F5 a Steganographic algorithm - andreas westfeld

Slides:



Advertisements
Similar presentations
CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
Advertisements

Steganography Sami Dokheekh.
15 Data Compression Foundations of Computer Science ã Cengage Learning.
Data Compression CS 147 Minh Nguyen.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
F5 A Steganographic Algorithm
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Steganography and Network Security
SWE 423: Multimedia Systems
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
Computer Science 335 Data Compression.
CMPT 365 Multimedia Systems
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
On Error Preserving Encryption Algorithms for Wireless Video Transmission Ali Saman Tosun and Wu-Chi Feng The Ohio State University Department of Computer.
Paul Blythe and Jessica Fridrich Secure Digital Camera.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Trevor McCasland Arch Kelley.  Goal: reduce the size of stored files and data while retaining all necessary perceptual information  Used to create an.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
Compression Algorithms Robert Buckley MCIS681 Online Dr. Smith Nova Southeastern University.
Steganography detection Roland Cmorik, Martin Šumák.
Chapter 2 Source Coding (part 2)
Steganography.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
: Chapter 12: Image Compression 1 Montri Karnjanadecha ac.th/~montri Image Processing.
Steganography and Approaches of Data Hiding in Digital Images
IEEE-WVU, Anchorage  1 The Unseen Challenge Data Sets Anderson Rocha Walter Scheirer Siome Goldenstein Terrance Boult.
Digital Steganography
Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
JPEG. The JPEG Standard JPEG is an image compression standard which was accepted as an international standard in  Developed by the Joint Photographic.
Image Processing and Computer Vision: 91. Image and Video Coding Compressing data to a smaller volume without losing (too much) information.
JPEG CIS 658 Fall 2005.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
A Novel Method for Burst Error Recovery of Images First Author: S. Talebi Second Author: F. Marvasti Affiliations: King’s College London
Digital Image Processing Image Compression
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Introduction to Steganalysis Schemes Multimedia Security.
Benchmarking steganographic and steganalysis techniques Electronic Imaging of SPIE 2005 Authors:Kharrazi, Mehdi, Husrev T. Sencar, and Nasir Memon Department.
The task of compression consists of two components, an encoding algorithm that takes a file and generates a “compressed” representation (hopefully with.
Cryptographic Anonymity Project Alan Le
STATISTIC & INFORMATION THEORY (CSNB134) MODULE 11 COMPRESSION.
Introduction to JPEG m Akram Ben Ahmed
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Digital Steganography
Security and Error Correction/Detection in 802.1x and GSM
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
JPEG.
Model-based Steganography
CMPT 365 Multimedia Systems
Visit for more Learning Resources
Steganography with Digital Images
Steganography in digital images
Parag Agarwal Digital Watermarking Parag Agarwal
Image Compression Purposes Requirements Types
Image Coding and Compression
Detecting Hidden Message Using Higher Order Statistical Models Hany Farid By Jingyu Ye Yiqi Hu.
STEGANOGRAPHY IN IMAGES
Presentation transcript:

F5 a Steganographic algorithm - andreas westfeld Professor: Dr. YUN QING SHI Presentation by: KARTHIK RAGHAVENDRA

TOPICS DISCUSSED STEGANOGRAPHY OVERVIEW JPEG FILE INTERCHANGE FORMAT JSTEG ALGORITHM F3 ALGORITHM F4 ALGORITHM F5 ALGORITHM AND ITS ADVANTAGES OVER OTHER ALGORITHMS F5 ALGORITHM DEMO

STEGANOGRAPHY OVERVIEW Steganography is the art and science of writing hidden messages in a carrier medium in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. Many different carrier file formats can be used, but ‘Digital Images’ are the most popular because of their frequency on the internet. SECRET MESSAGE No visible changes in image steganogram Must resist Visual and Statistical Attacks High Capacity for Secret Message IMAGE STEGANOGRAM SECRET MESSAGE Steganography Encryption algorithm Steganography Decryption algorithm CARRIER CARRIER

JPEG FILE INTERCHANGE FORMAT JPEG compressor cuts the uncompressed image into parts of 8 x 8 pixels. Discrete Cosine Transformation transfers the 8 x 8 brightness values into 8 x 8 frequency coefficients Quantization suitably rounds frequency coefficients to integers in range -2048..2047. (Lossy step) Histogram in Fig 2 shows discrete distribution of coefficient’s frequency of occurrence. Quantization followed by Huffman coding which ensures redundancy free coding of quantized coefficients. Distribution in Fig 2 shows 2 characteristic properties: Coefficient’s frequency of occurrence decreases with increasing absolute value. Difference between 2 bars of histogram in middle is larger than on margin. Fig 1: Flow of information in the JPEG compressor Fig 2: Histogram of JPEG coefficients after quantization

JSTEG ALGORITHM (1) Fig 3a: Histogram of JPEG coefficients after quantization Fig 3b: JSTEG equalises pairs of coefficients

JSTEG ALGORITHM (2) After quantization, JSTEG replaces the least significant bits of the frequency coefficients by the secret message. The embedding mechanism skips all coefficients with the values 0 or 1 as observed in Figure 3b. Resistant against visual attacks and offers a good capacity of about 12.8% of the staganogram’s size, but the secret message can be easily detected by statistical attacks. Fig 4 shows the statistical attack on JSTEG steganogram (with 50% of the capacity used, i.e. 7680 bytes). The diagram presents the probability of embedding: as a function of an increasing sample: Initially, the sample comprises the first 1% of the JPEG coefficients, then the first 2%, 3%, . . . The probability is 1.00 up to 54% and 0.45 at 56%; A sample of 59% and more contains enough unchanged coefficients to let the p-value drop to 0.00. Fig 4: Probability of embedding in a JSTEG steganogram (50 % of capacity used)

F3 Steganographic Algorithm (1) Fig 5a: Histogram of JPEG coefficients after quantization Fig 5b: F3 produces a superior number of even coefficients

F3 Steganographic Algorithm (2) Does not overwrite bits like JSTEG, instead it decrements the coefficient’s absolute values in case their LSB does not match – except coefficients with the value zero, where we cannot decrement the absolute value. Hence zero coefficient is not used in this method. The LSB of nonzero coefficients match the secret message after embedding, but the LSB is not overwritten as overwritten bits can be detected by statistical methods (Chi-Square method). Some embedded bits fall victim to shrinkage. Shrinkage occurs every time F3 decrements the absolute value of 1 and -1 producing a 0. The receiver cannot distinguish a 0 coefficient that is stegonagraphically unused from a 0 produced by shrinkage. It skips all zero coefficients. Hence repetitive embedding is necessary. Figure 5b shows the histogram of frequence of occurance versus JPE G coefficients for after applying F3 algorithm. The histogram shows more even coefficients than odd coefficients. This is due to repeated embedding after shrinkage. Shrinkage occurs only if we embed a 0 bit. The repetition of these 0 bits shifts the ratio of steganographic values in favour of the steganographic zeros. This is undesirable and can be detected by statistical means. F3 WEAKNESSES: Due to exclusive shrinkage of steganographic zeros. F3 embeds more zeros than ones, and produces statistically detectable peculiarities in the in the histogram. The histogram of Figure 2 contains more odd than even coefficients (except 0). Therefore, an unchanged carrier media contain more steganographic ones than zeros.

F4 Steganographic Algorithm (1) Fig 6a: Histogram of JPEG coefficients after quantization Fig 6b: Histogram of JPEG coefficients with F4 interpretation of Steganographic values

F4 Steganographic Algorithm (2) F4 eliminates the 2 weakness mentioned in F3 algorithm by mapping negative coefficients to the inverted steganographic value: even negative coefficients represent a steganographic one, odd negative a zero; even positive represents a zero, odd positive and even negative a one, as shown in Figure 6b. In Figure 6b, each 2 bars of the same height represent coefficients with inverse steganographic value (steganographic zeros are black, steganographic ones white). F4 WEAKNESSES: Embeds secret message data continuously resulting in changes to concentrate on the start of the file, and unused rest resides on the end. This phenomenon is called Continuous embedding. For a very short secret message comprising of 217 byes (1736 bits), F4 changes 1157 places. This is shows that the number of bits changed is significantly more which is not a good feature for attack proof steganographic algorithm. A new mechanism is required to decrease the number of bit changes.

F5 Steganographic Algorithm (1) Overall algorithm is same as F4 algorithm. F5 is enhanced version of F4 algorithm with respect to 2 main features stated below which help in preventing statistical attacks and improving embedding efficiency: PERMUTATIVE STRADDLING MATRIX ENCODING

F5 Steganographic Algorithm (2) CONTINUOUS EMBEDDING PROBLEM: In most of the cases, an embedded message does not require full capacity. Hence a part of the file remains unused. Figure 7 shows this concept of continuous embedding used by algorithm like F4. Figure 7 shows that the changes (x) concentrate on the start of the file, and unused rest resides on the end. To prevent attacks, the embedding function should use the carrier medium as regularly as possible. The embedding density must be same everywhere. Fig 7: Continuous Embedding concentrates changes (x)

F5 Steganographic Algorithm (3) PERMUTATIVE STRADDLING: To prevent the Continuous Embedding problem discussed before, F5 algorithm uses a technique called Permutative Straddling for scattering the secret message over the whole carrier medium as shown in Figure 8 (Treat each pixel as JPEG coefficient). The straddling mechanism used in F5 shuffles all coefficients using a permutation first. Then, F5 embeds into the permuted sequence. The shrinkage does not change the number of coefficients (only their values) . The permutation depends on key derived from a password. F5 delivers the steganographically changed coefficients in its original sequence to the Huffman coder. With correct key, ,receiver will be able to repeat the permutation. Fig 8: Permutative Straddling scatters the changes (x)

F5 Steganographic Algorithm (4) MATRIX ENCODING BY RON CRANDALL: New and efficient technique to improve embedding efficiency by reducing number of changes when embedding secret message. EXAMPLE: Message with 1736 bits F4 F5 1157 bits changed 459 bits changed

F5 Steganographic Algorithm (5) MATRIX ENCODING IMPLEMENTATION: Suppose we want to embed 2 bits x1,x2 in three modifiable bit places a1,a2 ,a3 changing one place at most. We have following 4 cases: In all 4 cases, we do not change more than one bit. General case: If we have a code word ‘a’ with ‘n’ modifiable bit places for ‘k’ secret message bits ‘x’, Matrix encoding technique embeds ‘k’ secret message bits by changing one of n= 2^k-1 places.

F5 Steganographic Algorithm (6) PRESERVING CHARACTERSITIC PROPERTIES:

F5 Steganographic Algorithm (7) F5 IMPLEMENTATION: Fig: Block Diagram of F5 Implementation Password driven Permutation. Pseudo one time pad for uniformly distributed message. Matrix Encoding with minimal embedding rate. Core embedding operation like F4.

F5 Steganographic Algorithm (8) F5 Implementation Steps: Start JPEG compression. Stop after the quantisation of coefficients. Initialise a cryptographically strong random number generator with the key derived from the password. Instantiate a permutation (two parameters: random generator and number of coefficients). Determine the parameter k from the capacity of the carrier medium, and the length of the secret message. Calculate the code word length n = 2^k − 1. Embed the secret message with (1, n, k) matrix encoding (Hash based embedding). Implement inverse permutation. Continue JPEG compression (Huffman coding etc.)

F5 ADVANTAGES F5 has high embedding capacity (>13%) but can be pushed even further. F5 has high embedding efficiency. Resistance against both visual and statistical attacks. Uses a common image format and carrier medium (JPEG).

F5 DEMO USING VSL SOFTWARE

ANY QUESTIONS?

REFERENCES F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis – Andreas Westfeld Ron Crandall: Some Notes on Steganography. Posted on Steganography Mailing List, 1998. http://os.inf.tu-dresden.de/˜westfeld/crandall.pdf Derek Upham: Jsteg, 1997, e. g. http://www.tiac.net/users/korejwa/jsteg.htm Andreas Westfeld: The Steganographic Algorithm F5, 1999. http://wwwrn.inf.tu-dresden.de/˜westfeld/f5.html www.Wikipedia.org