DOI QR코드

DOI QR Code

Emulab 테스트베드 환경에서의 분산 스테가노그래피 연구

Research on Steganography in Emulab Testbed

  • 정기현 (경일대학교 사이버보안학과) ;
  • 석우진 (한국과학기술정보연구원 첨단연구망센터)
  • Jung, Ki-Hyun (Department of Cyber Security, Kyungil University) ;
  • Seok, Woo-Jin (Department of Advanced KREONET Center, Korea Institute of Science and Technology Information)
  • 투고 : 2015.09.22
  • 심사 : 2015.11.03
  • 발행 : 2015.11.25

초록

스테가노그래피는 비밀 데이터가 숨겨져 있다는 그 자체를 숨기는 방법을 말한다. Emulab은 연구자가 언제든지 원하는 운영체제 시스템과 네트워크 토폴리지를 구성할 수 있도록 제공하는 프레임워크이다. 본 논문에서는 Emulab 환경에서 스테가노그래피 기법을 처음으로 적용하여 분산 처리가 가능함을 보이고자 한다. 칼라 비트맵 이미지를 사용하여 Emulab 환경에서 한대의 서버와 여러 대의 클라이언트별로 나누어 처리하게 함으로써 알고리즘의 성능을 평가한다. 커버 이미지로 사용하는 칼라 이미지는 RGB 영역으로 각각 나누어지고, 각각의 영역에 대해서 비밀 데이터를 각 클라이언트에서 분산처리하게 하고, 성능을 비교하게 된다. 실험결과에서는 커버 이미지의 크기가 증가함에 따라 클라이언트/서버 구조를 가진 Emulab 환경에서 실행 시간이 지속적으로 향상됨을 보여주고 있다.

Steganography is to conceal the existence of secrete data itself. The Emulab is a framework to provide real systems and network topology that can set up at anytime by researchers. In this paper, we show that steganography techniques can be applied in the Emulab environment. Steganography methods are evaluated on a standalone and sharing environments using the color bitmap images. The cover image is divided into RGB channels and then embedded the secret data at each client. The experimental results demonstrate that execution time is better in client/server environment as cover image size is increasing.

키워드

참고문헌

  1. A. Khan, A. Siddiqa, S. Munib, S.A. Malik, A recent survey of reversible watermarking techniques, Information Sciences 279, pp. 252-272, 2014.
  2. M.S. Subhedar, V.H. Mankar, Current status and key issues in image steganography: a survey, Computer Science Review 13(14), pp. 95-113, 2014.
  3. A. Cheddad, J. Condell, K. Curran, P.M. Kevitt, Digital image steganography: survey and analysis of current methods, Signal Processing 90, pp. 727-752, 2010. https://doi.org/10.1016/j.sigpro.2009.08.010
  4. A. Nissar, A.H. Mir, Classification of steganalysis techniques: a study, Digital Signal Processing 20, pp. 1758-1770, 2010. https://doi.org/10.1016/j.dsp.2010.02.003
  5. J. Zollner, H. Federrath, H. Klimant, A. Pfitzmann, R. Piotraschke, A. Westfeld, G. Wicke, and G. Wolf, "Modeling the Security of Steganographic Systems," 2nd Workshop on Information Hiding, pp. 345-355, 1998
  6. KISTI Emulab, http://www.emulab.kreonet.net
  7. Emulab, http://www.emulab.net/
  8. M.H. Le, W.J. Seok, "Research on the trend of utilizing Emulab as cyber security research framework", Journal of The Korea Institute of Information Security & Cryptology 23(6), pp. 1169-1180, 2013. https://doi.org/10.13089/JKIISC.2013.23.6.1169
  9. K.H. Jung, J.H. Lee, K.Y. Yoo, "Steganography on android smart devices", Journal of The Institute of Electronics and Information Engineers 52(4), pp. 99-105, 2015. https://doi.org/10.5573/ieie.2015.52.4.099
  10. W.J. Kim, P.H. Kim, J.H. Lee, K.H. Jung, K.Y. Yoo, "Reversible data hiding method based on min/max in 2x2 sub-blocks", Journal of The Institute of Electronics and Information Engineers 51(4), pp.745-751, 2014.
  11. K.H. Jung, K.Y. Yoo, "High-capacity index based data hiding method", Multimedia Tools and Applications 74(6), pp. 2179-2193, 2015. https://doi.org/10.1007/s11042-014-2081-4
  12. J. Tian, "Reversible data embedding using a difference expansion", IEEE Transactions on Circuits and Systems for Video Technology 13(8), pp. 890-896, 2003. https://doi.org/10.1109/TCSVT.2003.815962
  13. K.H. Jung, "Image steganographic method using variable length for data embedding", The Korea Institute of Military Science and Technology 11(32), pp. 115-122, 2008.
  14. K.H. Jung, I.T, Kim, J.C. Kim, "Steganographic method based on three directional embedding", The Korea Institute of Military Science and Technology 13(2), pp. 268-274, 2010.
  15. K.H. Jung, K.Y. Yoo, "Data hiding method in binary images based on block masking for key authentication", Information Sciences 277(1), pp. 188-196, 2014. https://doi.org/10.1016/j.ins.2014.02.016
  16. J. Mielikainen, "LSB matching revisited", IEEE Signal Processing Letters 13, pp. 285-287, 2006. https://doi.org/10.1109/LSP.2006.870357
  17. D.C. Wu, W.H. Tsai, "A steganographic method for images by pixel-value differencing", Pattern Regcognition Letters 24, pp. 1613-1626, 2003. https://doi.org/10.1016/S0167-8655(02)00402-6
  18. H.C. Wu, N.I. Wu, C.S. Tsai, M.S. Hwang, "Image steganographic scheme based on pixel-value differencing and LSB replacement methods", IEE Processing Visualization, Image Signal Process 152, pp. 611-615, 2005. https://doi.org/10.1049/ip-vis:20059022
  19. X. Li, J. Li, B. Li, B. Yang, "High-fidelity reversible data hiding scheme based on pixel-value-ordering and prediction-error expansion", Signal Processing 93, pp. 198-205, 2013. https://doi.org/10.1016/j.sigpro.2012.07.025