Information Hiding, Start Authentication




CS166

Chris Pollett

Oct 10, 2012

Outline

Information Hiding

Watermark

Watermark Examples

Non-digital Watermark Example

Twenty Dollar Bill

Watermark -- What we'd like

Steganography

Images and Steganography

Images and Stego

Stego Example 1

Image of Alice in Wonderland with book embedded in low-order bits

Non-Stego Example

Stego Example 2

Steganography

Information Hiding: The Bottom Line

HW Problem

Problem 5.33 Consider a "2 out of 3" secret sharing scheme.

  1. Suppose that Alice's share of the secret is `(4, 10/3)`, Bob's share is `(6,2)`, and Charlie's share is `(5, 8/3)`. What is the secret `S`? What is the equation of the line?
    Answer. Using the first two points, the slope of the line is `frac(10/3 - 2)(4 - 6) = -2/3`. Using point slope, the equation of the line is `y - 2 = -2/3(x-6)`, i.e., `y = -2/3x + 6`. So the secret is `6`.
  2. Suppose that the arithmetic is taken modulo `13`, that is, the equation of the line is of the form `ax + by = c (mod 13)`. If Alice's share is `(2,2)`, Bob's share is `(4, 9)`, and Charlie's share is `(6,3)`, what is the secret S? What is the equation of the line mod 13?
    Answer. The slope is `(9-2)(4-2)^(-1)`. `7 = 2^(-1) mod 13`. So this gives the slope is `10 mod 13`. Using the point slope formula, we have `y - 2 = 10(x - 2)`. So `y = 10x - 18 = 10x - 5 = 10x + 8`. So the secret is `8`.

Access Control

We are now going to switch away from crypto are start talking about access control...

Are You Who You Say You Are?

Something You Know

Trouble with Passwords

Why Passwords?

Keys vs Passwords

Good and Bad Passwords

Password Experiment

Password Experiment II