Watermarking & Steganography Sanjay Goel University at Albany, SUNY.

Slides:



Advertisements
Similar presentations
Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Watermarking & Steganography
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Steganography and Data Hiding. Introduction Steganography is the science of creating hidden messages. Sounds like crypto, but… In traditional crypto,
Khan, Mohammed Minhajuddin
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Pictures Worth More Than 1000 Words
Survey on Information Assurance TEL 581 Presented by Viswesh Prabhu Subramanian Gregory Michel Lincoln Jean Louis Steganography.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Spread Spectrum Steganography
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
Steganography Rayan Ghamri.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
Reza Mohammadi Shiraz University Of Technology
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Introduction to Steganography
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Watermarking & Steganography
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Watermarking & Steganography Sanjay Goel University at Albany, SUNY

Cryptography is about protecting the content of messages (their meaning). Steganography is about concealing the existence of messages Watermarking is about establishing identity of information to prevent unauthorized use –They are imperceptible –They are inseparable from the works they are embedded in –They remain embedded in the work even during transformation Cryptograpy & Steganography vs. Watermarking Comparison

The word steganography comes from the Greek steganos, meaning covered or secret, and graphy, meaning writing or drawing. Therefore, steganography literally means covered writing. Steganography simply takes one piece of information and hides it within another –Computer files (images, sounds recordings, even disks) contain unused or insignificant areas of data –Steganography takes advantage of these areas, replacing them with information (encrypted mail, for instance). –The files can then be exchanged without anyone knowing what really lies inside of them –An image of the space shuttle landing might contain a private letter to a friend. –Rumor has it that terrorists used steganography to transmit messages to one another. ( Steganography Basics Reference:

In his history of the Persian Wars, Herodotus tells of a messenger who shaved his head and allowed a secret message to be tattooed on his scalp. He waited until his hair grew back. Then he journeyed to where the recipient awaited him and shaved his head again. The message was revealed. It was history’s first use of steganography. Steganography Early Examples

Ancient Romans used to write between lines using invisible ink based on various natural substances such as fruit juices, urine, and milk. Their experience was not forgotten: even nowadays children play spies and write secret messages that appear only when heated. Steganography Invisible Ink

During the World War II the Germans developed the microdot. A secret message was photographically reduced to the size of a period, and affixed as the dot for the letter 'i' or other punctuation on a paper containing a written message. Microdots permitted the transmission of large amounts of printed data, including technical drawings, and the fact of the transmission was effectively hidden. Steganography Invisible Ink

Computer Steganography is based on two principles. –The first one is that the files containing digitized images or sound can be altered to a certain extend without loosing their functionality. –The other principle deals with the human inability to distinguish minor changes in image color or sound quality, which is especially easy to make use of in objects that contain redundant information, be it 16-bit sound, 8-bit or even better 24-bit image. The value of the least significant bit of the pixel color won’t result in any perceivable change of that color. Steganography Principles

The data to be concealed is compressed and hidden within another file. The first step is to find a file which will be used to hide the message (also called a carrier or a container.) The next step is to embed the message one wants to hide within the carrier using a steganographic technique. Two different techniques commonly used for embedding are: –Replace the least significant bit of each byte in the [carrier] with a single bit for the hidden message. –Select certain bytes in which to embed the message using a random number generator; resampling the bytes to pixel mapping to preserve color scheme, in the case of an image...; hiding information in the coefficients of the discrete cosine, fractal or wavelet transform of an image; and applying mimic functions that adapt bit pattern to a given statistical distribution." Steganography Process

EZStego (Stego Online, Stego Shareware, Romana Machado) –Java based software program which supports only GIF and PICT formats; Gif-It-Up v1.0 (Lee Nelson) –A stego program for Windows 95 that hides data in GIF files Hide and Seek (Colin Maroney) –can hide any data into GIF images; JPEG-JSTEG (Derek Upham) –can hide data inside a JPEG file MP3Stego (Fabien A.P. Petitcolas, Computer Laboratory, University of Cambridge) –can hide data inside MP3 sound files; Steganos (Demcom, Frankfurt, Germany) –encrypts files and then hides them within BMP, DIB, VOC, WAV, ASCII and HTML files. Reference: Steganography Software

S-Tools is one of the most popular steganography tools. –This program is Windows 95/98 compatible –It has the ability to conceal files within BMP, GIF and WAV files. –Allows you to simply point and click your way to hiding files. –It also has the ability to hide multiple files in one container. –It has been updated each year and can be easily downloaded by anyone. ( Steganography Software S-Tools Dear Susan: I can wait no longer I want to see you now please say that you will come. San...

Steganalysis is the art of discovering and rendering useless such covert messages. Steganalysis involves analysis of the carrier file –Simpler steganographic techniques produce some discernible change in the file size, statistics or both. –These changes can manifest themselves in color variations, loss of resolution and other distortions that are visible to the human eye. –This form of detection requires that you know what the original carrier image or file should look like. Steganalysis Basics

Watermarking is the practice of hiding a message about an image, audio clip, or other work of media within the work itself. –Watermark is hidden from the user in normal use –Watermark becomes visible as a result of a special viewing process Watermarking Basics

Sending a message to a spy by marking certain letters in a newspaper using invisible ink Adding sub-perceptible echo at certain places in an audio recording. Embedding a picture of President Andrew Jackson into the paper during paper making process. Watermarking Examples

“In 1981, photographic reprints of confidential British Cabinet Documents were being printed in newspapers. Rumor has it that to determine the source of the leak, Margaret Thatcher arranged to distribute uniquely identifiable copies of the documents to each of the ministers. Each copy had a different word spacing that was used to encode the identity of the recipient.” - Digital Watermarking, Cox Watermarking Examples

A digital watermark is a digital signal or pattern inserted into a digital image. Digital Watermarking Basics

In a broadcast monitoring system identifying data is added to the video/audio signal prior to transmission Two kinds of monitoring systems exist –Passive Monitoring: Recognize the content being broadcast Compares received signals against a database of known content Very expensive as large frames need to be compared Useful for monitoring of competition –Active Monitoring: Rely on information that is broadcast along with the content Relatively easier to implement Identification information is easily to interpret Requires cooperation of broadcasting mechanism Watermarking Applications

Under US law the creator of a story, painting, song, or any other original work holds copyright the instant it is recorded in some physical form –Up to 1998 a copyright notice was required to be attached to each distributed copy if the owner wanted to protect his/her rights –Even after the change in 1998 when this is no longer required the awards are reduced significantly if the copyright information is not present with the work Textual Copyright notices have several limitations –They are easy to remove deliberately or inadvertently –They can be aesthetically ugly if they cover a part of the image –For music the copyright is only on the media not on the work Electronic watermarks are imperceptible and inseparable from the work they are contained and are hence superior Watermarking Owner Identification

Textual notices can be erased and replaced by a forger –Image editors can be used to edit copyright notices –One solution is to register the image with copyright depository (expensive) Watermarking can prove image identity –Watermarks may also be altered –It is possible to prove that one image is derived from another indirectly proving the ownership Watermarking Proof of Ownership

Transaction Tracking Content Authentication Copy Control Device Control Watermarking Other Applications

Should be perceptually invisible to prevent obstruction of the original image. Statistically invisible so it cannot be detected or erased. Simple to extract watermark from image – Otherwise, the detection process requires too much computation time. Detection should be accurate. –Few false positives & false negatives Should be able to produce numerous watermarks. –Otherwise, only a limited number of images may be marked. Should be robust to filtering, additive noise, compression, and other forms of image manipulation. Should be able to determine the true owner of the image. Image Watermarking Properties

Watermarking Process Reference:

M-Sequence Generator –Embedded or added to the last significant digit of the original image –Watermark was extracted by taking the least significant bits at specific locations –Detection was done by cross correlation of the original and extracted watermarks Discrete Cosine Transform (DCT) –Watermark was placed in perpetually significant areas of the image –Watermark based on 1000 random samples of a N(0,1) distribution –Sample was added to the 1000 largest DCT coefficients of the image –Inverse DCT was taken to retrieve the watermarked image –For detection watermark was extracted from the DCT of suspected image Image Watermarking Techniques

Discrete Wavelet Transform(DWT) –Watermark modeled as Gaussian noise was added to middle and high frequency bands of the image –Decoding process involved taking DWT of potentially marked image Fractal Codes –A collage map was composed from 8x8 blocks of original image and from image’s DCT Image Watermarking Techniques

Watermarking Image

Perceptually inaudible, –such that no perceptual quality degradation occurs Statistically undetectable –To ensure security Cannot be removed or modified by any signal processing operation (e.g. filtering, compression, MP3-encoding,...) without degrading perceptual quality Readily extractable to detect copyright information Watermarking Audio Properties

Echo Coding Phase Coding Direct-Sequence Spread Spectrum Frequency-Hopped Spread Spectrum Frequency Masking Watermarking Audio Techniques

Watermarked Sound Watermarking Audio Original Sound Wideband Audio Signal is a raw WAV file - Ten seconds in length - Sampled at 44.1 kHz - Quantized to 16 bits per sample Watermarked Sound Original Sound Echo Coding Frequency Hopped Spread Spectrum

Fingerprinting