An Exploration in the Detection of Hidden Data in Audio Bit Streams Presented by: John Monk CS 525, Spring Semester 2002

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

A Graduate Course on Multimedia Technology 3. Multimedia Communication © Wolfgang Effelsberg Media Scaling and Media Filtering Definition of.
Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
MPEG/Audio Compression Tutorial Mike Blackstock CPSC 538a January 11, 2004.
Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
CALEB WALTER 7/14/2013 Audio Stego – A Brief How To.
Time-Frequency Analysis Analyzing sounds as a sequence of frames
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Speech Processing for NSR Vs DSR Veeru Ramaswamy PhD CTO, Vianix LLC
Preparing Audio for the Internet - Nick Kereakos - MPR Topics Covered: Topics Covered:  Static Audio Files  Audio Streams  Automation.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Information Hiding: Watermarking and Steganography
29.1 Chapter 29 Multimedia Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
1 Audio Compression Techniques MUMT 611, January 2005 Assignment 2 Paul Kolesnik.
Issues for Multimedia Privacy & Security ---- Video Content Privacy Protection, Copyright Protection & Database Access Control Jianping Fan Dept of Computer.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
SWE 423: Multimedia Systems Chapter 7: Data Compression (1)
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Public IP Telephony Introduction to Packet Voice Technologies Cisco Networking Academy Program.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
TCP/IP Protocol Suite 1 Chapter 25 Upon completion you will be able to: Multimedia Know the characteristics of the 3 types of services Understand the methods.
T.Sharon-A.Frank 1 Multimedia Image Compression 2 T.Sharon-A.Frank Coding Techniques – Hybrid.
Applications of Signals and Systems Fall 2002 Application Areas Control Communications Signal Processing.
Covert Channels John Dabney. Covert Channels   “... any communication channel that can be exploited by a process to transfer information in a manner.
STEGANOGRPAHY [APPLICATION – I]
Digital Audio Watermarking: Properties, characteristics of audio signals, and measuring the performance of a watermarking system نيما خادمي کلانتري
GODIAN MABINDAH RUTHERFORD UNUSI RICHARD MWANGI.  Differential coding operates by making numbers small. This is a major goal in compression technology:
Steganography.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
The Application Layer Chapter 7. DNS – The Domain Name System a)The DNS Name Space b)Resource Records c)Name Servers.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
MPEG: (Moving Pictures Expert Group) A Video Compression Standard for Multimedia Applications Seo Yeong Geon Dept. of Computer Science in GNU.
Audio Compression Usha Sree CMSC 691M 10/12/04. Motivation Efficient Storage Streaming Interactive Multimedia Applications.
Computer Networks: Multimedia Applications Ivan Marsic Rutgers University Chapter 3 – Multimedia & Real-time Applications.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Introduction to Packet Voice Technologies Cisco Networking Academy Program.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
CIS679: Multimedia Basics r Multimedia data type r Basic compression techniques.
8. 1 MPEG MPEG is Moving Picture Experts Group On 1992 MPEG-1 was the standard, but was replaced only a year after by MPEG-2. Nowadays, MPEG-2 is gradually.
Compression There is need for compression: bandwidth constraints of multimedia applications exceed the capability of communication channels Ex. QCIF bit.
Introduction to Steganalysis Schemes Multimedia Security.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Digital Audio III. Sound compression (I) Compression of sound data requires different techniques from those for graphical data Requirements are less stringent.
AIMS’99 Workshop Heidelberg, May 1999 Assessing Audio Visual Quality P905 - AQUAVIT Assessment of Quality for audio-visual signals over Internet.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Cryptographic Anonymity Project Alan Le
Audio Streaming © Nanda Ganesan, Ph.D.. Audio File Features Audio file is a record of captured sound that can be played back –The WAV File is an example.
Chapter 1. SIGNAL PROCESSING:  Signal processing is concerned with the efficient and accurate extraction of information in a signal process.  Signal.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Digital Steganography
Introduction to Packet Voice Technologies
Introduction to Steganography
Introduction to Audio Watermarking Schemes N. Lazic and P
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Welcome
Multimedia: Digitised Sound Data
Introduction to Networking
Basic Concepts of Audio Watermarking
Visit for more Learning Resources
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
MPEG-1 Overview of MPEG-1 Standard
Govt. Polytechnic Dhangar(Fatehabad)
Presentation transcript:

An Exploration in the Detection of Hidden Data in Audio Bit Streams Presented by: John Monk CS 525, Spring Semester

The Problem The cyber threat to our security is increasing daily and is difficult to detect and defeat. Attack and exploitation techniques are being developed faster than defensive measures can be researched and implemented. One such field where this is true is that of Steganography (the practice of information hiding). Many examples of this can be found, ranging from subtly altering a JPEG file to embed hidden data, to embedding encrypted messages into streaming video and audio.

The Problem - Continued In a real world environment, this practice is difficult to detect in real time for several reasons: There is too much network traffic. There is no guarantee that all the RTP packets will take the same route to their destination, which makes monitoring difficult and expensive. Traditional tools like protocol analyzers, while being very good at detecting problems with framing, transmission, checksums, etc. give no real insight into the content of the data being observed.

Proposal The strategy that I investigated is whether or not embedded hidden data in an audio bitstream can be detected through more qualitative methods (i.e., does the "sound" change when embedded hidden data is present? If so, what are the characteristics that are presented?). Ideally, this research would yield a set of analytical formulas that describe the relationship between the hidden data, the voice, or carrier data, the measurements, and the results.

Materials Agilent Technologies has a VoIP test and measurement tool called the VQT. The VQT is a comprehensive and objective voice quality test system that provides detailed test and analysis capabilities for voice quality on modern telephony networks by providing accurate and objective testing of voice service quality. The VQT provides detailed scoring analysis that exposes the impairments to voice quality by testing for voice clarity, delay, echo, silence suppression, DTMF, and signal loss.

Materials CoolEdit2000 – For the spectral analysis tools. MP3 Stego – Software for encrypting and embedding a text message into an MP3.

Methods 1.Choose a.wav file to convert to an MP3. 2.Create a small text file to be hidden in the resultant MP3. 3.encode -E hidden_text.txt -P pass svega.wav svega_stego.mp3 1.compresses svega.wav (mono, 44.1 kHz, 16bit encoded) and hides hidden_text.txt. The hidden text is encrypted using pass as a password. This produces the output called svega_stego.mp3. 4.Compare the original recording with the recording containing the encrypted, hidden message.

Comparison of Waveforms in the Time Domain The waveforms are almost identical!

From a frequency analysis point of view, there are no distinguishing characteristics between the original recording, and the recording with the hidden message. Comparison of Waveforms in the Frequency Domain

Perceptual Clarity (PAMS) There seems to be a slight amount of signal loss and a slight increase in distortion due to the hidden data. But, the overall measurement score is very good.

Perceptual Clarity (PESQ) There seems to be a slight amount of signal loss occurring in the same places as detected in the PAMS measurement. But, the overall measurement score is very good.

Perceptual Clarity (PSQM) There seems to be a slight amount of signal loss occurring in the same places as detected in the other two measurements. But, the overall measurement score and the estimated MOS is very good.

Results Making (objective) qualitative observations does not seem to be a feasible way to detect hidden data in bit streams. There may be some minor alterations of the original recording when data is hidden in it, but the difference is so small that it not perceptible. The bitstream with hidden data is dependant on the encoding scheme which is not limited to the obvious transforms (DCT, wavelet, fractal, etc). There may not be any dependable universal criteria by which to determine if hidden data is present.

Discussion The encoding scheme used in this experiment is very efficient. The data is first compressed, encrypted and then data hidden in the MP3 bit stream. The hiding process takes place at the heart of the Layer III encoding process, namely in the inner_loop function (l3loop.c). The inner loop quantizes the input data and increases the quantizer step size until the quantized data can be coded with the available number of bits. Another loop checks that the distortions introduced by the quantization do not exceed the threshold defined by the psycho acoustic model. I believe that it is this adherence to the psycho acoustic model that makes it very difficult to “hear” the hidden data.

Summary Detecting hidden data in bit streams is still a difficult problem with no good answers yet. However, a plausible attack on data that is hidden in MP3, or other compressed formats is to uncompress the bit stream and then re- compress it. However, this can result in a severe loss of quality.

References Multimedia Security Research at Purdue University “A Tutorial on Digital Watermarking”, Fernando Perez- Gonzalez and Juan R. Hernandez, Dept. Tecnologias de las Comunicaciones, ESTI Telecom., Universidad de Vigo, Vigo, Spain “On the Limits of Steganography”, Ross J. Anderson and Fabien Petitcolas. IEEE Journal of Selected Areas in Communication, 16(4): , May 1998.