2010年1月7日 星期四
Modern Steganography讀後心得
此篇論文介紹與探討一些簡單的資訊隱藏,嵌入得處理過程、對於現在資訊隱藏的新看法...等。
我想如果我還想要深入的了解資訊隱藏的一方面的領域,我需要再多看一些論文,充實自己對於在資訊隱藏方面的相關知識。
Modern Steganography
在此篇論文中,我們將會介紹何謂資訊隱藏(steganography),以及其功能之應用。事實上,資訊隱藏(steganography)是一門資訊中隱藏著其他訊息的藝術也是科學。資訊隱藏(steganography)源自於希臘語,意思是隱藏書寫(hidden writting)。Johannes Trithemius在1499年寫了第一本關於複雜難懂的資訊隱藏(steganography)著作。而後才在1606年出版,隨即便被放入Librorum Prohibitorum的索引當中。 在近年來,密碼學(cryptography)成為了相當大眾的科學。雖然資訊隱藏(steganography)與密碼學(cryptography)非常相似,但密碼學(cryptography)的應用,讓我們更能分別兩者主要的差異。其中,密碼學(cryptography)是關於隱藏訊息的內容,且同時包裝加密資料,這便是是其身為有價值訊息的證據;而資訊隱藏(steganography)則是再深入一點,並且可對未授權之使用者做無形的密文。因此,我們可以定義資訊隱藏(steganography)是在密碼學(cryptography)輸出後,表面上卻看不出來的附加功能。
若要問什麼是資訊隱藏(steganography)的好處?那就是,當你為重要的工作數據加密,有人強行破解並竊取走你的密碼鑰匙。甚至警察也可能濫用職權,向你索取私人密碼。也可能是你被強烈懷疑車成罪犯的話。再者,若警察被賄賂了,那你又該如何據理的否認重要資訊的存在會較好呢?
Simmons的俘虜問題(prisoners' problem)是資訊隱藏(steganography)相當著名的例子。請看例1,Bob和Alice想要逃獄,但兩人的囚房距離非常的遙遠,獄典則是他們彼此唯一的溝通管道。但若被典獄長發現任何可能謀反的跡象,他們將會被嚴加看管,甚至更嚴重!
幸好,在他們被抓到之前,他們有了偽裝系統(stegosystem)的共識。偽裝系統(stegosystem)是在描述秘密訊息被嵌入到covertext所隱藏起來的方式(像是無罪的訊息)。而根據資訊隱藏一個隱藏訊息的covertext之標準專業術語,我們便稱作偽裝系統(stegosystem)。 過去的偽裝系統(stegosystem)例子可以是秘密的墨水瓶、蠟板,或是二戰用的microdots。而在近代,雖然這些方法還是可以簡單的被使用,但想想看,當這些方法未能普遍的為人所知呢?至於現今的方法,則是仍然保有相同的基礎,只是再將數位媒體和通信技術的優點更加發揚光大罷了。
事實上,我們可以分辨消極獄吏和積極獄吏兩者在偽裝系統(stegosystem)的區別。其中,消極獄吏只是監控通信管道,他可以忽略covertext通過好幾個經過檢測的測驗,而不是去做修改的動作。而相同的情況發生在網路訊息封包通過”侵入偵測系統(Intrusion Detect System)”,就像是從此區域延伸而常見的交通安全之應用一樣。
另一方面,積極獄吏為了杜絕秘密通信的可能而運用了covertext。Bob和Alice則必須用非常老套的方式嵌入演算法。隱藏資訊必須禁得起各式各樣的覆蓋媒介,而錯誤編碼校正的用法是可以被提出的。其典型的實際應用是浮水印(watermarking)和指紋(fingerprinting)。
浮水印(watermarking)是屬於嵌入資訊的一小角,並且可以為受版權保護的材料證明。而指紋(fingerprinting)也是相當的類似,但是其功能則是和預期追蹤受版權保護數據的實際複製。
密碼傳奇-從軍事隱語到電子晶片
此本書的內容就像此大綱所說的,他充滿著神奇故事與難解迷題,有來自各國的密碼傳奇,帶我進入另一個饒富趣味的數字世界。讓我比較印象深刻也比較喜歡的一篇是第7篇-無限密鑰詞,因為一開始羅爾芙. J. 洛倫斯的話吸引了我,他說:「把按照一訂規律產生的數字稱為「隨機數」,頗令人詫異......雖然它們的產生方式是完全確定的,但是這些數字的特性,卻和真正的隨機數毫無二致,也就是說,她們看起來像從一個大彩票中抽出來。」,其實是樂透吸引了我,哈~他裡面說有個部分提到,也許一個長時間未被抽到的樂透,跟上次才被抽出的相比,前者具有相當大的機率在下次易被抽中,其實,有許多方法可以製造隨機數字,將密鑰加入其中更是可以保密,還有將電話、數學符號...等,也都加入加入密鑰,這樣一來其實自己也可以和馬修斯一樣動手做一個簡單的加密機。
2009年11月11日 星期三
調色盤比較
2009年11月9日 星期一
2009年10月14日 星期三
Modern Steganography
Introduction
In this paper, we will introduce what steganography is and what kindof applications can be expected. Steganography is an art and scienceof hidding information within other information. The word itself comesfrom Greek and means hidden writting. First complex book coveringsteganography was written by Johannes Trithemius in 1499. Thebook Steganographia itself was published later in 1606 and immediatelyplaced on the Index Librorum Prohibitorum.
In recent years cryptography become very popular science. As steganographyhas very close to cryptography and its applications, we can withadvantage highlight the main differences. Cryptography is about concealingthe content of the message. At the same time encrypted data packageis itself evidence of the existence of valuable information. Steganographygoes a step further and makes the ciphertext invisible to unauthorizedusers. Hereby we can dene steganography as cryptography withthe additional property that its output looks unobtrusively.
One can ask what is it good for. Well, image the common situationwhen you encrypt your important business data. Suddenly robbers captureand torture you into revealing cryptographics keys. As well policepower may be abused. They ask you to give them the private keys or youare highly suspicious of committing crime. Next, what if the police isbribed. Would not it be better, if you can plausibly deny the existence ofimportant data?
A famous example of steganography is Simmons' Prisoners' problem, see [1]. Bob and Alice are in a jail and wish to escape. Their cellsare far apart from each other and the only allowed communication issending messages via prison ofcer. If warden detects any sign of conspiracy,he will secure their cells even more. Bob and Alice are wellaware of these facts.
Happily, before they got arrested, they have agreed a stegosystem.Stegosystem describes the way the secret message is embedded into a covertext(seemingly innocent message). According to the standard terminologyof information hidding a covertext with hidden information iscalled stegotext.
Examples of historical stegosystems can be secret inks, wax tabletsor microdots used during WWII. In modern era these methods can invokesmile on face, but image their power, when they were not widely known.Nowadays methods still hold the same simplicity, just exploit advantagesof digital media and communications.
We can distinguish between stegosystems with passive warder andactive warder. Passive warder just monitors the communication channel.He can pass the covertexts throught several statistical tests, but do notmodify them. It is the same situation as when the network packets gothrought Intrusion Detect System. Applications from this eld are oftenrefered to as trafc security.
On the other side, active warden manipulates covertexts in order topreclude the possibility of hidden communication. Bob and Alice haveto use very sophisticated embedding algorithm. Hidden information mustwithstand various recoding of covering medium, the use of error correctioncodes is recommended. Typical real-life application is watermarkingand ngerprinting.
Watermark is a small piece of embedded information which can proofcopyrighted material. Fingerprint is very similar, but is intended to trackthe concrete copy of copyrighted data.