Browse > Article
http://dx.doi.org/10.6109/jkiice.2017.21.8.1589

Watermarking-based cryptographic synchronization signal transmission and detection  

Son, Young-ho (Attached Institute of ETRI)
Bae, Keun-sung (School of Electronics Engineering, Kyungpook National University)
Abstract
In synchronous secure communications, a synchronization signal is transmitted over the same channel where ciphertext is transmitted for cryptographic synchronization between an encryptor and a decryptor, so, it causes data rate lowering and transmission delay for plain communication. Especially, in poor environments such as wireless channels and so on, since secure communications require a periodic resynchronization protocol, synchronization signal transmission method can dominate its quality. In this paper, we proposed a new synchronization signal transmission method without additional bandwidth as well as resynchronization protocol based on it. We embeded a synchronization signal as a watermark in a transmission image and restored it from a detected watermark in the decryptor. Experimental results of image have demonstrated that the proposed synchronization signal transmission method using watermarking is efficient in transmission rate and can support reliable synchronization detection.
Keywords
Watermarking; Synchronization signal; Resynchronization; Secure communication;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 A. J. Menezes, P. C. Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, Boca Raton, FL: CRC press, 1996.
2 I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Burlington, MA: Morgan Kaufmann, 2007.
3 A. Z. Tirkel, G. A. Rankin, R. M. van Schyndel, W. J. Ho, and N. R. A. Mee, "Electronic Watermark," in Proceedings of International Conference on Digital Image Computing Techniques and Applications, pp. 666-672, 1993.
4 R. C. Gonzalez, R. E. Woods, and S. L. Eddins, Digital Image Processing Using MATLAB, 2nd ed(H. J. Yu, Trans.). Seoul, Korea: McGraw-Hill Korea, 2012.
5 Korean Standards Association, KS X 1213-1, 128 bit block encryption algorithm ARIA-Part 1: General, 2014.
6 P. Eliardsson, E. Axell, P. Stenumgaard, K. Wiklundh, B. Johansson, and B. Asp, "Military HF communications considering unintentional platform-generated electromagnetic interference," in Proceedings of International Conference on Military Communications and Information Systems, pp. 1-6, 2015.
7 H. J. Lee, "Highly reliable synchronous stream cipher system for link encryption," in Proceedings of International Conference on Computational Science and Its Applications, pp. 269-278, 2006.
8 J. H. Yoon, "A non-periodic random sequence resynchronization method using the address data of LAPB and HDLC," Ph. D. Dissertation, Kyungpook National University, Daegu, Korea, 1997.
9 V. Smirnova and A. V. Proskurnikov. "Phase locking, oscillations and cycle slipping in synchronization systems," in Proceedings of European Control Conference, pp. 873-878, 2016.
10 R. J. Sutton, Secure Communications: Applications and Management, Chichester, U.K.: John Wiley & Sons, 2002.
11 Y. H. Son, J. K. Hong, and K. S. Bae, "Authentication masking code against DoS of T-MAC protocol," Journal of Central South University, vol. 20, no. 7, pp. 1889-1895, Jul. 2013.   DOI
12 Y. H. Son and K. S. Bae, "Cryptographic synchronization signal generation method using maximal length sequence," Journal of the Korea Institute of Information and Communication Engineering, vol. 21, no. 7, pp. 1401-1410, Jul. 2017.   DOI
13 A. Ahmad, S. S. Al-Busaidi, M. J. Al-Musharafi, "On properties of PN sequences generated by LFSR - A generalized study and simulation modeling," Indian Journal of Science and Technology, vol. 6, no. 10, pp. 5351-5358, Oct. 2013.
14 N. S. Abinaya and P. Prakasam. "Performance analysis of maximum length LFSR and BBS method for cryptographic application," in Proceedings of International Conference on Electronics and Communication Systems, pp. 1-5, 2014.