Visual honey encryption: Application to steganography

Ji Won Yoon, Hyoungshick Kim, Hyun Ju Jo, Hyelim Lee, Kwangsu Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Honey encryption (HE) is a new technique to overcome the weakness of conventional password-based encryption (PBE). However, conventional honey encryption still has the limitation that it works only for binary bit streams or integer sequences because it uses a fixed distribution-transforming encoder (DTE). In this paper, we propose a variant of honey encryption called visual honey encryption which employs an adaptive DTE in a Bayesian framework so that the proposed approach can be applied to more complex domains including images and videos. We applied this method to create a new steganography scheme which significantly improves the security level of traditional steganography.

Original languageEnglish
Title of host publicationIH and MMSec 2015 - Proceedings of the 2015 ACM Workshop on Information Hiding and Multimedia Security
PublisherAssociation for Computing Machinery, Inc
Pages65-74
Number of pages10
ISBN (Print)9781450335874
DOIs
Publication statusPublished - 2015 Jun 17
Event3rd ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2015 - Portland, United States
Duration: 2015 Jun 172015 Jun 19

Other

Other3rd ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2015
CountryUnited States
CityPortland
Period15/6/1715/6/19

Fingerprint

Steganography
Cryptography

Keywords

  • Honey encryption (HE)
  • Password-based encryption (PBE)
  • Steganography

ASJC Scopus subject areas

  • Computer Graphics and Computer-Aided Design
  • Human-Computer Interaction
  • Software

Cite this

Yoon, J. W., Kim, H., Jo, H. J., Lee, H., & Lee, K. (2015). Visual honey encryption: Application to steganography. In IH and MMSec 2015 - Proceedings of the 2015 ACM Workshop on Information Hiding and Multimedia Security (pp. 65-74). Association for Computing Machinery, Inc. https://doi.org/10.1145/2756601.2756606

Visual honey encryption : Application to steganography. / Yoon, Ji Won; Kim, Hyoungshick; Jo, Hyun Ju; Lee, Hyelim; Lee, Kwangsu.

IH and MMSec 2015 - Proceedings of the 2015 ACM Workshop on Information Hiding and Multimedia Security. Association for Computing Machinery, Inc, 2015. p. 65-74.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Yoon, JW, Kim, H, Jo, HJ, Lee, H & Lee, K 2015, Visual honey encryption: Application to steganography. in IH and MMSec 2015 - Proceedings of the 2015 ACM Workshop on Information Hiding and Multimedia Security. Association for Computing Machinery, Inc, pp. 65-74, 3rd ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2015, Portland, United States, 15/6/17. https://doi.org/10.1145/2756601.2756606
Yoon JW, Kim H, Jo HJ, Lee H, Lee K. Visual honey encryption: Application to steganography. In IH and MMSec 2015 - Proceedings of the 2015 ACM Workshop on Information Hiding and Multimedia Security. Association for Computing Machinery, Inc. 2015. p. 65-74 https://doi.org/10.1145/2756601.2756606
Yoon, Ji Won ; Kim, Hyoungshick ; Jo, Hyun Ju ; Lee, Hyelim ; Lee, Kwangsu. / Visual honey encryption : Application to steganography. IH and MMSec 2015 - Proceedings of the 2015 ACM Workshop on Information Hiding and Multimedia Security. Association for Computing Machinery, Inc, 2015. pp. 65-74
@inproceedings{5dbab205f8d24d35852eda2d4d8dc837,
title = "Visual honey encryption: Application to steganography",
abstract = "Honey encryption (HE) is a new technique to overcome the weakness of conventional password-based encryption (PBE). However, conventional honey encryption still has the limitation that it works only for binary bit streams or integer sequences because it uses a fixed distribution-transforming encoder (DTE). In this paper, we propose a variant of honey encryption called visual honey encryption which employs an adaptive DTE in a Bayesian framework so that the proposed approach can be applied to more complex domains including images and videos. We applied this method to create a new steganography scheme which significantly improves the security level of traditional steganography.",
keywords = "Honey encryption (HE), Password-based encryption (PBE), Steganography",
author = "Yoon, {Ji Won} and Hyoungshick Kim and Jo, {Hyun Ju} and Hyelim Lee and Kwangsu Lee",
year = "2015",
month = "6",
day = "17",
doi = "10.1145/2756601.2756606",
language = "English",
isbn = "9781450335874",
pages = "65--74",
booktitle = "IH and MMSec 2015 - Proceedings of the 2015 ACM Workshop on Information Hiding and Multimedia Security",
publisher = "Association for Computing Machinery, Inc",

}

TY - GEN

T1 - Visual honey encryption

T2 - Application to steganography

AU - Yoon, Ji Won

AU - Kim, Hyoungshick

AU - Jo, Hyun Ju

AU - Lee, Hyelim

AU - Lee, Kwangsu

PY - 2015/6/17

Y1 - 2015/6/17

N2 - Honey encryption (HE) is a new technique to overcome the weakness of conventional password-based encryption (PBE). However, conventional honey encryption still has the limitation that it works only for binary bit streams or integer sequences because it uses a fixed distribution-transforming encoder (DTE). In this paper, we propose a variant of honey encryption called visual honey encryption which employs an adaptive DTE in a Bayesian framework so that the proposed approach can be applied to more complex domains including images and videos. We applied this method to create a new steganography scheme which significantly improves the security level of traditional steganography.

AB - Honey encryption (HE) is a new technique to overcome the weakness of conventional password-based encryption (PBE). However, conventional honey encryption still has the limitation that it works only for binary bit streams or integer sequences because it uses a fixed distribution-transforming encoder (DTE). In this paper, we propose a variant of honey encryption called visual honey encryption which employs an adaptive DTE in a Bayesian framework so that the proposed approach can be applied to more complex domains including images and videos. We applied this method to create a new steganography scheme which significantly improves the security level of traditional steganography.

KW - Honey encryption (HE)

KW - Password-based encryption (PBE)

KW - Steganography

UR - http://www.scopus.com/inward/record.url?scp=84962883672&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84962883672&partnerID=8YFLogxK

U2 - 10.1145/2756601.2756606

DO - 10.1145/2756601.2756606

M3 - Conference contribution

AN - SCOPUS:84962883672

SN - 9781450335874

SP - 65

EP - 74

BT - IH and MMSec 2015 - Proceedings of the 2015 ACM Workshop on Information Hiding and Multimedia Security

PB - Association for Computing Machinery, Inc

ER -