Browse > Article
http://dx.doi.org/10.5573/ieek.2013.50.6.173

A Key Exchange Protocol based on the Steganography with the QR code  

Lee, Gil-Je (School of Computer Science and Engineering, Kyungpook National University)
Yoon, Eun-Jun (Department of Cyber Security, Kyung-il University)
Yoo, Kee-Young (School of Computer Science and Engineering, Kyungpook National University)
Publication Information
Journal of the Institute of Electronics and Information Engineers / v.50, no.6, 2013 , pp. 173-179 More about this Journal
Abstract
The traditional key exchange protocols are transmitted by using the cryptographic. However, these protocols are compromised by the attacker. To solve this problem, this paper proposes a key exchange protocol based on the steganography with the QR code. The steganography technique embed secret information to the images, documents, videos, and MP3 files and transmit to the others. The attacker can't know that the transmission data is the secret data. Therefore, the sender transmits efficiently and safely the secret data to the others. In additional, the cover image is using the QR code image to insert the secret key. If attackers scan the QR code, then they just read the information or connect URL. They can not be recognized that the QR code image is hiding the secret key. The experiments compare the QR code image with the well-known image about the distortion and the safety.
Keywords
Key exchange protocol; Steganography; QR code; LSB; Spatial domain;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 D.K Andrew, "Steganalysis of Embedding in Two Least-Significant Bits", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, Vol.2, NO.1, pp. 46-54, 2007   DOI   ScienceOn
2 김대수, 유기영, "모듈러 연산과 히스토그램 이동에 기반한 새로운 가역 정보 은닉 기법," 멀티미디어학회논문지, 제15권, 5호, pp. 639-650, 5월, 2012.   과학기술학회마을   DOI   ScienceOn
3 최장희, 윤은준, 유기영, "DE 기반의 적응적인 가역정보은닉기법," 전자공학회논문지, 제49권 CI편, 제2호, pp. 103-114, 3월, 2012.   과학기술학회마을   DOI   ScienceOn
4 www.denso-wave.com
5 H. Morris, I.M. El-Ddin, and M. Eyadat, "BarcodeWatermarking", Information Technology : New Generations 2009, pp.1296-1300, 2009.
6 www.wikipia.org
7 Huynh-Thu, Q. and Ghanbari, M. "Scope of validity of PSNR in image/video quality assessment," Electronics Letters 44 (13), pp. 800-801, 2008.   DOI   ScienceOn
8 Diffie, W., and Hellman, M. "New Directions in Cryptography.", IEEE trans on Information Theory, vIT-22 n6, p.359-376, November 1976.
9 김선종 외, "금융 보안 서버의 개인키 유출 사고에 안전한 키 교환 프로토콜", 정보보호학회지, 제19 권 제3호, pp. 120-131, 2009   과학기술학회마을
10 변진욱, "강화된 키 교환 프로토콜의 안전성 모델에 관한 연구", 정보보호학회지, 제20권, 제2호, pp. 78-84, 2010.
11 은선기 외, "안전한 M2M 통신 구축을 위한 상호 인증 및 키 교환 프로토콜", 정보보호학회지, 제20권, 제1호, pp. 73-83, 2010
12 최재탁 외, "ID 기반의 그룹 키 교환 기법에 대한 연구 동향", 정보보호학회지, 제19권, 제4호, pp. 36-43, 2009   과학기술학회마을
13 B.LaMmacchia, K.Lauter, and A.Mityagin, "Stronger Security of Authenticated Key Exchange." ProvSec 2007, LNCS 4784, pp..1-16, 2007.
14 V.Boyko, P.MacKenzie, and S. Patel, "Provably Secure Password Authenticated Key Exchange Using Diffie-Hellman," EUROCRYPT 2000, LNCS 1807, pp. 156-171, 2000.
15 신성철, 이성운, "동일 서버를 사용하는 두 사용자 간 효율적인 패스워드 기반의 키 교환 프로토콜," 정보보호학회논문지, 제15권, 제6호, pp.127-133, 2005
16 박호상, 정수환, "패스워드 기반의 상호 인증 및 키 교환 프로토콜," 정보보호학회논문지, 제12권, 제5호, pp. 38-43, 2002.   과학기술학회마을
17 K. Curran, K. Bailey, "An Evaluation of Image based Steganography Method", International Journal of digital Evidence, Vol. 2, pp 1-40, 2003
18 S. Katzenbeisser and F. A. P. Petitcolas, "Information hiding techniques for steganograpy and digital watermarking," Artech House, 2000.
19 Jiri Fridrich, "A New Steganographic Method for Palette-Based Images," in Proceedings of the IS&T PICS conference, Savannah, Georgia, pp. 285-289, Apr. 1998.
20 C.F. Lee, H.L. Chen, and H.K.Tso, "Embedding capacity raising in reversible data hiding based on prediction of difference expansion", The Journal of Systems and Software 83, pp.1864-1872, 2010.   DOI   ScienceOn
21 Diffie, W., and Hellman, M. "New Directions in Cryptography.", IEEE trans on Information Theory, vIT-22 n6, p.359-376, November 1976.