Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33035
Analysis of Message Authentication in Turbo Coded Halftoned Images using Exit Charts
Authors: Andhe Dharani, P. S. Satyanarayana, Andhe Pallavi
Abstract:
Considering payload, reliability, security and operational lifetime as major constraints in transmission of images we put forward in this paper a steganographic technique implemented at the physical layer. We suggest transmission of Halftoned images (payload constraint) in wireless sensor networks to reduce the amount of transmitted data. For low power and interference limited applications Turbo codes provide suitable reliability. Ensuring security is one of the highest priorities in many sensor networks. The Turbo Code structure apart from providing forward error correction can be utilized to provide for encryption. We first consider the Halftoned image and then the method of embedding a block of data (called secret) in this Halftoned image during the turbo encoding process is presented. The small modifications required at the turbo decoder end to extract the embedded data are presented next. The implementation complexity and the degradation of the BER (bit error rate) in the Turbo based stego system are analyzed. Using some of the entropy based crypt analytic techniques we show that the strength of our Turbo based stego system approaches that found in the OTPs (one time pad).Keywords: Halftoning, Turbo codes, security, operationallifetime, Turbo based stego system.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1063132
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1503References:
[1] Jonas Gomes, Luiz velho, "Image processing for computer graphics", Springer Verlag, NewYork, 1997.
[2] Zhihai He and Sanjit K. Mitra, "From rate-distortion analysis to resource distortion analysis", IEEE Circuits and systems magazine, vol.5, Number 3, Third quarter 2005, pp 6-18.
[3] Claude Berrou, Bretagne, "The Ten-Year-Old Turbo Codes are Entering into Service", IEEE Communications Magazine, August 2003, pp110- 116.
[4] William Stallings: "Cryptography and network Security- principles and applications", Second Edition, Pearson education Inc.
[5] Bruce Schneier: "Applied Cryptography", Second Edition, John Wiley & Sons, Inc.
[6] S. ten Brink: "Convergence behavior of iteratively decoded parallel concatenated codes", IEEE Trans. Inform. Theory, vol. 49, Oct. 2001, pp. 1727-1737.
[7] Jason P Woodard and Lajos Hanzo: "Comparative study of turbo decoding techniques: an overview", IEEE Trans. on vehicular technology, vol. 49, No. 6, Nov 2000, pp 2208-2233.
[8] B. Ptzmann, "Information Hiding Terminology", First International Workshop on Information Hiding, Springer-Verlag, vol. 1174 of LNCS, 1996, pp. 347-350.
[9] J. Zollner, H. Federrath, H. Klimant, A. Ptzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, "Modeling the Security of Steganographic Systems", Second International Workshop on Information Hiding, Springer-Verlag, vol. 1525 of LNCS, 1998, pp. 344-354.
[10] Thomas Wollinger, Jorge Guajardo and Christof paar, "Security on FPGAs: State-of-the-art implementations and attacks", ACM Transactions on Embedded Computing Systems, Vol. 3, No. 3, August 2004, pp. 534-574.
[11] Bruce Schneier, "Applied Cryptography", John Wiley & Sons, Inc., Second Edition, 2001.