arabic to implement text steganography. Diacritics - or Harakat - in Arabic are used to represent vowel sounds and can be found in many formal and religious documents. The proposed approach uses eight different diacritical symbols in Arabic to hide binary bits in the original cover media. The embedded data are then extracted by reading the diacritics from the document and translating them back to binary.
Diacritics 就是音標的意思, 換句話說, 就是出現在文字旁邊用來表示不同發音的發音符號。作者在 Table 1 中列出了阿拉伯文的 8 種主要的音標。阿拉伯人用這些音標來改變發音或是用來區別不同字義但拼法卻相似的文字(to alter the pronunciation of a phoneme or to distinguish between words of similar spelling)。由於這些音標在文章中是可有可無的(optional), 因此, 作者提出了本篇利用音標來嵌入機密訊息到阿拉伯文章的論文。
根據作者的統計分析指出, 上述 8 個音標, 出現頻率最高的是 Fatha, 幾乎等於其他 7 種音標出現的總合。因此, 機密訊息 1 被指定嵌入於 Fatha 所出現的位置中, 機密訊息 0 則被指定嵌入於其他 7 種音標所出現的位置。
本篇論文所提出的 嵌入程序(embedding process) 如下:
選定一篇所有文字都標有音標的掩護文章(a fully diacritized Arabic text), 然後從文章的開頭開始向下搜尋,
如果要嵌入的機密訊息是 1, 掩護文章中所遭遇的文字的音標剛好也是 Fatha, 那就完全不更改掩護文章上的文字, 如果所遭遇的文字的音標不是 Fatha, 而是其他 7 種音標, 則刪去該音標; 然後, 繼續在掩護文章中尋找下一個文字, 如果還是其他 7 種音標, 繼續刪去音標, 直到遭遇帶有 Fatha 的文字;
如果要嵌入的機密訊息是 0, 掩護文章中所遭遇的文字的音標並不是 Fatha, 而是其他 7 種音標, 那就完全不更改掩護文章上的文字, 如果所遭遇的文字的音標是 Fatha, 則刪去 Fatha 音標; 然後, 繼續在掩護文章中尋找下一個文字, 如果還是 Fatha , 則繼續刪去, 直到遭遇其他 7 種音標為止。
萃取程序(extracting process)
要取出機密訊息則是從文章的開頭開始向下搜尋帶有音標的文字, 只要判斷該音標為何? 就可以知道此位置所藏的機密訊息為何?
嵌入容量
這篇論文所提出的嵌入技術, 嵌入容量其實非常容易估計, 只要去算算整篇文章最後留下多少音標, 就是嵌入機密訊息的長度。理論上, 假使音標是隨機出現, 藏入的 0, 1 機密訊息也是隨機的, 那就是有 50% 的音標會被保留下來; 然而, 作者在論文中指出, 平均嵌入容量約為 26.16% (= 50% * 3.27% / 6.25% ), 個人覺得應該是阿拉伯文中存在某種的發音特質, 使得音標出現的次序並不是隨機的, 造成嵌入容量無法達到理論值的緣故。
這篇論文最有趣的一點是作者指出所提出的隱藏技術可能會引起別人的注意:
換句話說, 當你需要使用隱藏技術來掩護秘密通訊的行為時, 你敢使用這篇論文所提出的技術嗎?
恐怕, 作者自己都不敢!
但, 作者很誠實就是了 :)
Abstract
New steganography methods are being proposed to embed secret information into text cover media in order to search for new possibilities employing languages other than English. This paper utilizes the advantages of diacritics in Arabic to implement text steganography. Diacritics - or Harakat - in Arabic are used to represent vowel sounds and can be found in many formal and religious documents. The proposed approach uses eight different diacritical symbols in Arabic to hide binary bits in the original cover media. The embedded data are then extracted by reading the diacritics from the document and translating them back to binary.
Diacritics 就是音標的意思, 換句話說, 就是出現在文字旁邊用來表示不同發音的發音符號。作者在 Table 1 中列出了阿拉伯文的 8 種主要的音標。阿拉伯人用這些音標來改變發音或是用來區別不同字義但拼法卻相似的文字(to alter the pronunciation of a phoneme or to distinguish between words of similar spelling)。由於這些音標在文章中是可有可無的(optional), 因此, 作者提出了本篇利用音標來嵌入機密訊息到阿拉伯文章的論文。
From StegoRN |
根據作者的統計分析指出, 上述 8 個音標, 出現頻率最高的是 Fatha, 幾乎等於其他 7 種音標出現的總合。因此, 機密訊息 1 被指定嵌入於 Fatha 所出現的位置中, 機密訊息 0 則被指定嵌入於其他 7 種音標所出現的位置。
本篇論文所提出的 嵌入程序(embedding process) 如下:
選定一篇所有文字都標有音標的掩護文章(a fully diacritized Arabic text), 然後從文章的開頭開始向下搜尋,
如果要嵌入的機密訊息是 1, 掩護文章中所遭遇的文字的音標剛好也是 Fatha, 那就完全不更改掩護文章上的文字, 如果所遭遇的文字的音標不是 Fatha, 而是其他 7 種音標, 則刪去該音標; 然後, 繼續在掩護文章中尋找下一個文字, 如果還是其他 7 種音標, 繼續刪去音標, 直到遭遇帶有 Fatha 的文字;
如果要嵌入的機密訊息是 0, 掩護文章中所遭遇的文字的音標並不是 Fatha, 而是其他 7 種音標, 那就完全不更改掩護文章上的文字, 如果所遭遇的文字的音標是 Fatha, 則刪去 Fatha 音標; 然後, 繼續在掩護文章中尋找下一個文字, 如果還是 Fatha , 則繼續刪去, 直到遭遇其他 7 種音標為止。
萃取程序(extracting process)
要取出機密訊息則是從文章的開頭開始向下搜尋帶有音標的文字, 只要判斷該音標為何? 就可以知道此位置所藏的機密訊息為何?
嵌入容量
這篇論文所提出的嵌入技術, 嵌入容量其實非常容易估計, 只要去算算整篇文章最後留下多少音標, 就是嵌入機密訊息的長度。理論上, 假使音標是隨機出現, 藏入的 0, 1 機密訊息也是隨機的, 那就是有 50% 的音標會被保留下來; 然而, 作者在論文中指出, 平均嵌入容量約為 26.16% (= 50% * 3.27% / 6.25% ), 個人覺得應該是阿拉伯文中存在某種的發音特質, 使得音標出現的次序並不是隨機的, 造成嵌入容量無法達到理論值的緣故。
這篇論文最有趣的一點是作者指出所提出的隱藏技術可能會引起別人的注意:
From StegoRN |
換句話說, 當你需要使用隱藏技術來掩護秘密通訊的行為時, 你敢使用這篇論文所提出的技術嗎?
恐怕, 作者自己都不敢!
但, 作者很誠實就是了 :)
Wednesday, September 23, 2009
A Novel Arabic Text Steganography Method Using Letter Points and Extensions
Adnan A. Gutub and Manal M. Fattani, 'A Novel Arabic Text Steganography Method Using Letter Points and Extensions,' WASET International Conference on Computer, Information and Systems Science and Engineering (ICCISSE 2007), 25-27 May 2007, Vienna, Austria. [ PDF ]
Abstract
This paper presents a new steganography approach suitable for Arabic texts. It can be classified under steganography feature coding methods. The approach hides secret information bits within the letters benefiting from their inherited points. To note the specific letters holding secret bits, the scheme considers the two features, the existence of the points in the letters and the redundant Arabic extension character. We use the pointed letters with extension to hold the secret bit ‘one’ and the un-pointed letters with extension to hold ‘zero’. This steganography technique is found attractive to other languages having similar texts to Arabic such as Persian and Urdu. Keywords — Arabic text, Cryptography, Feature coding, Information security, Text steganography, Text watermarking.
論文的 Introduction 中, 作者討論到隱藏學(or 偽裝學, steganography) 這個領域應該要從三個角度來探討: 嵌入容量(capacity), 安全性(security) and 強韌性(Robustness)。作者也討論到 steganography 與 cryptography, 還有與 watermarking 之間的差異。
然而, 比較可惜的一點是作者並沒有指出不同的應用, 對各種需求有極大的差異。例如: steganography 的目的是秘密通訊, 要求整個通訊行為絕對不可以引起監控人員(or一般人)的絲毫懷疑。如果沒有辦法做到這一點, 換句話說, 在沒有保證絕對安全(security)的情況下, 縱使有再大的嵌入容量, 終究也是一套完全沒用的技術。
這篇論文所提出來的技術, 用到了阿拉伯文(Arabic)的兩個特徵:
1. 28 個阿拉伯文字母中, 有 15 個字母有點, 其餘 13 個則沒有點。(Fig.1)
2. 可以在字母前後加入不影響語意的擴充文字(extension)。
因此, 本篇論文所提出的 嵌入程序(embedding process) 如下:
從文章的開頭開始向下搜尋,
如果想要嵌入的機密訊息為 1, 則尋找下一個有點文字(pointed letter), 如果這個有點文字允許加入擴充文字, 則加入擴充文字, 代表此處嵌有機密訊息, 如果不允許加入擴充文字, 則放棄, 再尋找下一個有點文字;
如果想要嵌入的機密訊息為 0, 則尋找下一個無點文字(un-pointed letter), 如果這個無點文字允許加入擴充文字, 則加入擴充文字, 代表此處嵌有機密訊息。同樣地, 如果這個無點文字並不允許加入擴充文字, 則放棄, 再尋找下一個無點文字。
萃取程序(extracting process)
要取出機密訊息則是從文章的開頭開始向下搜尋擴充文字, 當找到擴充文字時, 只要判斷該文字是否為有點或無點文字(pointed or un-pointed letter), 就可以知道此位置所藏的機密訊息為何?
這篇論文完全沒有討論到一篇加入不少擴充文字(extensions)的文章是否會引起別人的懷疑, 在阿拉伯文中, 擴充文字的使用狀況為何? 總之, 一個隱藏技術所應該面對的安全問題, 卻完全沒有討論, 真的很可惜 !
Abstract
This paper presents a new steganography approach suitable for Arabic texts. It can be classified under steganography feature coding methods. The approach hides secret information bits within the letters benefiting from their inherited points. To note the specific letters holding secret bits, the scheme considers the two features, the existence of the points in the letters and the redundant Arabic extension character. We use the pointed letters with extension to hold the secret bit ‘one’ and the un-pointed letters with extension to hold ‘zero’. This steganography technique is found attractive to other languages having similar texts to Arabic such as Persian and Urdu. Keywords — Arabic text, Cryptography, Feature coding, Information security, Text steganography, Text watermarking.
論文的 Introduction 中, 作者討論到隱藏學(or 偽裝學, steganography) 這個領域應該要從三個角度來探討: 嵌入容量(capacity), 安全性(security) and 強韌性(Robustness)。作者也討論到 steganography 與 cryptography, 還有與 watermarking 之間的差異。
然而, 比較可惜的一點是作者並沒有指出不同的應用, 對各種需求有極大的差異。例如: steganography 的目的是秘密通訊, 要求整個通訊行為絕對不可以引起監控人員(or一般人)的絲毫懷疑。如果沒有辦法做到這一點, 換句話說, 在沒有保證絕對安全(security)的情況下, 縱使有再大的嵌入容量, 終究也是一套完全沒用的技術。
這篇論文所提出來的技術, 用到了阿拉伯文(Arabic)的兩個特徵:
1. 28 個阿拉伯文字母中, 有 15 個字母有點, 其餘 13 個則沒有點。(Fig.1)
2. 可以在字母前後加入不影響語意的擴充文字(extension)。
From StegoRN |
因此, 本篇論文所提出的 嵌入程序(embedding process) 如下:
從文章的開頭開始向下搜尋,
如果想要嵌入的機密訊息為 1, 則尋找下一個有點文字(pointed letter), 如果這個有點文字允許加入擴充文字, 則加入擴充文字, 代表此處嵌有機密訊息, 如果不允許加入擴充文字, 則放棄, 再尋找下一個有點文字;
如果想要嵌入的機密訊息為 0, 則尋找下一個無點文字(un-pointed letter), 如果這個無點文字允許加入擴充文字, 則加入擴充文字, 代表此處嵌有機密訊息。同樣地, 如果這個無點文字並不允許加入擴充文字, 則放棄, 再尋找下一個無點文字。
萃取程序(extracting process)
要取出機密訊息則是從文章的開頭開始向下搜尋擴充文字, 當找到擴充文字時, 只要判斷該文字是否為有點或無點文字(pointed or un-pointed letter), 就可以知道此位置所藏的機密訊息為何?
這篇論文完全沒有討論到一篇加入不少擴充文字(extensions)的文章是否會引起別人的懷疑, 在阿拉伯文中, 擴充文字的使用狀況為何? 總之, 一個隱藏技術所應該面對的安全問題, 卻完全沒有討論, 真的很可惜 !
Monday, September 21, 2009
About Arabic Text Steganography (1)
Prof. Adnan Abdul-Aziz Gutub 是沙烏地阿拉伯(Saudi Arabia) 法德國王石油與礦物大學(King Fahd University of Petroleum and Minerals) 電腦工程學系(Computer Engineering Department) 的主席。
最近連續研讀了四篇 Prof. Adnan Abdul-Aziz Gutub 所發表的研討會論文, 論文主軸都是圍繞在 Arabic Text Steganography, 也就是將機密訊息藏在 Arabic Text 檔案之中, 希望達到秘密通訊的目的。
這四篇論文分別如下:
1. Adnan A. Gutub and Manal M. Fattani,
'A Novel Arabic Text Steganography Method Using Letter Points and Extensions,'
WASET International Conference on Computer, Information and Systems Science and Engineering (ICCISSE 2007),
25-27 May 2007, Vienna, Austria. [ PDF ]
2. Mohammed A. Aabed, Sameh M. Awaideh, Abdul-Rahman M. Elshafei and Adnan A. Gutub,
'Arabic Diacritics Based Steganography,'
2007 IEEE International Conference on Signal Processing and Communications (ICSPC 2007),
24-27 November 2007, Dubai, United Arab Emirates. [ PDF ]
3. Adnan A. Gutub, Yousef S. Elarian, Sameh M. Awaideh and Aleem K. Alvi,
'Arabic Text Staganography Using Multiple Diacritics,'
2008 5th IEEE International Workshop on Signal Processing and Its Applications (WoSPA 2008),
18-20 March 2008, University of Sharjah, Sharjah, United Arab Emirates. [ PDF ]
4. Fahd Al-Haidai, Adnan A. Gutub, Khalid Al-Kahsah and Jameel Hamodi,
'Improving Security and Capacity for Arabic Text Steganography Using Kashida Extensions,'
2009 IEEE/ACS International Conference on Computer Systems and Applications,
10-13 May 2009, Rabat Morocco. [ PDF ]
最近連續研讀了四篇 Prof. Adnan Abdul-Aziz Gutub 所發表的研討會論文, 論文主軸都是圍繞在 Arabic Text Steganography, 也就是將機密訊息藏在 Arabic Text 檔案之中, 希望達到秘密通訊的目的。
這四篇論文分別如下:
1. Adnan A. Gutub and Manal M. Fattani,
'A Novel Arabic Text Steganography Method Using Letter Points and Extensions,'
WASET International Conference on Computer, Information and Systems Science and Engineering (ICCISSE 2007),
25-27 May 2007, Vienna, Austria. [ PDF ]
2. Mohammed A. Aabed, Sameh M. Awaideh, Abdul-Rahman M. Elshafei and Adnan A. Gutub,
'Arabic Diacritics Based Steganography,'
2007 IEEE International Conference on Signal Processing and Communications (ICSPC 2007),
24-27 November 2007, Dubai, United Arab Emirates. [ PDF ]
3. Adnan A. Gutub, Yousef S. Elarian, Sameh M. Awaideh and Aleem K. Alvi,
'Arabic Text Staganography Using Multiple Diacritics,'
2008 5th IEEE International Workshop on Signal Processing and Its Applications (WoSPA 2008),
18-20 March 2008, University of Sharjah, Sharjah, United Arab Emirates. [ PDF ]
4. Fahd Al-Haidai, Adnan A. Gutub, Khalid Al-Kahsah and Jameel Hamodi,
'Improving Security and Capacity for Arabic Text Steganography Using Kashida Extensions,'
2009 IEEE/ACS International Conference on Computer Systems and Applications,
10-13 May 2009, Rabat Morocco. [ PDF ]
Saturday, September 12, 2009
News: Gordon Brown: I'm proud to say sorry to a real war hero
Gordon Brown: I'm proud to say sorry to a real war hero
The treatment of code-breaker Alan Turing was utterly unfair, says Gordon Brown
By Gordon Brown
Published: 9:30PM BST 10 Sep 2009
Original Link
This has been a year of deep reflection – a chance for Britain, as a nation, to commemorate the profound debts we owe to those who came before. A unique combination of anniversaries and events have stirred in us that sense of pride and gratitude that characterise the British experience. Earlier this year, I stood with Presidents Sarkozy and Obama to honour the service and the sacrifice of the heroes who stormed the beaches of Normandy 65 years ago. And just last week, we marked the 70 years which have passed since the British government declared its willingness to take up arms against fascism and declared the outbreak of the Second World War.
So I am both pleased and proud that, thanks to a coalition of computer scientists, historians and LGBT (lesbian, gay, bisexual and transgender) activists, we have this year a chance to mark and celebrate another contribution to Britain's fight against the darkness of dictatorship: that of code-breaker Alan Turing.
Computer pioneer Alan Turing, who helped crack German Enigma codes during WWII
From StegoRN
Turing was a quite brilliant mathematician, most famous for his work on breaking the German Enigma codes. It is no exaggeration to say that, without his outstanding contribution, the history of the Second World War could have been very different. He truly was one of those individuals we can point to whose unique contribution helped to turn the tide of war. The debt of gratitude he is owed makes it all the more horrifying, therefore, that he was treated so inhumanely.
In 1952, he was convicted of "gross indecency" – in effect, tried for being gay. His sentence – and he was faced with the miserable choice of this or prison – was chemical castration by a series of injections of female hormones. He took his own life just two years later.
Thousands of people have come together to demand justice for Alan Turing and recognition of the appalling way he was treated. While Turing was dealt with under the law of the time, and we can't put the clock back, his treatment was of course utterly unfair, and I am pleased to have the chance to say how deeply sorry I and we all are for what happened to him. Alan and the many thousands of other gay men who were convicted, as he was convicted, under homophobic laws, were treated terribly. Over the years, millions more lived in fear in conviction. I am proud that those days are gone and that in the past 12 years this Government has done so much to make life fairer and more equal for our LGBT community. This recognition of Alan's status as one of Britain's most famous victims of homophobia is another step towards equality, and long overdue.
But even more than that, Alan deserves recognition for his contribution to humankind. For those of us born after 1945, into a Europe which is united, democratic and at peace, it is hard to imagine that our continent was once the theatre of mankind's darkest hour. It is difficult to believe that in living memory, people could become so consumed by hate – by anti-Semitism, by homophobia, by xenophobia and other murderous prejudices – that the gas chambers and crematoria became a piece of the European landscape as surely as the galleries and universities and concert halls which had marked out the European civilisation for hundreds of years.
It is thanks to men and women who were totally committed to fighting fascism, people like Alan Turing, that the horrors of the Holocaust and of total war are part of Europe's history and not Europe's present. So on behalf of the British government, and all those who live freely thanks to Alan's work, I am very proud to say: we're sorry. You deserved so much better.
Wednesday, May 06, 2009
Entropy-Coded Segment (ECS) in Rex.jpg
Rex.jpg 影像中的第一個 Entropy-coded segment (ECS) 是出現在 Rex.pdf 文件 page: 24 的 0000373eh ~ 00003826h, 從 F9 85 ... 一直到 49 7F, 一共有 233 個 Bytes.
從 page:23 00003586h 的 DRI Segment, 我們可以得知一個 ECS 中包含了 15 個 MCUs (minimum coded unit), 每一個 MCU 則分別包含一個 8*8 的 Y 亮度區塊, 一個 Cb 色差區塊, 一個 Cr 色差區塊。因此, 這個 233 位元長的 ECS 區段總共包含了 45 個 8*8 的 DCT 係數區塊。
使用 Rex-HuffmanTable.pdf 的 4 個 Huffman Tables, 我們可以將第一個 ECS 還原成 DCT 係數, 詳細的還原過程, 我們記錄在 Rex-Decoding-ECS0.pdf 檔案中, 有興趣的人可以自行下載、查驗。
接在第一個 ECS 後面的是一個 Define Restart Interval (DRI) Marker, 編號從 0 開始, 所以是 'FFD0', 然後才是接著第二個 ECS, 範圍是在文件中 page: 24 的 00003829h ~ 00003951h, 從 F9 8D ... 一直到 A4 BF, 一共有 297 個 Bytes. 後面接著第 2 個 DRI Marker - 'FFD1' , 然後就是開始第三個 ECS。
Rex.jpg 中, 一共有 15 個 ECS, 被 14 個 DRI Marker 分隔著, 編號從 0 開始增加, 最大編號是 7, 然後又從 0 開始編號, 所以最後一個 DRI Marker 編號是 'FFD5' 。最大的編號是 7 的原因很簡單, 因為 'FFD8' 之後的 Marker 都有其各自的意義。
14 個 DRI Marker 出現在 Rex.pdf 的位置分別如下:
FFD0 page: 24 00003827h
FFD1 page: 25 00003952h
FFD2 page: 25 00003ab2h
FFD3 page: 26 00003c31h
FFD4 page: 27 00003debh
FFD5 page: 27 00003f9ch
FFD6 page: 28 000041cah
FFD7 page: 29 000043cbh
FFD0 page: 30 00004624h
FFD1 page: 31 0000484ah
FFD2 page: 32 00004adch
FFD3 page: 33 00004d68h
FFD4 page: 34 00005038h
FFD5 page: 36 00005326h
Monday, April 27, 2009
Thursday, April 09, 2009
Huffman Table in the Rex.jpg
使用 UltraEdit 將 Rex.jpg 檔以 16 進位表示法開啟, 可以得到 Rex.pdf 這份文件。在文件 Page: 23 的 0000358ch 位址上, 可以找到 X'FFDC marker, 整個 DHT (Define Huffman Table(s)) Segment 一直延續到 Page:24 的 0000372f h 結束。
DHT Segment 一共存放了 4 個 Huffman Tables, 使用 Huffman Table Generating Procedure 可以將 DHT Segment 轉換成 4 個 Huffman Tables,我將其存放在 Rex-HuffmanTable.pdf 文件中供人參考。
Sunday, March 08, 2009
News: Funding concentrated on elite might be a mistake
英調查發現 研究經費集中撥給精英大學恐是不智之舉
國科會 國際科技合作 簡訊網
原始文件連結
作者:駐英科技組 現職:駐英科技組
文章來源:Times Higher Education, 15-21 Jan., 2009, No. 1879
發佈時間:98.02.26
英國華威大學經濟學家及教授 Andrew Oswald 在近期調查報告中建議,未來研究經費應廣泛地分撥給各大學,避免集中於少數傳統精英大學之上。這份分析報告與最近英國高等教育評鑑(Research Assessment Exercise, RAE)的調查結果不謀而合,發現出產「世界級」研究並非少數以研究知名的精英大學之專利。
這份調查報告以經濟學學科領域為對象,分析 2001 到 2008 年間世界各大學所發表的經濟學研究報告,歸納出 450 篇得列「世界等級」之報告,這幾篇報告不僅曾先後發表於二十二份世界頂尖期刊雜誌,也是被引用率最高的報告。世界級報告中 43 篇來自英國,約佔總數 10%,當中 12篇來自倫敦政經學院(London School of Economics and Political Science),11篇來自牛津大學,6 篇來自華威大學,令人驚訝的是,將近四分之一的比例(另外 18 篇)則是來自「非傳統精英」大學,包括約克大學(University of York)、卡地夫大學(University of Cardiff)、肯特大學(University of Kent)、蘭卡斯特大學(University of Lancaster)和萊斯特大學(University of Leicester)。
Oswald 教授對此調查結果感到意外但也說明,這結果顯現許多大學都有能力創造傑出研究,非凡的研究成果並非少數精英大學之專利,因此僅將研究補助集中撥給少數精英大學恐為不智之舉。再者,英格蘭高等教育獎助委員會(Higher Education Funding Council for England, Hefce)的原創目的本是贊助「任何」卓越研究,而非特定大學之研究。
繼英國高等教育評鑑(RAE)和此報告公佈的調查結果後,未來英格蘭高等教育獎助委員會如何分配研究補助仍待決議,但可預期的是,補助撥款方式將直接受到連帶影響,預計資金會更廣泛地分撥給各大學,以涵蓋成就傑出之「非傳統精英」大學。換言之,羅素集團(英國 20 所研究型大學所組成)過去較多的補助難免因此受到刪減。
Funding concentrated on elite might be a mistake
A report conducted by Andrew Oswald, an economist and professor of the University of Warwick, suggested that future research funding should be spread more thinly and broadly across a wide range of universities, rather than concentrating on a small group of traditional research elite. This report echoed the RAE's (Research Assessment Exercise) findings that world-leading research is not exclusively produced by some small elite of large research universities.
Looking specifically into economics discipline, the report analysed research papers produced in the world between 2001 to 2008 and 450 papers were identified as ‘truly world-leading’, the most highly cited articles published in 22 of the world’s top journals. Among these papers, 43 were from the UK, amounting to about 10 per cent of the total. While many of these UK world-leading papers were produced by top half-dozen universities in the country, with 12 from the London School of Economics and Political Science, 11 from the universities of Oxford and 6 from Warwick, a surprising quarter (the other 18) however were contributed by universities of York, Cardiff, Kent, Lancaster, Leicester and Sheffield, which are not traditionally considered to be among the top rank.
Taken by surprise, Professor Oswald said that the result suggests outstanding work comes from a wide range of sources and therefore, it appears unreasonable if funding is narrowly concentrated on a small number of universities. After all, the original promise of the Higher Education Funding Council for England (Hefce) is to fund excellence wherever it is found, rather than excellence in specific institutions.
How Hefce would allocate funding following the RAE’s result, which is echoed by Professor Oswald’s, is yet to be determined. Nevertheless, some direct influence on the elite universities is expected. It is predicted that funding will be dispersed more thinly and broadly to cover a bigger group of universities, including those not considered to be top but producing extraordinary work. In other words, the elite, such as Russell Group, will lose funding inevitably.
國科會 國際科技合作 簡訊網
原始文件連結
作者:駐英科技組 現職:駐英科技組
文章來源:Times Higher Education, 15-21 Jan., 2009, No. 1879
發佈時間:98.02.26
英國華威大學經濟學家及教授 Andrew Oswald 在近期調查報告中建議,未來研究經費應廣泛地分撥給各大學,避免集中於少數傳統精英大學之上。這份分析報告與最近英國高等教育評鑑(Research Assessment Exercise, RAE)的調查結果不謀而合,發現出產「世界級」研究並非少數以研究知名的精英大學之專利。
這份調查報告以經濟學學科領域為對象,分析 2001 到 2008 年間世界各大學所發表的經濟學研究報告,歸納出 450 篇得列「世界等級」之報告,這幾篇報告不僅曾先後發表於二十二份世界頂尖期刊雜誌,也是被引用率最高的報告。世界級報告中 43 篇來自英國,約佔總數 10%,當中 12篇來自倫敦政經學院(London School of Economics and Political Science),11篇來自牛津大學,6 篇來自華威大學,令人驚訝的是,將近四分之一的比例(另外 18 篇)則是來自「非傳統精英」大學,包括約克大學(University of York)、卡地夫大學(University of Cardiff)、肯特大學(University of Kent)、蘭卡斯特大學(University of Lancaster)和萊斯特大學(University of Leicester)。
Oswald 教授對此調查結果感到意外但也說明,這結果顯現許多大學都有能力創造傑出研究,非凡的研究成果並非少數精英大學之專利,因此僅將研究補助集中撥給少數精英大學恐為不智之舉。再者,英格蘭高等教育獎助委員會(Higher Education Funding Council for England, Hefce)的原創目的本是贊助「任何」卓越研究,而非特定大學之研究。
繼英國高等教育評鑑(RAE)和此報告公佈的調查結果後,未來英格蘭高等教育獎助委員會如何分配研究補助仍待決議,但可預期的是,補助撥款方式將直接受到連帶影響,預計資金會更廣泛地分撥給各大學,以涵蓋成就傑出之「非傳統精英」大學。換言之,羅素集團(英國 20 所研究型大學所組成)過去較多的補助難免因此受到刪減。
Funding concentrated on elite might be a mistake
A report conducted by Andrew Oswald, an economist and professor of the University of Warwick, suggested that future research funding should be spread more thinly and broadly across a wide range of universities, rather than concentrating on a small group of traditional research elite. This report echoed the RAE's (Research Assessment Exercise) findings that world-leading research is not exclusively produced by some small elite of large research universities.
Looking specifically into economics discipline, the report analysed research papers produced in the world between 2001 to 2008 and 450 papers were identified as ‘truly world-leading’, the most highly cited articles published in 22 of the world’s top journals. Among these papers, 43 were from the UK, amounting to about 10 per cent of the total. While many of these UK world-leading papers were produced by top half-dozen universities in the country, with 12 from the London School of Economics and Political Science, 11 from the universities of Oxford and 6 from Warwick, a surprising quarter (the other 18) however were contributed by universities of York, Cardiff, Kent, Lancaster, Leicester and Sheffield, which are not traditionally considered to be among the top rank.
Taken by surprise, Professor Oswald said that the result suggests outstanding work comes from a wide range of sources and therefore, it appears unreasonable if funding is narrowly concentrated on a small number of universities. After all, the original promise of the Higher Education Funding Council for England (Hefce) is to fund excellence wherever it is found, rather than excellence in specific institutions.
How Hefce would allocate funding following the RAE’s result, which is echoed by Professor Oswald’s, is yet to be determined. Nevertheless, some direct influence on the elite universities is expected. It is predicted that funding will be dispersed more thinly and broadly to cover a bigger group of universities, including those not considered to be top but producing extraordinary work. In other words, the elite, such as Russell Group, will lose funding inevitably.
Thursday, January 22, 2009
PSIVT 2009
2009/1/15
PSIVT 2009 是在日本東京的國家科學中心(National Center of Sciences) 舉行。
到此一遊 !
Prof. Shih-Yu Huang
Prof. Graeme Bell
我們這篇 paper "An Advanced Least-Significant-Bit Embedding Scheme for Steganographic Encoding" 的三位主要作者都來了, 將由我上台報告論文。
這張照片是銘傳大學與中華大學教授的合照,
最右邊就是中華大學資工系李建興教授, 我和李建興教授是同一個實驗室畢業的, 所以這一次就一起來到東京!
謝朝和教授和其夫人...
Springer 的攤位
這兩位這次都不用上台報告論文, 所以一派輕鬆 ...
Room A 就是我要上台報告的地方, 比一般研討會大很多, ...
Dr. Cees Snoke 是大會 Tutorial 2 的講者之一, 是來自荷蘭的年輕學者, 才 30 歲。這次演講的主題是 Concept-Based Video Retrieval。
晚宴前, 我們一起聊天...
PSIVT 2009 是在日本東京的國家科學中心(National Center of Sciences) 舉行。
到此一遊 !
Prof. Shih-Yu Huang
Prof. Graeme Bell
我們這篇 paper "An Advanced Least-Significant-Bit Embedding Scheme for Steganographic Encoding" 的三位主要作者都來了, 將由我上台報告論文。
這張照片是銘傳大學與中華大學教授的合照,
最右邊就是中華大學資工系李建興教授, 我和李建興教授是同一個實驗室畢業的, 所以這一次就一起來到東京!
謝朝和教授和其夫人...
Springer 的攤位
這兩位這次都不用上台報告論文, 所以一派輕鬆 ...
Room A 就是我要上台報告的地方, 比一般研討會大很多, ...
Dr. Cees Snoke 是大會 Tutorial 2 的講者之一, 是來自荷蘭的年輕學者, 才 30 歲。這次演講的主題是 Concept-Based Video Retrieval。
晚宴前, 我們一起聊天...
Subscribe to:
Posts (Atom)