Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
Guerino Mazzola (Fall 2014 © ): Introduction to Music Technology IIIDigital Audio III.6 (Fr Oct 24) The MP3 algorithm with PAC.
Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
F5 A Steganographic Algorithm
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
1 Adnan Gutub Computer Engineering King Fahd University of Petroleum & Minerals Saudi Arabia A Novel Arabic Text Steganography Method Using Letter Points.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Pictures Worth More Than 1000 Words
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Steganography Rayan Ghamri.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Covert Channels John Dabney. Covert Channels   “... any communication channel that can be exploited by a process to transfer information in a manner.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
Reza Mohammadi Shiraz University Of Technology
Steganography detection Roland Cmorik, Martin Šumák.
Steganography.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Digital Steganography
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
DIGITAL WATERMARKING SRINIVAS KHARSADA PATNAIK [1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN Presented by SRINIVAS KHARSADA PATNAIK ROLL.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Digital Watermarking
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
Introduction to Steganalysis Schemes Multimedia Security.
Cryptographic Anonymity Project Alan Le
STATISTIC & INFORMATION THEORY (CSNB134) MODULE 11 COMPRESSION.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Digital Steganography
Introduction to Steganography
IMAGE COMPRESSION.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Data Compression.
Welcome
DONE BY S.MURALIRAJAN M.NIRMAL
Data Compression.
Data Compression CS 147 Minh Nguyen.
Visit for more Learning Resources
Steganography with Digital Images
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Steganography Techniques and their use in Anonymity
Parag Agarwal Digital Watermarking Parag Agarwal
Information Hiding and Its Applications
Detecting Hidden Message Using Higher Order Statistical Models Hany Farid By Jingyu Ye Yiqi Hu.
STEGANOGRAPHY IN IMAGES
A Quadratic-Residue-based Fragile Watermarking Scheme
Presentation transcript:

Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine

Introduction to Computer Security ©2004 Matt Bishop Information Hiding with Steganography -Ashwini Tumne

Introduction to Computer Security ©2004 Matt Bishop Agenda What is information hiding? What is steganography? Steganography System Steganographic model Modern day applications Steganography in digital images Steganography in MP3 Conclusion

©2004 Matt Bishop What is information hiding

Introduction to Computer Security ©2004 Matt Bishop What is Steganography? Embedding information in given media without making any visible changes to it

Introduction to Computer Security ©2004 Matt Bishop Steganography System

Introduction to Computer Security ©2004 Matt Bishop Steganographic model Stego Inverse Function f E -1 Stego Function f E cover C Embedded (E) Stego S Stego Key (K) Embedded (E) SenderRecipient The Stegosystem

Introduction to Computer Security ©2004 Matt Bishop Stego-system criteria Cover data should not be significantly modified ie perceptible to human perception system The embedded data should be directly encoded in the cover & not in wrapper or header Embedded data should be immune to modifications to cover Distortion cannot be eliminated so error-correcting codes need to be included whenever required

Introduction to Computer Security ©2004 Matt Bishop Steganography in images Way images are stored: Array of numbers representing RGB values for each pixel Common images are in 8-bit/pixel and 24-bit/pixel format. 24-bit images have lot of space for storage but are huge and invite compression 8-bits are good options. Proper selection of cover image is important. Best candidates: gray scale images.. Cashing on limitations of perception in human vision

Introduction to Computer Security ©2004 Matt Bishop Least Significant Bit method Consider a 24 bit picture Data to be inserted: character ‘A’: ( ) Host pixels: 3 pixel will be used to store one character of 8-bits The pixels which would be selected for holding the data are chosen on the basis of the key which can be a random number. Ex: Embedding ‘A’ According to researchers on an average only 50% of the pixels actually change from 0-1 or 1-0.

Introduction to Computer Security ©2004 Matt Bishop Sample palettes Red color shade variations Drastic & Subtle shade variations Gray Scale shade variations

Introduction to Computer Security ©2004 Matt Bishop Masking and filtering Hide information by marking an image in a manner similar to paper watermarks. Watermarking techniques integrate a data in image Faint but perceptible signal is covered by another one that makes the first non-perceptible to human eye. No destruction of data with image compression. Used widely for digital watermarking and fingerprinting. Used for hiding a image within another.

Introduction to Computer Security ©2004 Matt Bishop Masking and filtering (contd.) Cover pixel : Secret image pixel: Resultant pixel: (3+5) The contribution of each pixel can be varied to achieve desired effect.

Introduction to Computer Security ©2004 Matt Bishop + = Example: Copyright Fabian A.P. Petitcolas, Computer Laboratory, University of Cambridge 8-bit (256 grayscale) images. TOP SECRET

Introduction to Computer Security ©2004 Matt Bishop Sacrificing 2 bits of cover to carry 2 bits of secret image Original ImageExtracted Image

Introduction to Computer Security ©2004 Matt Bishop Sacrificing 5 bits of cover to carry 5 bits of secret image Original ImageExtracted Image

Introduction to Computer Security ©2004 Matt Bishop Algorithms and transformation Message is embedded into cover image by modulating the original coefficients in transform domain such as Discrete Cosine Transform or Wavelet transform. To encode: Take the DCT or wavelet transform of the cover image Find the coefficients below a certain threshold Replace these bits with bits to be hidden (can use LSB insertion) Take the inverse transform Store as regular image. To decode this image to get the message: Find the coefficients below a certain threshold Extract bits of data from these coefficients Combine bits into actual message

Introduction to Computer Security ©2004 Matt Bishop Steganography in MP3 Music company publishes albums in mp3 and publishes over internet. Some people take these mp3 files and publish under their own name. Case goes to court. The Music company needs to prove that the material which is exhibit is indeed the one they published. They need a hidden copyright.

Introduction to Computer Security ©2004 Matt Bishop Principle : Audio signals contain a significant portion of information that can be discarded without average listener noticing the change. MP3Stego – tool developed by Fabien A.P. Petitcolas Tool operates within MP3 encoding process The data to be hidden is first compressed, encrypted and hidden in MP3 bit stream. Quantization of original audio signal takes place. At the same time, for some selected points, data is introduced in the quantized output, Distortions introduced by these are constantly checked for to satisfy the psychoacoustics model. A variable records the number of bits that are for data in the actual audio, data for huffman coding and hidden data. Key is selected using pseudo random bit generator based on SHA-1 and dictates the values that would be modified to hold the hidden data. Steganography in MP3 (contd.)

Introduction to Computer Security ©2004 Matt Bishop Conclusion Steganography has its place in the security. On its own, it won’t serve much but when used as a layer of cryptography, it would lead to a greater security. Far fetched applications in privacy protection and intellectual property rights protection. Research is going on in both the directions –One is how to incorporate hidden or visible copyright information in various media, which would be published. –At the same time, in opposite direction, researcher are working on how to detect the trafficking of illicit material & covert messages published by certain outlawed groups.