Detecting Hidden Message Using Higher Order Statistical Models Hany Farid By Jingyu Ye Yiqi Hu.

Slides:



Advertisements
Similar presentations
CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
Advertisements

11/11/02 IDR Workshop Dealing With Location Uncertainty in Images Hasan F. Ates Princeton University 11/11/02.
F5 A Steganographic Algorithm
Feature-Based Steganalysis for JPEG images and its applications for future design of steganographic schemes. - Jessica Fridrich Submitted by: Praveena.
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
University of Ioannina - Department of Computer Science Wavelets and Multiresolution Processing (Background) Christophoros Nikou Digital.
A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection Xudong Zhao, Shilin Wang, Shenghong Li and Jianhua Li Shanghai Jiao.
1 A Markov Process Based Approach to Effective Attacking JPEG Steganography By Y. Q. Shi, Chunhua Chen, Wen Chen NJIT Presented by Hanlin Hu and Xiao Zhang.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges Rong Zhang,Rand-Ding Wang, and Tian-Tsong.
1 How Realistic is Photorealistic?. 2 Yaniv Lefel Hagay Pollak Based on the work of - Siwei Lyu and Hany Farid.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Chapter 2. Image Analysis. Image Analysis Domains Frequency Domain Spatial Domain.
Steganography detection Roland Cmorik, Martin Šumák.
Summarized by Soo-Jin Kim
Dimensionality Reduction: Principal Components Analysis Optional Reading: Smith, A Tutorial on Principal Components Analysis (linked to class webpage)
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
Texture. Texture is an innate property of all surfaces (clouds, trees, bricks, hair etc…). It refers to visual patterns of homogeneity and does not result.
Steganalysis of audio: attacking the Steghide
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines Siwei Lyu and Hany Farid Department of Computer Science, Dartmouth.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
CSE 185 Introduction to Computer Vision Face Recognition.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Linear Subspace Transforms PCA, Karhunen- Loeve, Hotelling C306, 2000.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
PCA vs ICA vs LDA. How to represent images? Why representation methods are needed?? –Curse of dimensionality – width x height x channels –Noise reduction.
Dimensionality reduction
Copy-Paste Forgery Detection Exposing Digital Forgeries by Detecting Duplicated Image Regions (A. Popescu and H. Farid) Detection of Copy-Move Forgery.
1 Robust and transparent watermarking scheme for colour images Speaker : Po-Hung Lai Adviser : Chih-Hung Lin Date :
CS 376b Introduction to Computer Vision 03 / 17 / 2008 Instructor: Michael Eckmann.
1 A Markov Process Based Approach to Effective Attacking JPEG Steganography By Y. Q. Shi, Chunhua Chen, Wen Chen NJIT Presented by Ashish Ratnakar and.
Chapter 13 Discrete Image Transforms
Zhiming Liu and Chengjun Liu, IEEE. Introduction Algorithms and procedures Experiments Conclusion.
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.
Image Enhancement in the Spatial Domain.
Signal Prediction and Transformation Trac D. Tran ECE Department The Johns Hopkins University Baltimore MD
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Singular Value Decomposition and its applications
Image Transformation Spatial domain (SD) and Frequency domain (FD)
Principal Component Analysis (PCA)
Edge Detection Phil Mlsna, Ph.D. Dept. of Electrical Engineering Northern Arizona University.
Dimensionality Reduction
Reverse-Projection Method for Measuring Camera MTF
Background on Classification
LECTURE 09: BAYESIAN ESTIMATION (Cont.)
Instance Based Learning
LECTURE 10: DISCRIMINANT ANALYSIS
Wavelets : Introduction and Examples
Lecture 8:Eigenfaces and Shared Features
CSI-447: Multimedia Systems
Digital Image Processing
PCA vs ICA vs LDA.
Outline Linear Shift-invariant system Linear filters
Increasing Watermarking Robustness using Turbo Codes
What Is Spectral Imaging? An Introduction
Learning with information of features
Steganography with Digital Images
Presenter by : Mourad RAHALI
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
A Data Hiding Scheme Based Upon Block Truncation Coding
Steganography in digital images
Pattern Classification All materials in these slides were taken from Pattern Classification (2nd ed) by R. O. Duda, P. E. Hart and D. G. Stork, John.
Feature space tansformation methods
Generally Discriminant Analysis
LECTURE 09: DISCRIMINANT ANALYSIS
Feature Selection Methods
Digital Image Processing
Lecture 16. Classification (II): Practical Considerations
Presentation transcript:

Detecting Hidden Message Using Higher Order Statistical Models Hany Farid By Jingyu Ye Yiqi Hu

Outline Using lower order to detect hidden message How to counter it How does higher order statistical model work Experiment Result Conclusion

Hidden Message In the Image Guess which image hides information?

What message hides in the image? The right image is modified with first chapter of Lewis Carroll’s ‘The Hunting of the Snark”. After compression, it is about 14700 bits. Not possible for human eyes to find the difference.

What is DCT It is a first order statistical model DTC is discrete cosine transform. It is close to DFT, discrete Fourier transform, but only uses the real numbers. It is more efficient then sine transform.

Using DTC to find the difference This is the DTC (discrete cosine transform) coefficient.

How to counter the first order statistical model Digital images and voices have quantisation noise which provides space for data hiding. Hide information in the least significant bit will cause little or no visual change to human eyes.

How to Counter it By decrease the efficiency of the steganograph, we can use only fraction of the least significant bit Attackers can embed data using pseudo random algorithm When apply first order statistical model, it will assume just noise

Image Statistics The decomposition of images using basis functions that are localized in spatial position, orientation, and scale has proven extremely useful in a range of applications. One reason is that such decompositions exhibit statistical regularities that can be exploited. Quadrature mirror filters(QMFs) Applying separable lowpass and highpass filters along the image axes generating a vertical, horizontal, diagonal and lowpass subband. Subsequent scales are created by recursively filtering the lowpass subband. The vertical, horizontal, and diagonal subbands at scale i = 1,…,n are denoted as Vi(x, y), Hi(x, y), and Di(x, y), respectively.

Image Statistics Statistical Model: Mean, Variance, Skewness, Kurtosis Vertical, Horizontal, Diagonal Scales i=1,…,n-1 12(n-1) coefficient statistics

Image Statistics A linear predictor for the magnitude of these coefficients in a subset of all possible neighbors is given by: Q contain the neighboring coefficient magnitudes. 11

Image Statistics The coefficients are determined by minimizing the quadratic error function:

Image Statistics The log error in the linear predictor is then given by: 12(n-1) error statistics 12(n-1) coefficient statistics + 12(n-1) error statistics 24(n-1) statistics

Image Statistics

Classification Fisher Linear Discriminant Analysis The within-class means are defined as: The between-class mean is defined as:

Classification Fisher Linear Discriminant Analysis The within-class scatter matrix is defined as: Matrix contains the zero-meaned ith exemplar given by Matrix contains the zero-meaned jth exemplar given by The between-class scatter matrix is defined as:

Classification Fisher Linear Discriminant Analysis let be the maximal generalized eigenvalue-eigenvector of and Project the training exemplars and onto the one-dimensional linear subspace by and , we set a threshold to determine which class the test image belongs to.

Experiment Each 8-bit-per channel RGB image is cropped to a central 640 480 pixel area. Statistics from 1,800 such images are collected as follows. Each image is first converted from RGB to gray-scale. A four-level, three-orientation QMF pyramid is constructed for each image, from which a 72-length feature vector of coefficient and error statistics is collected. To reduce sensitivity to noise in the linear predictor, only coefficient magnitudes greater than 1.0 are considered. The training set of “no-steg” statistics comes from either 1,800 JPEG images 1,800 GIF images or 1,800 TIFF images.

Results Jsteg and OutGuess are transform-based systems embed messages by modulating the DCT coefficients. EzStego modulates the least significant bits of the sorted color palette index. LSB modulates the least-significant bit of a random subset of the pixel intensities.

Conclusion Messages can be embedded into digital images in ways that are imperceptible to the human eye, and yet, these manipulations can significantly alter the underlying statistics of an image. These higher order statistics used in the paper appear to capture certain properties of “natural” images, and more importantly, these statistics are significantly altered when a message is embedded within an image. This makes it possible to detect, with a reasonable degree of accuracy, the presence of hidden messages in digital images. To avoid detection, of course, one need only embed a small enough message that does not significantly disturb the image statistics.

Thank you!