Analysis of Message Authentication in Turbo Coded Halftoned Images using Exit Charts

Considering payload, reliability, security and operational lifetime as major constraints in transmission of images we put forward in this paper a steganographic technique implemented at the physical layer. We suggest transmission of Halftoned images (payload constraint) in wireless sensor networks to reduce the amount of transmitted data. For low power and interference limited applications Turbo codes provide suitable reliability. Ensuring security is one of the highest priorities in many sensor networks. The Turbo Code structure apart from providing forward error correction can be utilized to provide for encryption. We first consider the Halftoned image and then the method of embedding a block of data (called secret) in this Halftoned image during the turbo encoding process is presented. The small modifications required at the turbo decoder end to extract the embedded data are presented next. The implementation complexity and the degradation of the BER (bit error rate) in the Turbo based stego system are analyzed. Using some of the entropy based crypt analytic techniques we show that the strength of our Turbo based stego system approaches that found in the OTPs (one time pad).




References:
[1] Jonas Gomes, Luiz velho, "Image processing for computer graphics",
Springer Verlag, NewYork, 1997.
[2] Zhihai He and Sanjit K. Mitra, "From rate-distortion analysis to resource
distortion analysis", IEEE Circuits and systems magazine, vol.5, Number
3, Third quarter 2005, pp 6-18.
[3] Claude Berrou, Bretagne, "The Ten-Year-Old Turbo Codes are Entering
into Service", IEEE Communications Magazine, August 2003, pp110-
116.
[4] William Stallings: "Cryptography and network Security- principles and
applications", Second Edition, Pearson education Inc.
[5] Bruce Schneier: "Applied Cryptography", Second Edition, John Wiley
& Sons, Inc.
[6] S. ten Brink: "Convergence behavior of iteratively decoded parallel
concatenated codes", IEEE Trans. Inform. Theory, vol. 49, Oct. 2001,
pp. 1727-1737.
[7] Jason P Woodard and Lajos Hanzo: "Comparative study of turbo
decoding techniques: an overview", IEEE Trans. on vehicular
technology, vol. 49, No. 6, Nov 2000, pp 2208-2233.
[8] B. Ptzmann, "Information Hiding Terminology", First International
Workshop on Information Hiding, Springer-Verlag, vol. 1174 of LNCS,
1996, pp. 347-350.
[9] J. Zollner, H. Federrath, H. Klimant, A. Ptzmann, R. Piotraschke, A.
Westfeld, G. Wicke, and G. Wolf, "Modeling the Security of
Steganographic Systems", Second International Workshop on
Information Hiding, Springer-Verlag, vol. 1525 of LNCS, 1998, pp.
344-354.
[10] Thomas Wollinger, Jorge Guajardo and Christof paar, "Security on
FPGAs: State-of-the-art implementations and attacks", ACM
Transactions on Embedded Computing Systems, Vol. 3, No. 3, August
2004, pp. 534-574.
[11] Bruce Schneier, "Applied Cryptography", John Wiley & Sons, Inc.,
Second Edition, 2001.