 Introduction  LSB algorithm  Jsteg algorithm  Χ^2 test  Adaptive algorithms  LSB Substitution Compatible Steganography(LSCS)  Adaptive DCT-based.

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
F5 A Steganographic Algorithm
F5 a Steganographic algorithm - andreas westfeld
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Steganography and Network Security
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
A Review on: Spread Spectrum Watermarking Techniques
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
IMAGE COMPRESSION USING BTC Presented By: Akash Agrawal Guided By: Prof.R.Welekar.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Modified Patchwork Algorithm: Anovel Audio Watermarking Scheme In-Kwon Yeo and Hyoung Joong Kim.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
ECE643 Course Project, Fall /21/20081 Optimum histogram pair based image lossless data embedding By G. Xuan, Y. Q. Shi, etc. Summarized By: Zhi.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Introduction to Steganalysis Schemes Multimedia Security.
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
A lossless data hiding scheme based on three- pixel block differences Ching-Chiuan Lin and Nien-Lin Hsueh Pattern Recognition, Vol. 41(4), April 2008 Pages.
Advanced Science and Technology Letters Vol.35(Security 2013), pp Image Steganograpy via Video Using Lifting.
Cryptographic Anonymity Project Alan Le
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
Steganalysis of Block-DCT Image Steganography Ying Wang and Pierre Moulin Beckman Institute, CSL & ECE Department University of Illinois at Urbana-Champaign.
南台科技大學 資訊工程系 Data hiding based on the similarity between neighboring pixels with reversibility Author:Y.-C. Li, C.-M. Yeh, C.-C. Chang. Date:
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
YASS Yet Another Steganographic Scheme that Resists Blind Steganalysis K. Solanki*, A. Sarkar +, and B. Manjunath Vision Research Laboratory Department.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
基於龜殼魔術矩陣的隱寫技術及其衍生的研究問題
Security and Error Correction/Detection in 802.1x and GSM
(k, n)-Image Reversible Data Hiding
Model-based Steganography
Reversible Data Hiding in JPEG Images using Ordered Embedding
Increasing Watermarking Robustness using Turbo Codes
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Steganography with Digital Images
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
A Data Hiding Scheme Based Upon Block Truncation Coding
Hybrid Data Hiding Scheme Using Right-Most Digit Replacement and Adaptive Least Significant Bit for Digital Images Source: Symmetry, vol. 8, no. 6, June.
Steganography in digital images
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Reversible Data Hiding
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Data hiding based Hamming code
Information Hiding and Its Applications
Digital Steganography Utilizing Features of JPEG Images
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Department of Computer Science, University of Central Florida ,Orlando
Lossless Data Hiding in the Spatial Domain for High Quality Images
A Quadratic-Residue-based Fragile Watermarking Scheme
Presentation transcript:

 Introduction  LSB algorithm  Jsteg algorithm  Χ^2 test  Adaptive algorithms  LSB Substitution Compatible Steganography(LSCS)  Adaptive DCT-based Mod-4 method(ADM)  Novel LSB based steganography algorithm  Conclusion 2

1.Introduction 3

Embedding process can be done in either: 1.Spatial Domain 2.Transform Domain(DCT) LSB Jsteg … … 4

Each pixel of color image represented by 24 bits. LSB of each pixel replaced with the bits of hidden message. Example: 24 bit Image: ( ) ( ) ( ) Bits of hidden message: ( ) ( ) ( ) 5

Derek Upham Its embedding algorithm sequentially replaces the least significant bit of DCT coefficients with the message’s data. JPEG Use the least significant bits as redundant bits. Embedding message’s bits sequentially. 1.compute 8*8 block DCT transform. 2.Quantize DCT coefficients with 6

Important rule in Jsteg embedding algorithm:  Many of the coefficients are zero. Changing these coefficients makes noticeable distortion in Image. So we don’t change 0,1,-1 coefficients. 7

8

9

Westfeld & Pfitzmann(1999) They observed that for a given Image,the embedding process change the histogram of color or DCT coefficients. n i =number of pixels with DCT coefficients equal to i before embedding. n i *=number of pixels with DCT coefficients equal to i after embedding. |n 2i -n 2i+1 |>|n 2i *-n 2i+1 *| 10

11  Weak point: Pair of values  Histogram of pixel values before and after  RS and Chi-square attacks developed based on this weak point xixi mimi yiyi xixi mimi yiyi

12

13

14

15  Introduced in 2001  Define  Divide picture and compute  For a cover:  For a LSB-replaced stego:

Provos(2001) Outguess improves selection of redundant bits by using a pseudo-random generator to select DCT coefficients at random. Outguess is robust against χ2 test but χ2 test can be modified to detect steganography. 16

2.Adaptive algorithms 17

 Adaptive algorithms are classified with the target they choose.  Targets are chosen respect to the robustness against steganalysis attacks.  Different targets can be chose such as histogram preserving,minimum LSB error and… 18

19  LSB-matching introduced in 2001  If cover bit does not match with message bit, added or subtracted by one randomly. Else unchanged. cover data: 76 ( ) b + message bit: 1 = stego data: 75 ( ) b or 77 ( ) b

20  No pair of values anymore, difficult to detect  Best-known detector based on COM of histogram  Introduced in 2003, improved in 2005  Not a perfect detector.  Type I and type II errors appear.  Newer LSB methods, more difficult to detect or still undetectable!  LSB matching revisited and Novel LSB

Define four sequences: h:histogram of the cover Image. t:the number of pixel modification for every gray level. L:number of pixels modified from k to k-1. R:number of pixels modified from k to k+1. t[k]=L[k]+R[k] Target of this algorithm is histogram preserving so this algorithm is robust against all the attacks which are based on change of histogram of the image such as χ 2 test. Hung-Min Sun(2007) Spatial Domain algorithm 21

L[0]=R[255]=0 R[k]=t[k]-L[k] If t[k]-R[k-1]>0  L[k+1]=min(t[k]-R[k-1],t[k+1]) LSB algorithm LSCS algorithm So algorithm is robust against χ2 test. 22

First scenario Pixel values 0344 t array t[k]=L[k]+R[k] 3 23

Second scenario Pixel values 0322 t array t[k]=L[k]+R[k] 2 24

Merit functions: LenaMSEDivergence LSCS LSB LSB matching BaboonMSEDivergence LSCS LSB LSB matching

26

27  Main idea: Fewer changes for same capacity  Picture divided to consecutive pixel pairs  One pixel carries one bit of information  A function of two bits carries the other  The function should have these properties:  has both properties

28 if m i = LSB (x i ) if m i+1 ≠ f (x i, x i+1 ) y i+1 = x i else y i+1 = x i+1 end else if m i+1 = f (x i -1,x i+1 ) y i = x i – 1 else y i = x i + 1 end y i+1 = x i+1 end xixi x i+1 mimi m i+1 yiyi y i or or or or

29  Average changes per pixel:  Assuming random message is expected.  0.5 is expected for conventional LSB method  Better quality with same capacity

30

31  Introduced 2003, expanded 2005  Main idea: increasing the capacity  Adaptive embedding: more data hidden in edges  Edge: 2 consecutive pixels with high difference  Picture divided to consecutive pixel pairs  Six ranges for possible differences R i [l i, u i ] of width w i R 1 [0 7] R 2 [8 15] R 3 [16 31] R 4 [32 63] R 5 [64 127] R 6 [ ]

32

33  P i =100, p i+1 =162, R 4 =[32 63], t=(00000) b, d’ i =32, m=30, p i <p i+1, d’ i <d i, p’ i =115, p’ i+1 =147.  Extraction: embedded data is difference of |p’ i -p’ i+1 | with low band of proper range  |p’ i -p’ i+1 |=32, R 4 =[32 63], l i =32, b=0, data=(00000) b

34  Idea: PVD for high ranges, LSB for low ranges  If R=R 3, R 4, R 5, R 6, Embed data using PVD  If R=R 1 or R 2, Replace three LSBs of each pixel with three data bits  New difference should not exceed R 2 :  p i =30, p i+1 =15, data=(111000) b, p’ i =31, p’ i+1 =8, d’ i =23>15, p’ i =23, p’ i+1 =16  Extraction is straightforward

35  Great capacity gain comparing PVD-only, without loosing much quality  PSNR quality criteria: PVD-onlyPVD and LSB Cover image (512*512) capacity (bytes) PSNR (dB) Capacity (bytes) PSNR (dB) Lena Baboon Peppers Jet Tank Airplane Truck Elaine Couple Boat

36 OriginalPVD-onlyPVD&LSB Cover & Stego messagemessage

Block diagram 37

Xiaojun Qi et al(2005) Target of this algorithm is preserving of histogram of DCT coefficients so this algorithm is robust against all the attacks which are based on change of histogram of DCT coefficients of the image such as χ 2 test. Transform Domain algorithm 38

Valid GQC definition GQC is defined to be a group of 2*2 non-overlapping spatially adjacent quantized DCT coefficients. If valid GQC(vGQC) Number of vGQC’s depends on the texture of the image. Noisy image will have more vGQCs while a relatively smooth image will yield a lower number of vGQCs. 39

40

 vGQC are used as the secret message carriers.  vGQCs are extracted from the image and stored in a buffer according to the order determined by a PRNG.  The maximum capacity of the cover image is computed to be twice the number of vGQCs. 41

Mod-4 embedding algorithm If Q is a vGQC we define following parameters: Obviously the range of δ is {00,01,10,11} 42

Mod-4 embedding algorithm Embedding process: 1.If |μ|>MC the embedding process halts. Otherwise random bits of length MC-|μ| are padded to the secret message. Let μ be the encrypted message coded in some binary representation. 2.To embed the i th pair of binary message bits xy i the coefficient of Q i are modified so that: 43

Embedding rules  Coefficient with magnitude of less than 2 is ignored.  Magnitude of a coefficient is always increased, i.e, addition to positive and subtraction from negative coefficient.  Coefficient with larger magnitudes are modified first.  The shortest route scheme is used to ensure the minimum number of modifications per DCT coefficients. 44

Shortest route scheme If xy=00 δ(σ,4)plusminusroute 000No change or or or +1 45

Example δ(σ,4)plusminusroute 000No change or or or If xy=

Example δ(σ,4)plusminusroute 000No change or or or +1 If xy=

Hong-Juan Zhang et al(2007) Spatial Domain algorithm Target of this algorithm is robustness against statistical attacks especially χ 2 test and RS analysis. This method provides high capacity for embedding secret message. 48

Embedding process Select G= set of pixels of cover image with PRNG. n is calculated by l=length of secret message m=number of bits used per pixel for embedding The bit stream of embedded message is divided into bit segment of m bit length. E= 49

Embedding process Define LSB m (x) be the function to get the m bit LSB value from the x. Two rules:  If x i >255 then x i =x i -2 m  If x i <0 then x i =x i +2 m For i=1,2,…,n 50

Extraction process Select pixels according to the pseudo random number to construct G= For i=1,2,…,n We get E= and can construct the message 51

Example: GX0X0 X1X1 X2X2 X3X3 X4X4 LSB 1 (x i ) Sum mod2 eiei LSB 1 (x i ‘) flipping m= n 2n-12n+1 2n+22n+1 2n 52

LSB 1 (x i ‘) Sum mod2 eiei

3.Conclusion 54

55 CapacityRobustnessImperceptibililtySecurity LSB_classicHighLowNormal LSB_matchingHighLowNormal LSB_revisitedHighNormalHigh PVDHighLowNormal PVD &LSBVery HighVery LowLowNormal

[1] Provos, Honeyman, “Hide and Seek: An introduction to steganography”, IEEE Security and Privacy Journal, [2]T Morkel,JHP Eloff and MS Olivier,”An overview of Image steganography”,ISSA [3]Westfeld and Pfitzmann,”Attacks on steganographic systems”,3 rd International workshop on information hiding.,1999. [4] Hung-Min Sun,King-Hang Wang,” A LSB substitution compatible steganography”,IEEE 10 region conference,2007. [5] Qi and Wong,” An adaptive DCT-based MOD-4 steganographic method”, IEEE Proceedings of ICIP, vol. II, September 2005, pp [6] Zhang and Tang,” A novel image steganography algorithm against statistical analysis”,International conference on machine learning and cybernetics. 56

57 Questions?