Research on development of methods of graph theory and automata in steganography and searchable encryption

This section applies the automata approach proposed in Chapter 3 to designing an algorithm for exact pattern matching on secret data encrypted by the cryptosystem proposed in Section 5.2 (Theorem 5.2). Suppose that Alice has a secret data and prefers to outsource this data to a cloud provider Bob. As the provider is semi-trusted, Alice needs to encrypted her plaintext and wishes to only store ciphertext in the cloud. Assume that Alice uses the cryptosystem (P; C; K0; E; D) proposed in Section 5.2 to encrypt data with a pair of two secret parameters (S; k) in the cryptosystem, where S is a 2-Generators for GF 4(22) with 9 elements and k = (f; K; I) 2 K0. Because of limited storage space and computing ability, instead of downloading ciphertext, decrypting it and searching locally, Alice may ask Bob to perform pattern matching tasks on the ciphertext directly with a trapdoor of the pattern received from her

pdf98 trang | Chia sẻ: tueminh09 | Ngày: 25/01/2022 | Lượt xem: 428 | Lượt tải: 0download
Bạn đang xem trước 20 trang tài liệu Research on development of methods of graph theory and automata in steganography and searchable encryption, để xem tài liệu hoàn chỉnh bạn click vào nút DOWNLOAD ở trên
ver, the keyword based SE faces a problem. Keywords must be determined and also encrypted in a form, and then all files encrypted will be uploaded to the cloud. Then searching for new keywords can follow false results, even if the user data contains these keywords but not mentioned in the set of defined keywords. Furthermore, for the index base SE, very large indexes would make the efficiency of keyword search low [26, 40, 41, 71]. To deal with the above problem, there are some SE techniques proposed such as supporting file update functionality [29, 40, 60, 102], creating index file small [71] and providing pattern matching for search pattern is only asked at search time [26, 41, 89]. As we know that pattern matching is applied to search for information and analyze data every day, for example find and replace in text editing systems, in the search engine 68 Google, database queries, searching on genomic data, etc [26, 90]. Here, the chapter’s work takes an interest in the problem of pattern matching on encrypted data, which is an important research direction in SE. In spite of the considered problem’s importance, it has not been invested properly. To the best of author’s knowledge, there have only existed a few SE methods for exact pattern matching, but not for approximate pattern matching. Haynberg et al. [41] introduced SSE for exact pattern matching by using directed acyclic word graphs in the encryption algorithm (for more details about this data structure, see [14]). However, their technique needs the partial decryption of the ciphertext, it follows that the plaintext would be leaked to the attackers. Further, the searching is performed on users. Strizhov et al. [89] allowed pattern search on ciphertexts using the position heap tree data structure (see [31] for more details about the position heap). For this method, server does not perform search on encrypted data directly but only on index constructed from secret data. Desmoulins et al. [26] proposed SE for exact pattern matching, where the search phase Test is a pattern matching algorithm whose time complexity is O(mn) in the worst case for m,n are lengths of the pattern and the secret data. The goal of this chapter is to propose a novel symmetric cryptosystem that is used on users side, and algorithms for exact and approximate pattern matching on ciphertexts which are used on cloud servers side. These are essential components in SSE. Note that cryptography and data hiding are two branches of information security. Cryptography is used to distort data such that the data is not understood by attackers, it includes symmetric and asymmetric cryptography. While data hiding is used to hide data in digital media such as image, audio, video files, etc. It can be classified into steganography that protects secret data by hiding the existence of them and watermarking that prevents digital media by embedding watermarks in them [22, 103]. Although cryptography and steganography are both capable of protecting secret data separately, different combinations of them are being developed to create systems with better security. The well studied hybrid technique of cryptography and steganography is to encode secret data using cryptography and then embed the ciphertext using steganography [12, 19, 93]. For gray images, Song et al. [86] introduced the first method which encrypts and embeds at once. However, since these methods must all guarantee acceptable imperceptibility of the digital media, the total number of secret data hidden is limited by the size of them. To address this limitation of the existing hybrid methods, the chapter proposes a novel approach to construct a new cryptosystem based on spatial domain image steganography. In the new approach, the chapter uses the data hiding scheme (2, 9, 8) that is block based method in spatial domain, where 9 is the number of pixels in any image block, 8 is the number of secret bits which can be embedded in a block by changing colours of at most 2 pixels in the block. This scheme is near optimal for gray and palette images with high efficiency in embedding capacity, speed, security as well as visual quality, proposed in Section 2.4. Since the proposed cryptosystem is designed to solve the problem of pattern matching on encrypted data and for an assumption that secret data is a string over the alphabet of size 256, the cryptosystem allows to encrypt letters of the secret data one by one. For a given letter in the alphabet, corresponding to a 8-bit string, based on the embedding function in the data hiding scheme (2, 9, 8), the information (called the flip 69 information) is computed to change the input image block. This flip information consists of positions of pixels in the block and way changing colour of these pixels. The code word of the letter is a binary string presenting the flip information. The security analyses show that the proposed cryptosystem provides high security with a key space of 220399!29028! for gray images and 220399!218+9t28! for palette images, where t is the number of bits representing colour indexes. Return to the remaining main objective of the chapter which is the problem of pattern matching on encrypted data on cloud providers side. In Chapters 3 and 4, automata techniques are exploited for the problem of exact pattern matching and the longest common subsequence problem on plaintexts. With using these techniques, the chapters have achieved aims which are to design effective algorithms in practice to solve these problems. This chapter applies these results to constructing exact and approximate pattern matching algorithms on ciphertexts performed by severs. The main idea is to encrypt the automaton corresponding to a given pattern, and then consider this encrypted automaton as a part of the trapdoor for search. Some theoretical analyses remarked that the algorithms all have O(n) time complexity in the worst case, where for approximate algorithm uses d(1− )me processors, where ,m and n are the error of the string similarity measure and lengths of the pattern and secret data, respectively. The rest of this chapter is organized as follows. Sections 5.2, 5.3 and 5.4 propose algorithms used by users and servers in SSE. Firstly, Section 5.2 constructs a novel cryptosystem based on the data hiding scheme proposed in Chapter 2, applies this cryptosystem to the process of encrypting and decrypting a secret data sequence and discusses some security analyses. Sections 5.3 and 5.4 then use the automata approach in Chapters 3 and 4 to design exact and approximate pattern matching algorithms on secrete data encrypted by the cryptosystem proposed in Section 5.2. Finally, Section 5.5 provides the chapter’s conclusions. 5.2 A Novel Cryptosystem Based on The Data Hiding Scheme (2, 9, 8) This section 5.2 proposes a new cryptosystem, a major component in SSE, based on the data hiding scheme (2, 9, 8) proposed in Chapter 2 (Theorem 5.1 and Security analyses (5.3), (5.4)) and applies this cryptosystem to the process of encrypting and decrypting a secret data sequence (Proposition 5.1 and Security analyses (5.9), (5.10)). Call Em′ a function which is derived from the function Em by removing two Statements (2.5) and (2.6). As in Definition 2.10, the state q in Statement (2.4) is computed by q = δ(q,M) = δ2(q,M), where q,M ∈ GF 4(22) and δ2(q,M) =  {(it, at)|1 ≤ it ≤ 9, t = 1, k′, k′ ≤ 2, vit ∈ S, at ∈ GF (22)\{0}, M + (−q) = k′∑ t=1 atvit (on GF 4(22)} if v 6= q, ∅ otherwise, where S = {v1, v2, . . . , v9} is a 2-Generators for the vector space GF 4(22). Note that in Chapter 2 the number of S is given by c399!, where c ≈ 220. (5.1) 70 Then it is easy to check that the function Em′ satisfies Em′ : I ×M×K → 2{1,2,...,9}×GF (22)\{0} and the function Em′ is shown as follows. The function Em′ (computing the flip information q): q = q0; For i = 1 to N Do q = δ(q, Ii); q = δ(q,M); Ex′ is a function obtained from Ex by replacing image blocks Iit with image blocks I ′it in Statement (2.5) and then inserting two Statements (2.6) and (2.5) before Statement (2.7) in Ex, then the function Ex′ holds Ex′ : 2{1,2,...,9}×GF (2 2)\{0} × I × K → M, and the function Ex′ is given as follows. The function Ex′ (extracting M from I ′): I ′ = I; For each (it, at) in q Do I ′ it = Adjacent(I ′it , at); q = q0; For i = 1 to N Do q = δ(q, I ′i); M = q; By Proposition 2.5, we have ∀(I,M,K) ∈ I ×M× K,Ex(Em(I,M,K), K) = M and for the construction of two functions Em′ and Ex′, similarly, we also follow ∀(I,M,K) ∈ I ×M×K, Ex′(Em′(I,M,K), I,K) = M. (5.2) Remark 5.1. From defining two functions Em′ and Ex′ as above, all image blocks I used are not changed. Consider Σ to be an alphabet of size 256. Set P = Σ. By the decimal representation of the vector space GF 4(22) over the field GF (22) in Section 2.4, then |P| = |GF 4(22)| = 256, hence there exists a bijective function f from P to GF 4(22), denote the inverse function of f by f−1. Put F to be a set of all f . From the function δ2, the state q of the automaton A(I,M,K) computed by Statement (2.4) is a set. The state q may be one of the following sets: ∅, {(i, a)} for i ∈ {1, 2, . . . , 9}, a ∈ GF (22)\{0} or {(i, a), (j, b)} for i, j ∈ {1, 2, . . . , 9}, a, b ∈ GF (22)\{0}. The index i ∈ {1, 2, . . . , 9} and the coefficient a ∈ GF (22)\{0}) = {1, 2, 3} can be presented by binary strings of lengths 4 and 2, respectively. Hence, use 12 binary bits to present a state q. Suppose B is a binary string of length 12 to present an arbitrary state q, B = B12 . . . B2B1, then the storage structure of q in B is given as follows. 1. If q = ∅, then the value of any bit in B equals 0. 2. If q = {(i, a)}, then the values of 6 bits B7, B8, . . . , B12 are 0; 6 remaining bits present (i, a), where 2-bit string B2B1 presents a, 4-bit string B6B5B4B3 presents i. 71 3. If q = {(i, a), (j, b)}, then the 6-bit string B12B11..B7 presents (i, a) and the remaining 6-bit string B6B5..B1 presents (j, b) in the above mentioned way. Put Q to be a set of all possible states q, C is a set of all 12-bit strings B presenting q, q ∈ Q. Consider a function h, h : Q→ C, h(q) = B, where q is presented by B. Obviously, h is a bijective function. Denote the inverse function of h by h−1. Let K′ = {(f,K, I)|f ∈ F , K ∈ K, I ∈ I} is a finite set of secret keys. For k ∈ K′, k = (f,K, I), ek and dk are defined as follows. 1. ek : P → C, ek(x) = h(Em′(I, f(x), K)) for x ∈ P . 2. dk : C → P , dk(y) = f−1(Ex′(h−1(y), I,K)) for y ∈ C. Set E = {ek|k ∈ K′}, D = {dk|k ∈ K′}. From Definition 1.13, the correctness of the cryptosystem (P , C,K′, E ,D) is guaranteed by the following theorem. Theorem 5.1. Let ∀x ∈ P ,∀k ∈ K′, ek ∈ E and dk ∈ D. Then dk(ek(x)) = x. Proof. Set M = f(x), q = Em′(I,M,K), B = h(q), then ek(x) = B = y. We have h−1(y) = h−1(B) = q, Ex′(q, I,K) = M by Formula (5.2), f−1(M) = x, then dk(y) = x. Security analysis of the cryptosystem (P , C,K′, E ,D): Assume that publish parameters the flip graph G,Em′, Ex′, GF 4(22) and h in the cryptosystem (P , C,K′, E ,D). The plaintext x is obtained from y by the Formula x = dk(y) = f −1(Ex′(h−1(y), I,K)). So, to have accurately x, we need to know S and k = (f,K, I). The number of choices for the image block I is 2569 with gray images, 29t with palette images, where t is the number of bits to represent colour indexes. Furthermore, by Formula (2.45), the security of the cryptosystem (P , C,K′, E ,D) is given by the following formula c399!21828!2569 = c399!29028! for gray images, (5.3) or c399!21829t28! = c399!218+9t28! for palette images. (5.4) Remark 5.2. By Remark 5.1, all pairs of functions (ek, dk) in the cryptosystem (P , C,K′, E ,D) do not make the image blocks I change for ∀k ∈ K′, k = (f,K, I). In addition, we can see that encrypting and hiding are done at the same time. Consider an arbitrary subset of image blocks F as an input image, F ⊂ I, F = {F1, F2, . . . , Ft2}, t2 is the number of image blocks. Next, Section 5.2 gives a way applying the cryptosystem (P , C,K′, E ,D) to the process of encrypting and decrypting secret data over an insecure channel. By Remark 5.2, we can use a secret key subset K′′ instead of one secret key k, K′′ = {(f,K, I)|K ∈ K, I ∈ F} ⊂ K′ for f ∈ F ,K = {K1, K2, . . . , Kt1}. 72 Suppose that secret data is a string x = x1x2..xt3 for xi ∈ P ,∀i = 1, t3, t3 ≥ 1. The encrypting algorithm eK′′ used to encrypt x is given as follows. iK = 1; iF = 1; For i = 1 to t3 Do { ki = (f,K iK , FiF ); (5.5) yi = eki(xi); (5.6) iK = (iK − 1) mod t1 + 1; iF = (iF − 1) mod t2 + 1; } y = y1y2..yt3 ; The decrypting algorithm dK′′ used to decrypt y is given as follows. iK = 1; iF = 1; For i = 1 to t3 Do { ki = (f,K iK , FiF ); (5.7) x′i = dki(yi); (5.8) iK = (iK − 1) mod t1 + 1; iF = (iF − 1) mod t2 + 1; } x′ = x′1x ′ 2..x ′ t3 ; Propostion 5.1. Let F, x,K′′ and the cryptosystem (P , C,K′, E ,D) based on the data hiding (2, 9, 8) as above. Then dK′′(eK′′(x)) = x. Proof. Clearly, ∀i, i = 1, t3, ki determined in Statement (5.5) is the same as in Statement (5.7). In addition, by Theorem 5.1, xi is encrypted by Statement (5.6) and obtained by Statement (5.8) such that x′i = xi. Then x = x ′, hence dK′′(eK′′(x)) = x. Security analysis of process of encrypting and decrypting the secret data x using two algorithms eK′′ and dK′′ : Assume that also publish parameters as in the cryptosystem (P , C,K′, E ,D). Hence, to restore exactly x, we need to know S and K′′. The number of choices for S is c399! by Formula (5.1). The number of choices for K′′ is 28!218t12569t2 (for gray images), 28!218t129tt2 (for palette images, where t is the number of bits to represent colour indexes). Then for a brute force attack, the number of all possible combinations of S and K′′ used in two algorithms eK′′ and dK′′ is c399!28!218t12569t2 = c399!28!218t1+72t2 for gray images, (5.9) 73 or c399!28!218t129tt2 = c399!28!218t1+9tt2 for palette images. (5.10) Remark 5.3. For two algorithms eK′′ and dK′′ given as above, an arbitrary image block I in the input image F can be used many times in process of encrypting and decrypting the secret data. So, for a give input image F , the secret data encrypted is not limited by the size of the input image F . 5.3 Automata Technique for Exact Pattern Matching on Encrypted Data This section applies the automata approach proposed in Chapter 3 to designing an algorithm for exact pattern matching on secret data encrypted by the cryptosystem proposed in Section 5.2 (Theorem 5.2). Suppose that Alice has a secret data and prefers to outsource this data to a cloud provider Bob. As the provider is semi-trusted, Alice needs to encrypted her plaintext and wishes to only store ciphertext in the cloud. Assume that Alice uses the cryptosystem (P , C,K′, E ,D) proposed in Section 5.2 to encrypt data with a pair of two secret parameters (S, k) in the cryptosystem, where S is a 2-Generators for GF 4(22) with 9 elements and k = (f,K, I) ∈ K′. Because of limited storage space and computing ability, instead of downloading ciphertext, decrypting it and searching locally, Alice may ask Bob to perform pattern matching tasks on the ciphertext directly with a trapdoor of the pattern received from her. Consider Σ to be an alphabet of size 256. Suppose that the secret data is a string over Σ x = x1x2..xt3 for xi ∈ P ,∀i = 1, t3, t3 ≥ 1 and t3 is often a large natural number, where P = Σ. Before uploading the secret data x to Bob, Alice use the encrypting function ek ∈ E to encrypt each xi. Then Alice computes yi = ek(xi),∀i = 1, t3, and the encrypted secret data is a string over Σ′ y = y1y2..yt3 which is sent to Bob, where Σ′ is an alphabet Σ′ = {a′|a′ = ek(a), a ∈ Σ}. In general case, for x is any string over the alphabet Σ and a string y is obtained from x by the above way. Then we can write y = ek(x) for short and y is a string over the alphabet Σ′. Remark 5.4. By using only one pair of two secret parameters (S, k), then the security of process of encrypting and decrypting the secret data x is similar to Formulas (5.3) (for gray images) or (5.4) (for palette images). Suppose that Bob needs to perform exact pattern matching task of an arbitrary pattern p on encrypted data y. Based on previously introduced results in Chapter 3, here continues using automata technique to meet the requirement. 74 Propostion 5.2. Let p be a pattern over the alphabet Σ. Then Posp′(a ′) = Posp(a) for ∀a′ ∈ Σ′, a = dk(a′), where p′ = ek(p). Proof. Set i = Posp(a), then a = pi, hence a ′ = p′i. Without loss of generality, suppose Posp′(a ′) > i, then ∃i′ > i, p′i′ = a′ by Definition 3.3, then a = pi′ = dk(p′i′). Then i < Posp(a), a contradiction. So, we complete the proof. Propostion 5.3. Let a pattern p and a text x be two strings over the same alphabet Σ and the function Sign be given by ∀a′ ∈ Σ′, Sign(a′) = { 1 If a ∈ p, 0 Otherwise. Then ∀a′ ∈ Σ′, a′ ∈ p′ if and only if Sign(a′) = 1. Proof. Suppose ∀a′ ∈ Σ′, a′ ∈ p′ if and only if ∃i, i = 1..|p′|, a′ = p′i if and only if a = pi if and only if Sign(a′) = 1. Propostion 5.4. Let a pattern p and a text x be two strings over the same alphabet Σ. Then p occurs at any position i in x if and only if p′ occurs at the position i in y, where y = ek(x). Proof. Suppose that p occurs at any position i in x if and only if p = xixi+1..xi+|p|−1 if and only if yiyi+1..yi+|p|−1 = p′ if and only if p′ occurs at the position i in y. Propostion 5.5. Let p be a pattern over the alphabet Σ. Then ∀l, 1 ≤ l ≤ |p|, Nextp′(l) = Nextp(l), where p ′ = ek(p). Proof. Without loss of generality, suppose that lm = Nextp(l) < Nextp′(l) for ∀l, 1 ≤ l ≤ |p|. Since p′i = ek(pi),∀i = 1..|p|, then p′1p′2..p′lm +1 is both a proper prefix and suffix of p′[1..l] by Definition 3.1. Hence, p1p2..plm +1 is also both a proper prefix and suffix of p[1..l] by Definition 3.1. Then Nextp(l) > lm. This is a contradiction to the supposition. So, the proof is complete. Propostion 5.6. Let p be a pattern over the alphabet Σ. Then for ∀l, 0 ≤ l ≤ |p| and ∀a′ ∈ Σ′, a = dk(a′), Appearancep′(l, a′) = Appearancep(l, a), where p′ = ek(p). Proof. Clearly, |p| = |p′| and for ∀i, 1 ≤ i ≤ |p′|,∀a′, a′ ∈ Σ′, a′ = p′i if and only if a = pi. By Lemma 3.1 and Proposition 5.5, Appearancep′(l, a ′) = Appearancep(l, a). Theorem 5.2. Let p be a pattern over the alphabet Σ. Let two automata Mp = (Σ, Qp, q0, δp, Fp) and Mp′ = (Σ ′, Qp′ , q0, δp′ , Fp′) be determined as in Theorem 3.2. Then Qp′ = Qp, Fp′ = Fp,∀q ∈ Qp′ ,∀a′ ∈ Σ′, a = dk(a′), δp′(q, a′) = δp(q, a), where p′ = ek(p). Proof. It is easy to verify that |p| = |p′|. In addition, by Theorem 3.2 and Proposition 5.6, then Qp′ = Qp, Fp′ = Fp and δp′(q, a ′) = δp(q, a). Remark 5.5. The meaning of Theorem 5.2 in practice is to compute δp′ from δp. 75 Let a pattern p and a text (secret data) x be two strings over the same alphabet Σ and assume |p|  |x|. For assuming that we have only the encrypted secret data y which is not decrypted to the secret data x, from Propositions 5.2, 5.3 and 5.4, Theorem 5.2, based on the MRc algorithm for c = 1 and using the type a breaking point and the concept of Posp in Chapter 3, and by using the automaton Mp′ given as in Theorem 3.2, we have an exact pattern matching algorithm immediately that finds all occurrences of the pattern p in x as follows. Note that the trapdoor according to the search pattern p is computed based on p, which includes the length of p, the functions Sign, Posp′ and the automaton Mp′ . jump = |p|; While (jump ≤ |y|) { If (sign(yjump) == 1) { q = 0; i = jump− Posp′(yjump) + 1; Do { q = δp′(q, yi); If (q == |p|) Mark an occurrence of p at i− |p|+ 1 in x; i+ +; } While (q 6= 0 and i ≤ |y|); jump = i− 1; } jump = jump+ |p|; } Remark 5.6. Obviously, the above algorithm is the same as the MRc algorithm in Chapter 3 for c = 1, using the type a breaking point and concepts of Posp′ , and where Posp and δp of the MRc algorithm are replaced with Posp′ and δp′ . Furthermore, by Propositions 3.2 and 5.2, and Theorem 5.2, clearly in the worst case, this algorithm’s time complexity is O(n). 5.4 Automata Technique for Approximate Pattern Matching on Encrypted Data Suppose that Bob wants to do approximate pattern matching of any pattern p on the ciphertext y. From results proposed in Chapter 4, automata technique is still applied to meeting the requirement (Theorem 5.3). Propostion 5.7. Let p be a pattern over the alphabet Σ. Then WConfig(p′) = WConfig(p), where p′ = ek(p). Proof. Obviously, W0 belongs to WConfig(p ′) and WConfig(p). Consider any W ′ ∈ WConfig(p′)\{W0}, then we can set W ′ = {w′1, w′2, . . . , w′l} for 1 ≤ l ≤ |p′|. Then 76 ∃C ′ = {u′1, u′2, . . . , u′l} ∈ Config(p′) by Definition 4.2, where Wp′(u′i) = w′i for 1 ≤ i ≤ l. Then ∃!C = {u1, u2, . . . , ul} ∈ Config(p), where ui = dk(u′i) for 1 ≤ i ≤ l. Set W = Wp(C), then W ∈ WConfig(p) by Definition 4.2. It easy to verify that Rmp′(u ′ i) = Rmp(ui) for 1 ≤ i ≤ l by Definition 1.10, then Wp′(u′i) = Wp(ui) for 1 ≤ i ≤ l by Definition 4.1. Hence, W ′ = W , then WConfig(p′) ⊂ WConfig(p). Similarly, we have WConfig(p) ⊂WConfig(p′). So, the proof is complete. Propostion 5.8. Let p be a pattern over the alphabet Σ. Then Refp′(i, a ′) = Refp(i, a) for ∀i, 0 ≤ i ≤ |p′| and ∀a′ ∈ Σ′, a = dk(a′), where p′ = ek(p). Proof. Clearly, W ip′(a ′) = W ip(a) by Definition 4.3. So, Refp′(i, a′) = Refp(i, a) by Definition 4.4. Hence, we complete the proof. Theorem 5.3. Given a pattern p on Σ and a positive integer constant c with 1 ≤ c ≤ |p|. Let two automata APcp = (Σ, Qp, q0, δp, Fp) and APcp′ = (Σ′, Qp′ , q0, δp′ , Fp′) be determined as in Theorem 4.4. Then Qp′ = Qp, Fp′ = Fp,∀q ∈ Qp′ , ∀a′ ∈ Σ′, a = dk(a′), δp′(q, a ′) = δp(q, a), where p′ = ek(p). Proof. By Proposition 5.7, Qp′ = Qp. Evidently, ∀a′ ∈ Σ′, a = dk(a′), a′ ∈ p′ if and only if a ∈ p. Furthermore, by Definition 4.9 and Proposition 5.8, δp′(W,a′) = δp(W,a). Then Fp′ = Fp. So, the proof is complete. Remark 5.7. The meaning of Theorem 5.3 in practice is to compute δp′ from δp. Based on the approximate pattern matching problems considered in [66, 67, 73], the section introduces a new concept of the appearance of the pattern p in x with a given error. This is a basis for giving requirements for the approximate pattern matching algorithm. Definition 5.1. Given two strings p and x over Σ, and a string similarity measure d. Let an error ,  > 0,  ∈ <. Then p appears in x with the error  if there exists a substring u of x such that d(p, u) ≤ . To construct the approximate pattern matching algorithm, we need a function to measure the string similarity. The most commonly used similarities are recalled in [71, 73, 77]. Bakkelund [8] proposed a well known string similarity measure which is based on the longest commonly subsequence. Similarly, here this section defines a new measure of similarity between two strings d(p, u) = 1− lcs(p, u) min{|p|, |u|} , (5.11) where p is a pattern and u is a substring of x. Clearly, d given above is positive definite and symmetric. Propostion 5.9. Given two strings p and x over the same alphabet Σ. Then ∀u′, u′ is an arbitrary substring of y, d(p′, u′) = d(p, u), where p′ = ek(p), y = ek(x), u = dk(u′). Proof. Clearly, |p′| = |p|, |u′| = |u| and lcs(p, u) = lcs(p′, u′). By Formula (5.11), d(p′, u′) = d(p, u). So, we complete the proof. 77 By using the string similarity measure given in Formula (5.11), the automata technique proposed in Chapter 4 for computing lcs(p′, u′) will make an approximate pattern matching algorithm fast, and especially efficient for one pattern and a set of a large number of encrypted texts. Given a pattern p and a text (secret data) x over the same alphabet Σ, and an arbitrary substring u of x. Let , 0 <  < 1 and d(p, u) be given as in Formula (5.11) such that d(p, u) ≤ . Then by Proposition 5.9, d(p′, u′) ≤ . By Formula (5.11), we have lcs(p′, u′) ≥ (1− )min{|p′|, |u′|}. (5.12) If there is u′ which is a substring of y such that lcs(p′, u′) ≥ (1 − )|p|, then Formula (5.12) holds that means d(p′, u′) ≤ . Hence, ∃u, u is a substring of x, d(p, u) ≤ . So, the constant c in Theorem 4.4 is determined by c = d(1− )|p|e. Without decrypting y, based on Theorem 5.3, Definition 5.1 and Formula (5.11), use the automaton APcp′ given as in Theorem 4.4, we immediately have an approximate pattern matching algorithm which determines whether p appears in x with the error  or not as follows, where the trapdoor responding to the pattern p is determined from p and , which consists of the constant c and the automaton APcp′ . app = 0; q = W0; //The initial state of the automaton APcp′ is started from W0 For i = 1 to |y| Do { q = δp′(q, yi); If (|q| = c) {app=1; Break;} } If (app = 1) Announce the appearance of the pattern p in x with the error ; Else Announce that p does not appear in x with the error . Remark 5.8. Since we can compute δp′ from δp, the above proposed algorithm is similar to the Algorithm 2 (the parallel algorithm) in Chapter 4. In addition, according to Theorem 4.4, δp is computed in parallel way and the Algorithm 2 costs the worst case time complexity O(n) with the supposition that the Algorithm 2 uses k processors for k is an upper estimate of the lcs(p, x). As an immediately consequence, in the worst case, time complexity of the algorithm is O(n) when it uses d(1− )|p|e processors. 5.5 Conclusions From results of steganography, pattern matching and some suggestions in the next works in Chapters 2, 3 and 4, this chapter has completed some parts of those works. Based on the data hiding scheme (2, 9, 8) in Chapter 2, the chapter constructs a novel cryptosystem with high security. This method allows both of encrypting and hiding to be done at once, ciphertexts not to depend on the input image size as existing hybrid techniques of cryptography and steganography. In addition, this cryptosystem can be used to encrypt and decrypt secret data by users in SSE. For the ciphertext made by the cryptosystem on users side, the chapter designs two pattern matching algorithms to search for any pattern 78 in it directly on cloud servers side. The outstanding feature of the algorithms is that, they can be applied well to all cryptosystems that support encrypting letters of the secret data one by one. The idea of the design is to apply the automata approach for the exact pattern matching and the longest common subsequence problems in Chapters 3 and 4. For the assumption that the approximate algorithm uses d(1− )me processors, the time complexities of these algorithms are both O(n) in the worst case, where ,m and n are the error of a measure of similarity between two strings proposed in Section 5.4 and lengths of the pattern and secret data, respectively. With the proposed automata approach to pattern matching algorithms, the automata constructed are only based on search patterns. Then the algorithms will have lots of advantages in case of a given pattern and a very large set of ciphertexts stored in the cloud. So, future work continues studying this technique to apply in SE. 79 CONCLUSION Based on the supervision of Assoc. Prof. Dr. Sc. Phan Thi Ha Duong and Dr. Vu Thanh Nam, and study on results using graph theory and automata technique proposed by P. T. Huy et al. in steganography and searchable encryption, new contributions of the dissertation in these fields can be summarized as follows: 1. A general approach based on the Galois field GF (pm) using graph theory and automata to designing optimal and near optimal secret data hiding schemes for binary, gray and palette images (Chapter 2); 2. Based on the approach, Chapter 2 shows that the data hiding scheme CTL [18] reaches an optimal data hiding scheme with N = 2n − 1, where n is a positive integer; 3. From the approach, Chapter 2 proposes data hiding schemes consisting of the optimal data hiding scheme (1, 2n−1, n) for binary, gray and palette images with qcolour = 1, where n is a positive integer, the near optimal data hiding scheme (2, 9, 8) and the optimal data hiding scheme (1, 5, 4) for gray and palette images with qcolour = 3; 4. A flexible automata approach to constructing an efficient algorithm for the exact pattern matching problem in practice (Chapter 3); 5. Mathematical basis for the development of automata technique for computing the lcs(p, x) (Chapter 4); 6. By the above basis, Chapter 4 proposes two efficient sequential and parallel algorithms computing the lcs(p, x) in practice. The parallel algorithm takes O(n) time in the worst case if it uses k processors, where k is an upper estimate of the length of a longest common subsequence of the two strings p and x; 7. Based on results proposed in Chapters 2, 3 and 4, Chapter 5 proposes two major components of SSE: a) A novel cryptosystem based on the data hiding scheme (2, 9, 8) with high security, used by users. This method allows both of encrypting and hiding to be done at once, the ciphertext not to depend on the input image size as existing hybrid techniques of cryptography and steganography; b) Two exact and approximate pattern matching algorithms, using automata technique, search for any pattern in ciphertexts directly, performed by cloud servers. For the assumption that the approximate algorithm uses d(1− )me processors, the time complexities of these algorithms are both O(n) in the worst case, where ,m and n are the error of the proposed measure of similarity between two strings and lengths of the pattern and secret data, respectively. Because the problem of development of methods of graph theory and automata in steganography and searchable encryption is topical, some following interest problems can be considered in the future: 1. Whether there exists the optimal data hiding scheme (2, 8, 8) for 8-bit gray image with qcolour = 3; 2. Improving the quality of stego image generated by proposed data hiding schemes for palette images; 3. The problem of steganalysis attacks; 4. Development of automata technique in SE. 80 BIBLIOGRAPHY [1] A. V. Aho, D. S. Hirschberg, J. D. Ullman (1976), “Bounds on The Complexity of The Longest Common Subsequence Problem”, Journal of the Association for Computing Machinery, 23(1), pp. 1-12. [2] O. I. I. Al-Farraji (2016), “Combination between Steganography and Cryptography in Information Hiding by Using Same Key”, International Journal of Engineering Research and General Science, 4(6), pp. 201-208. [3] C. Allauzen, M. Crochemore, M. Raffinot (1999), “Factor Oracle: A New Structure for Pattern Matching”, In: J. Pavelka, G. Tel, M. Bartosˇek (Eds.) Theory and Practice of Informatics, 26th Conference on Current Trends in Theory and Practice of Informatics Milovy, Czech Republic, November 27 - December 4, 1999. Proceedings. LNCS-1725, Springer, pp. 295-310. [4] S. AL-Mansoori, A. Kunhu (2013), “Discrete Cosine Transform and Hash Functions toward Implementing a (Robust-Fragile) Watermarking Scheme”, Proc. SPIE 8895, High-Performance Computing in Remote Sensing III, 889504. [5] V. S. Babu, K. J. Helen (2015), “A Study on Combined Cryptography and Steganography”, International Journal of Research Studies in Computer Science and Engineering, 2(5), pp. 45-49. [6] A. Baby, H. Krishnan (2017), “Combined Strength of Steganography and Cryptography - A Literature Survey”, International Journal of Advanced Research in Computer Science, 8(3), pp. 1007-1010. [7] R. Baeza-Yates, G. H. Gonnet (1992), “A New Approach to Text Searching”, Communications of the ACM, 35(10), pp. 74-82. [8] D. Bakkelund (2009), “An LCS-based String Metric”, University of Oslo (Norway), September 23. [9] A. Begum (2008), “A Greedy Approach for Computing Longest Common Subsequences”, Journal of Prime Research in Mathematics, Vol. 4, pp. 165-170. [10] T. Berry, S. Ravindran (2001), “Fast String Matching Algorithm and Experimental Results”, A Proceedings of the Prague Stringology Club Workshop 99, Collaborative Report DC-99-05, Czech Technical University, Prague, pp. 16-26. [11] J. Berstel, D. Perrin (1985), “Theory of Codes”, Academic Press. [12] P. Bharti, R. Soni (2012), “A New Approach of Data Hiding in Images using Cryptography and Steganography”, International Journal of Computer Applications, 58(18), pp. 1-5. [13] G. Birkhoff, S. M. Lane (1969), “A Survey of Modern Algebra” (Third edition), Macmillan Company. 81 [14] A. Blumer, J. Blumer, D. Haussler, A. Ehrenfeucht, M. T. Chen, J. Seiferas (1985), “The Smallest Automation Recognizing The Subwords of A Text”, Theoretical Computer Science, Vol. 40, pp. 31-55. [15] R. S. Boyer, J. S. Moore (1977), “A Fast String Searching Algorithm”, Communications of the ACM, 20(10), pp. 762-772. [16] D. Cantone, S. Faro (2005), “Fast-Search Algorithms: New Efficient Variants of the Boyer-Moore Pattern-Matching Algorithm”, J. Autom. Lang. Comb., 10(5/6), pp. 589-608. [17] S. Chakraborty, S. K. Bandyopadhyay (2013), “Steganography Method Based On Data Embedding By Sudoku Solution Matrix”, International Journal of Engineering Science Invention, 2(7), pp. 2319-6726. [18] C. C. Chang, C. S. Tseng, C. C. Lin (2005), “Hiding Data in Binary Images”, In: Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou (Eds.) Information Security Practice and Experience, 1st International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedings. LNCS-3439, Springer, 2005, pp. 338-349. [19] A. Chatterjee, A.K. Das (2018), “Secret Communication Combining Cryptography and Steganography”, In: K. Saeed, N. Chaki, B. Pati, S. Bakshi, D. Mohapatra (Eds.) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, Vol. 563. Springer, Singapore, pp. 281-291. [20] A. Cheddad, J. Condell, K. Curran, P. M. Kevitt (2010), “Digital Image Steganography: Survey and Analysis of Current Methods”, Signal Processing, 90(3), pp. 727-752. [21] J. Chen, T. S. Chen, M. W. Cheng (2003), “A New Data Hiding Method in Binary Image”, Proceedings of the IEEE Fifth International Symposium on Multimedia Software Engineering, pp. 88-93. [22] G. Chugh (2013), “Information Hiding - Steganography & Watermarking: A Comparative Study”, International Journal of Advanced Research in Computer Science, 4(4), pp. 165-171. [23] V. Chvatal, D. A. Klarner, D. E. Knuth (1972), “Selected Combinatorial Research Problems”, Stan-CS-TR-72-292, pp. 26. [24] T. H. Cormen, C. E. Leiserson, R. L. Rivest, C. Stein (2001), “Introduction to Algorithms (Second edition)”, MIT Press, Chapter 32. [25] M. Crochemore, W. Rytter (1994), “Text Algorithms”, Oxford University Press. [26] N. Desmoulins, P. A. Fouque, C. Onete, O. Sanders (2018), “Pattern Matching on Encrypted Streams”, In: T. Peyrin, S. Galbraith (Eds.) Advances in Cryptology - ASIACRYPT 2018. LNCS-11272, Springer, pp. 121-148. [27] A. Dhraief, R. Issaoui, A. Belghith (2011), “Parallel Computing The Longest Common Subsequence (LCS) on GPUs: Efficiency and Language Suitability”, Proceedings of the 1st International Conference on Advanced Communications and Computation, Spain, October 23-28, 2011, pp. 143-148. [28] Q. Dong, Z. Guan, L. Wu, Z. Chen (2013), “Fuzzy Keyword Search over Encrypted Data in the Public Key Setting”, In: J. Wang, H. Xiong, Y. Ishikawa, J. Xu, J. Zhou (Eds.) Web-Age Information Management. LNCS-7923, Springer, pp. 729-740. 82 [29] R. Dowsley, A. Michalas, M. Nagel, N. Paladi (2017), “A Survey on Design and Implementation of Protected Searchable Data in The Cloud”, Computer Science Review, Vol. 26, pp. 17-30. [30] B. Durian, J. Holub, H. Peltola, J. Tarhio (2009), “Tuning BNDM with q-Grams”, In: I. Finocchi, J. Hershberger (Eds.) Algorithm Engineering and Experiments, 10th Workshop, ALENEX 2009, New York, January 3, 2009. Proceedings., pp. 29-37. [31] A. Ehrenfeucht, R, M. McConnell, N. Osheim, S. W. Woo (2011), “Position Heaps: A Simple and Dynamic Text Indexing Data Structure”, Journal of Discrete Algorithms, Vol. 9, pp. 100-121. [32] S. Faro, T. Lecroq (2009), “Efficient Variants of The Backward-Oracle-Matching Algorithm”, International Journal of Foundations of Computer Science, 20(6), pp. 967-984. [33] S. Faro, T. Lecroq (2013), “The Exact Online String Matching Problem: A Review of the Most Recent Results”, ACM Computing Surveys, 45(2), Article 13. [34] F. Franek, C. G. Jennings, W. F. Smyth (2007), “A Simple Fast Hybrid Pattern- Matching Algorithm”, Journal of Discrete Algorithms, 5(4), pp. 682-695. [35] K. Fredriksson, S. Grabowski (2005), “Practical and Optimal String Matching”, In: M. P. Consens, G. Navarro (Eds.) String Processing and Information Retrieval, 12th International Conference, SPIRE 2005, Buenos Aires, Argentina, November 2-4, 2005. Proceedings, LNCS-3772, Springer, pp. 376-387. [36] J. Fridrich (1999), “A New Steganographic Method for Palette-Based Images”, Proceedings of The IS&T PICS Conference, pp. 285-289. [37] J. Fridrich, R. Du (2000), “Secure Steganographic Methods for Palette Images”, Proceedings of The IS&T PICS Conference, pp. 47-60. [38] Y. K. Gedam, J.N. Varshapriya (2014), “Fuzzy Keyword Search Over Encrypted Data in Cloud Computing”, Journal of Engineering Research and Applications, 4(7), pp. 197-202. [39] R. C. Gonzalez, R. E. Woods (2008), “Digital Image Processing”, Pearson Prentice Hall. [40] F. Han, J. Qin, J. Hu (2016), “Secure Searches in The Cloud: A Survey”, Future Generation Computer Systems, Vol. 62, pp. 66-75. [41] R. Haynberg, J. Rill, D. Achenbach, J. Mu¨ller-Quade (2013), “Symmetric Searchable Encryption for Exact Pattern Matching using Directed Acyclic Word Graphs”, In: Samarati, Pierangela (Eds.) Security and Cryptography, the 10th International Conference on Security and Cryptography, SECRYPT 2013, Reykjavk, Iceland, July 29-31, 2013. Proceedings. SciTePress, pp. 403-410. [42] D. S. Hirschberg (1975), “A Linear Space Algorithm for Computing Maximal Common Subsequences”, Comm. ACM, 18(6), pp. 341-343. [43] J. Holub, B. Durian (2005), “Talk: Fast Variants of Bit Parallel Approach to Suffix Automata”, In: The Second Haifa Annual International Stringology Research Workshop of the Israeli Science Foundation. 83 [44] J. E. Hopscoft, R. Motwani, J. D. Ullman (2001), “Introduction to Automata Theory, Languages, and Computation” (Second Edition), Addison-Wesley. [45] R. N. Horspool (1980), “Practical Fast Searching in Strings”, Software Practice and Experience, 10(6), pp. 501-506. [46] C. L. Hou, C. Lu, S. C. Tsai, W. G. Tzeng (2011), “An Optimal Data Hiding Scheme with Tree-Based Parity Check”, IEEE Transactions on Image Processing, 20 (3), pp. 880-886. [47] P. T. Huy, N. Q. Khang (2002), “A New Algorithm for LCS Problem”, Proceedings of the 6th Vietnam Conference of Mathematics, Hue, September 7-10, 2002, pp. 145-157. [48] P. T. Huy, C. Kim, N. H. Thanh (2013), “Modules over Rings of Small Characteristics and Maximality of Data Hiding Ratio in CPTE Schemes”, American Journal of Applied Sciences, 10 (9), pp. 1102-1108. [49] P. T. Huy, N. H. Thanh (2011), “On the Maximality of Secret Data Ratio in CPTE Schemes”, In: N. T. Nguyen, C. G. Kim, A. Janiak (Eds.) Intelligent Information and Database Systems, Third International Conference, ACIIDS 2011, Korea, April 20-22, 2011, Proceedings, Part I. LNCS-6591, Springer, pp. 88-99. [50] P. T. Huy, N. H. Thanh, N. T. Dat, C. Kim (2013), “Improving Optimal Parity Assignments in Palette Images”, Journal INFORMATION, 16 (4), pp. 2661-2668. [51] P. T. Huy, N. H. Thanh, C. Kim (2012), “Relationship between Correcting Code and Module Technique in Hiding Secret Data”, In: J. J. Park, A. Zomaya, S. S. Yeo, S. Sahni (Eds.) Network and Parallel Computing, Ninth International Conference, NPC 2012, Korea, September 6-8, 2012, Proceedings. LNCS-7513, Springer, pp. 297-307. [52] N. T. T. Huyen, P. T. Huy (2002), “Fuzzy Approach in Some Pattern Matching Algorithms”, Vietnam J. of Computer Science and Cybernetics, 18(3), pp. 201-210. [53] S. Ijeri, S. Pujeri, B. Shrikant, B. A. Usha (2012), “Image Steganography Using Sudoku Puzzle for Secured Data Transmission”, International Journal of Computer Applications, 48(17), pp. 31-35. [54] C. S. Iliopoulos, M. S. Rahman (2009), “A New Efficient Algorithm for Computing The Longest Common Subsequence”, Theory Comput Syst, Vol. 45, pp. 355-371. [55] Indu, Prena (2016), “Comparative Study of Different Longest Common Subsequence Algorithms”, International Journal of Recent Research Aspects, 3(2), pp. 65-69. [56] J, Irvine, D. Harle (2002), “Data Communications and Networks: An Engineering Approach”, John Wiley & Sons, Ltd. [57] M. Jain, S. K. Lenka (2016), “A Review of Digital Image Steganography using LSB and LSB Array”, International Journal of Applied Engineering Research, 11(3), pp. 1820-1824. [58] N. S. Jho, D. Hong (2013), “Symmetric Searchable Encryption with Efficient Conjunctive Keyword Search”, KSII Transactions on Internet and Information Systems, 7(5), pp. 1328-1342. [59] T. Jiang, M. Li (1995), “On The Approximation of Shortest Common Supersequences and Longest Common Subsequences”, SIAM J. Comput, 24(5), pp. 1122-1139. 84 [60] M. S. John, P. SumaLatha, M. Joshuva (2015), “A Comparative Study of Index-Based Searchable Encryption Techniques”, International Journal of Advanced Research in Computer Science, 6(3), pp. 13-15. [61] N. Khan, K. S. Gorde, M. E. Student (2015), “Data Security by Video Steganography and Cryptography Techniques”, International Journal of Emerging Trends in Electrical and Electronics, 11(5), pp. 58-64. [62] I. Khan, S. Gupta, S. Singh (2016), “A New Data Hiding Approach in Images for Secret Data Communication with Steganography”, International Journal of Computer Applications, 135(13), pp. 9-14. [63] A. Khan, A. Siddiqa, S. Munib, S. A. Malik (2014), “A Recent Survey of Reversible Watermarking Techniques”, Information Sciences, Vol. 279, pp. 251-272. [64] D. E. Knuth, J. H. Morris, Jr., V. R. Pratt (1977), “Fast Pattern Matching in Strings”, SIAM J. Comput., 6(2), pp. 323-350. [65] W. C. Kuo, S. H. Kuo, C. C. Wang, L. C. Wuu (2016), “High Capacity Data Hiding Scheme Based on Multi-bit Encoding Function”, Optik, Vol. 127, pp. 1762-1769. [66] G. M. Landau, U. Vishkin (1986), “Efficient String Matching with k Mismatches”, Theoretical Computer Science, Vol. 43, pp. 239-249. [67] J. V. Leeuwen (1990), “Handbook Of Theoretical Computer Science”, Vol. A, Elsevier MIT Press. [68] T. Lecroq (2007), “Fast Exact String Matching Algorithms”, Information Processing Letters, 102(6), pp. 229-235. [69] X. Li, S. Cai, W. Zhang, B. Yang (2015), A “Further Study of Large Payloads Matrix Embedding”, Information Sciences, Vol. 324, pp. 257-269. [70] D. Maier (1978), “The Complexity of Some Problems on Subsequences and Supersequences”, Journal of the ACM, 25(2), pp. 322-336. [71] Z. Mei, B. Wu, S. Tian, Y. Ruan, Z. Cui (2017), “Fuzzy Keyword Search Method over Ciphertexts Supporting Access Control”, KSII Transactions on Internet and Information Systems, 11(11), pp. 5671-5693. [72] M. H. Mohamed, L. M. Mohamed (2016), “High Capacity Image Steganography Technique Based on LSB Substitution Method”, Applied Mathematics & Information Sciences, 10(1), pp. 259-266. [73] G. Navarro (2001), “A Guided Tour to Approximate String Matching”, ACM Computing Surveys, 33 (1), pp. 3188. [74] G. Navarro, M. Raffinot (2000), “Fast and Flexible String Matching by Combining Bit-Parallelism and Suffix Automata”, ACM Journal of Experimental Algorithmics (JEA), 5(4), Article 4. [75] H. K. Pan, Y. Y. Chen, Y. C. Tseng (2000), “A Secret of Data Hiding Scheme for Two- Color Images”, In: Proceedings ISCC 2000. Fifth IEEE Symposium on Computers and Communications, pp. 750-755. [76] K. J. Panchal, F. N. Patel (2014), “Steganography: A Brief Survey”, International Journal of Modern Trends in Engineering and Research, 2(2), pp. 747-750. 85 [77] P. H. Paris, N. Abadie, C. Brando (2017), Linking Spatial Named Entities to The Web of Data for Geographical Analysis of Historical Texts”, Journal of Map & Geography Libraries, 13 (1), pp. 82-110. [78] B. Park, R. Lu (2015), “Hyperspectral Imaging Technology in Food and Agriculture”, Springer. [79] H. Peltola, J. Tarhio (2003), “Alternative Algorithms for Bit-Parallel String Matching”, In: M. A. Nascimento, E. S. de Moura, A. L. Oliveira (Eds.) String Processing and Information Retrieval, 10th International Symposium, SPIRE 2003, Manaus, Brazil, October 8-10, 2003. Proceedings. LNCS-2857, Springer, pp. 80-93. [80] M. V. Ramakrishnan, S. Eswaran (2013), “A Comparative Study of Various Parallel Longest Common Subsequence (LCS) Algorithms”, International Journal of Computer Trends and Technology, 4(2), pp. 183-186. [81] M. I. S. Reddy, A. P. S. Kumar (2016), “Secured Data Transmission Using Wavelet Based Steganography and Cryptography by Using AES Algorithm”, Procedia Computer Science, Vol. 85, pp. 62-69. [82] K. H. Rosen (2012), “Discrete Mathematics and Its Applications” (Seventh Edition), McGraw-Hill. [83] K. Ruohonen (2009), “Formal Languages”, Tampere University of Technology, pp. 1-3. [84] S. S. Sheik, S. K. Aggarwal, A. Poddar, N. Balakrishnan, K. Sekar (2004), “A Fast Pattern Matching Algorithm”, J. Chem. Inf. Comput. Sci., 44 (4), pp. 1251-1256. [85] D. X. Song, D. Wagner, A. Perrig (2000), “Practical Techniques for Searches on Encrypted Data”, In: Proceeding 2000 IEEE Symposium on Security and Privacy, pp. 44. [86] S. Song, J. Zhang, X. Liao, J. Du, Q. Wen (2011), “A Novel Secure Communication Protocol Combining Steganography and Cryptography”, Procedia Engineering, Vol. 15, pp. 2767-2772. [87] C. A. Stanley (2005), “Pairs of Values and The Chi-squared Attack”, Department of Mathematics, Iowa State University, May 1, 2005. [88] D. R. Stinson (1995), “Cryptography: Theory and Practice (CRC Press Series on Discrete Mathematics and Its Application)”, CRC Press. [89] M. Strizhov, Z. Osman, I. Ray (2016), “Substring Position Search over Encrypted Cloud Data Supporting Efficient Multi-User Setup”, Future Internet, 8(3), 28. [90] D. M. Sunday (1990), “A Very Fast Substring Search Algorithm”, Communications of the ACM, 33(8), pp. 132-142. [91] R. Thathoo, A. Virmani, S. S. Lakshmi, N. Balakrishnan, K. Sekar (2006), “TVSBS: A Fast Exact Pattern Matching Algorithm for Biological Sequences”, Current Sci., 91(1), pp. 47-53. [92] Y. C. Tsengy, H. K. Pan (2001), “Secure and Invisible Data Hiding in 2-Color Images”, Proceedings IEEE INFOCOM, Vol. 2, pp. 887-896. [93] Varsha, R. S. Chhillar (2015), “Data Hiding Using Steganography and Cryptography”, International Journal of Computer Science and Mobile Computing, 4(4), pp. 802-805. 86 [94] R. A. Wagner, M. J. Fischer (1974), “The String-to-String Correction Problem”, J. ACM, 21(1), pp. 168-173. [95] L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, A. Vasilakos (2014), “Security and Privacy for Storage and Computation in Cloud Computing”, Information Sciences, Vol. 258, pp. 371386. [96] R. B. Wolfgang, E. J. Delp (1999), “Fragile Watermarking Using The VW2D Watermark”, Proc. SPIE 3657, Security and Watermarking of Multimedia Contents, pp. 204-213. [97] M. Y. Wu, Y. K. Ho, J. H. Lee (2014), “An Iterative Method of Palette Based Image Steganography”, Pattern Recognition Letters, 25(3), pp. 301-309. [98] S. Wu, U. Manber (1994), “A Fast Algorithm for Multi-Pattern Searching”, Technical Report TR-94-17, University of Arizona, Tucson. [99] X. Xu, L. Chen, Y. Pan, P. He (2005), “Fast Parallel Algorithms for The Longest Common Subsequence Problem Using an Optical Bus”, Computational Science and Its Applications, ICCSA 2005, Proceedings, Part III, Singapore, May 9-12, 2005, pp. 338-348. [100] R.M. Yadav, D. S. Tomar, R. K. Baghel (2014), “A Study on Image Steganography Approaches in Digital Images”, Engineering Universe for Scientific Research and Management, 6(5). [101] J. Yang, Y. Xu, Y. Shang (2010), “An Efficient Parallel Algorithm for Longest Common Subsequence Problem on GPUs”, Proceedings of the World Congress on Engineering, Vol. 1, London, June 30 - July 2, 2010, pp. 499-504. [102] W. Yunling, W. Jianfeng, C. Xiaofeng (2016), “Secure Searchable Encryption: A Survey”, Journal of Communications and Information Networks, 1(4), pp. 52-65. [103] B.B. Zaidan, A. A. Zaidan, A. K. Al-Frajat, H. A. Jalab (2010), “On the Differences between Hiding Information and Cryptography Techniques: An Overview”, Journal of Applied Science, 10(15), pp. 1650-1655. [104] Y. Zhang, J. Jiang, Y. Zha, H. Zhang, S. Zhao (2013), “Research on Embedding Capacity and Efficiency of Information Hiding Based on Digital Images”, International Journal of Intelligence Science, 3(2), pp. 77-85. 87 LIST OF PUBLICATIONS [T1] N. H. Truong (2019), “A New Digital Image Steganography Approach Based on The Galois Field GF (pm) Using Graph and Automata”, KSII Transactions on Internet and Information Systems, 13(9), pp. 4788-4813. (ISI) [T2] N. H. Truong (2019), “A New Approach to Exact Pattern Matching”, Journal of Computer Science and Cybernetics, 35(3), pp. 197-216. [T3] N. H. Truong (2019), “Automata Technique for The LCS Problem”, Journal of Computer Science and Cybernetics, 35(1), pp. 21-37. [T4] N. H. Truong (2019), “A Novel Cryptosystem Based on Steganography and Automata Technique for Searchable Encryption”, KSII Transactions on Internet and Information Systems (revised). (ISI) 88

Các file đính kèm theo tài liệu này:

  • pdfresearch_on_development_of_methods_of_graph_theory_and_autom.pdf
  • docBanthongtin_E_Web_NHT.doc
  • pdfBanthongtin_E_Web_NHT.pdf
  • docBanthongtin_V_Web_NHT.doc
  • pdfBanthongtin_V_Web_NHT.pdf
  • pdfBantrichyeuluanan_NHT.pdf
  • pdfTomtatluananE_NHT.pdf
  • pdfTomtatluananV_NHT.pdf
Luận văn liên quan