Published March 27, 2007 | Version 6551
Journal article Open

Analysis of Message Authentication in Turbo Coded Halftoned Images using Exit Charts

Description

Considering payload, reliability, security and operational lifetime as major constraints in transmission of images we put forward in this paper a steganographic technique implemented at the physical layer. We suggest transmission of Halftoned images (payload constraint) in wireless sensor networks to reduce the amount of transmitted data. For low power and interference limited applications Turbo codes provide suitable reliability. Ensuring security is one of the highest priorities in many sensor networks. The Turbo Code structure apart from providing forward error correction can be utilized to provide for encryption. We first consider the Halftoned image and then the method of embedding a block of data (called secret) in this Halftoned image during the turbo encoding process is presented. The small modifications required at the turbo decoder end to extract the embedded data are presented next. The implementation complexity and the degradation of the BER (bit error rate) in the Turbo based stego system are analyzed. Using some of the entropy based crypt analytic techniques we show that the strength of our Turbo based stego system approaches that found in the OTPs (one time pad).

Files

6551.pdf

Files (210.7 kB)

Name Size Download all
md5:d0e45546c0ad28058f8aa05787b27fb3
210.7 kB Preview Download

Additional details

References

  • Jonas Gomes, Luiz velho, "Image processing for computer graphics", Springer Verlag, NewYork, 1997.
  • Zhihai He and Sanjit K. Mitra, "From rate-distortion analysis to resource distortion analysis", IEEE Circuits and systems magazine, vol.5, Number 3, Third quarter 2005, pp 6-18.
  • Claude Berrou, Bretagne, "The Ten-Year-Old Turbo Codes are Entering into Service", IEEE Communications Magazine, August 2003, pp110- 116.
  • William Stallings: "Cryptography and network Security- principles and applications", Second Edition, Pearson education Inc.
  • Bruce Schneier: "Applied Cryptography", Second Edition, John Wiley & Sons, Inc.
  • S. ten Brink: "Convergence behavior of iteratively decoded parallel concatenated codes", IEEE Trans. Inform. Theory, vol. 49, Oct. 2001, pp. 1727-1737.
  • Jason P Woodard and Lajos Hanzo: "Comparative study of turbo decoding techniques: an overview", IEEE Trans. on vehicular technology, vol. 49, No. 6, Nov 2000, pp 2208-2233.
  • B. Ptzmann, "Information Hiding Terminology", First International Workshop on Information Hiding, Springer-Verlag, vol. 1174 of LNCS, 1996, pp. 347-350.
  • J. Zollner, H. Federrath, H. Klimant, A. Ptzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, "Modeling the Security of Steganographic Systems", Second International Workshop on Information Hiding, Springer-Verlag, vol. 1525 of LNCS, 1998, pp. 344-354. [10] Thomas Wollinger, Jorge Guajardo and Christof paar, "Security on FPGAs: State-of-the-art implementations and attacks", ACM Transactions on Embedded Computing Systems, Vol. 3, No. 3, August 2004, pp. 534-574. [11] Bruce Schneier, "Applied Cryptography", John Wiley & Sons, Inc., Second Edition, 2001.