DOI QR코드

DOI QR Code

워터마킹 기반의 암호동기신호 전송 및 검출

Watermarking-based cryptographic synchronization signal transmission and detection

  • 투고 : 2017.04.17
  • 심사 : 2017.05.11
  • 발행 : 2017.08.31

초록

동기식 암호통신은 암호기와 복호기 간에 암호동기를 일치시키기 위하여 동기신호를 암호문에 부가하여 전송한다. 따라서 평문통신에 비하여 데이터 전송률이 낮아지고 전송 지연이 발생하게 되는데, 특히 무선채널과 같이 열악한 환경 등에서는 동기신호의 주기적인 전송이 요구되므로 동기신호 전송 방식은 암호통신의 품질을 좌우할 수 있다. 본 논문에서는 암호통신에서 전송 대역의 추가 없이 동기신호를 전송할 수 있는 새로운 형태의 동기신호 전송 기법과 이를 이용한 재동기 방식을 제안하였다. 제안한 방법에서는 동기신호를 전송 데이터 내에 워터마크 형태로 삽입하여 전송하고, 수신기에서 추출된 워터마크로부터 동기신호를 검출한다. 영상 데이터를 대상으로 한 모의실험을 통해 제안한 워터마킹 기반의 동기신호 전송 방법이 전송률 측면에서 효율적이며, 동기 검출을 안정적으로 지원할 수 있음을 확인하였다.

In synchronous secure communications, a synchronization signal is transmitted over the same channel where ciphertext is transmitted for cryptographic synchronization between an encryptor and a decryptor, so, it causes data rate lowering and transmission delay for plain communication. Especially, in poor environments such as wireless channels and so on, since secure communications require a periodic resynchronization protocol, synchronization signal transmission method can dominate its quality. In this paper, we proposed a new synchronization signal transmission method without additional bandwidth as well as resynchronization protocol based on it. We embeded a synchronization signal as a watermark in a transmission image and restored it from a detected watermark in the decryptor. Experimental results of image have demonstrated that the proposed synchronization signal transmission method using watermarking is efficient in transmission rate and can support reliable synchronization detection.

키워드

참고문헌

  1. A. J. Menezes, P. C. Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, Boca Raton, FL: CRC press, 1996.
  2. H. J. Lee, "Highly reliable synchronous stream cipher system for link encryption," in Proceedings of International Conference on Computational Science and Its Applications, pp. 269-278, 2006.
  3. J. H. Yoon, "A non-periodic random sequence resynchronization method using the address data of LAPB and HDLC," Ph. D. Dissertation, Kyungpook National University, Daegu, Korea, 1997.
  4. V. Smirnova and A. V. Proskurnikov. "Phase locking, oscillations and cycle slipping in synchronization systems," in Proceedings of European Control Conference, pp. 873-878, 2016.
  5. P. Eliardsson, E. Axell, P. Stenumgaard, K. Wiklundh, B. Johansson, and B. Asp, "Military HF communications considering unintentional platform-generated electromagnetic interference," in Proceedings of International Conference on Military Communications and Information Systems, pp. 1-6, 2015.
  6. R. J. Sutton, Secure Communications: Applications and Management, Chichester, U.K.: John Wiley & Sons, 2002.
  7. Y. H. Son, J. K. Hong, and K. S. Bae, "Authentication masking code against DoS of T-MAC protocol," Journal of Central South University, vol. 20, no. 7, pp. 1889-1895, Jul. 2013. https://doi.org/10.1007/s11771-013-1687-4
  8. Y. H. Son and K. S. Bae, "Cryptographic synchronization signal generation method using maximal length sequence," Journal of the Korea Institute of Information and Communication Engineering, vol. 21, no. 7, pp. 1401-1410, Jul. 2017. https://doi.org/10.6109/JKIICE.2017.21.7.1401
  9. A. Ahmad, S. S. Al-Busaidi, M. J. Al-Musharafi, "On properties of PN sequences generated by LFSR - A generalized study and simulation modeling," Indian Journal of Science and Technology, vol. 6, no. 10, pp. 5351-5358, Oct. 2013.
  10. N. S. Abinaya and P. Prakasam. "Performance analysis of maximum length LFSR and BBS method for cryptographic application," in Proceedings of International Conference on Electronics and Communication Systems, pp. 1-5, 2014.
  11. I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, Burlington, MA: Morgan Kaufmann, 2007.
  12. A. Z. Tirkel, G. A. Rankin, R. M. van Schyndel, W. J. Ho, and N. R. A. Mee, "Electronic Watermark," in Proceedings of International Conference on Digital Image Computing Techniques and Applications, pp. 666-672, 1993.
  13. R. C. Gonzalez, R. E. Woods, and S. L. Eddins, Digital Image Processing Using MATLAB, 2nd ed(H. J. Yu, Trans.). Seoul, Korea: McGraw-Hill Korea, 2012.
  14. Korean Standards Association, KS X 1213-1, 128 bit block encryption algorithm ARIA-Part 1: General, 2014.