RGB Intensity Based Variable- Bits Image Steganography 2008 IEEE Asia-Pacific Services Computing Conference (APSCC 2008) 1 st International Workshop on.

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Reversible Data Hiding Based on Two-Dimensional Prediction Errors
E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals 2.5 E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals.
Steganography and Network Security
多媒體網路安全實驗室 Source:International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH- MSP),2010 Sixth. Authors:Hsiang-Cheh.
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
1 Adnan Gutub Computer Engineering King Fahd University of Petroleum & Minerals Saudi Arabia A Novel Arabic Text Steganography Method Using Letter Points.
CSE111: Great Ideas in Computer Science Dr. Carl Alphonce 219 Bell Hall Office hours: M-F 11:00-11:
ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Gutub Yousef Elarian Sameh Awaideh Aleem Alvi Computer Engineering Department King Fahd University.
October 8, th Asian Test Symposium 2007, Biejing, China XXXXX00XXX XX000101XXXXXXXXXXXXX0XXX1X0 101XXX1011XXXXXX0XXX XX000101XXXXXXXXXXXXX0XXX1XX.
A Hybrid Test Compression Technique for Efficient Testing of Systems-on-a-Chip Aiman El-Maleh King Fahd University of Petroleum & Minerals, Dept. of Computer.
Adnan Gutub Mahmoud Ankeer Muhammad AbuGhalioun
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Improving Security and Capacity for Arabic Text Steganography Using 'Kashida' Extensions By : Fahd Al-Haidari Adnan Gutub Khalid Al-Kahsah Jamil Hamodi.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals 2.2 E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Digital Media Lecture 4.1: Image Encoding Practice Georgia Gwinnett College School of Science and Technology Dr. Jim Rowan.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals 3.3 E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals.
ITEC 109 Multimedia Lecture Lecture 23. Photo manipulation Review Lists / Arrays.
Advanced Science and Technology Letters Vol.35(Security 2013), pp Image Steganograpy via Video Using Lifting.
Cryptographic Anonymity Project Alan Le
E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals 2.6 E - BOOK FOR COLLEGE ALGEBRA King Fahd University of Petroleum & Minerals.
Digital Media Lecture 4.2: Image Encoding Practice Georgia Gwinnett College School of Science and Technology Dr. Jim Rowan.
人力資源報告 Image and Signal Processing 1 Steganography Using Sudoku Revisited Wien Hong, Tung-Shou Chen, Chih-Wei Shiu Department of Information Management,
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Digital Steganography
Representing images.
影像偽裝術 Dr. Chin-Chen Chang
Palette Partition Based Data Hiding for Color Images
Adnan Abdul-Aziz Gutub* and Ahmed Ali Al-Nazer
Digital Media Lecture 4.1: Image Encoding Practice
Model-based Steganography
Recent Developments on Multimedia and Secure Networking Technologies
EFFICIENT ADDERS TO SPEEDUP MODULAR MULTIPLICATION FOR CRYPTOGRAPHY
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
Aiman H. El-Maleh Sadiq M. Sait Syed Z. Shazli
Advisor: Prof. Chin-Chen Chang (張真誠 教授) Student: Wei-Liang Tai (戴維良)
Reversible Data Hiding Scheme Using Two Steganographic Images
Advisor:Prof. Chin-Chen Chang Student :Kuo-Nan Chen
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
An AMBTC compression based data hiding scheme using pixel value adjusting strategy Sourse: Multidimensional Systems and Signal Processing, Volume 29,
Basic Concepts of Digital Imaging
Data hiding based Hamming code
A High Embedding Capacity Approach to Adaptive Steganography
Recent Developments on Multimedia and Secure Networking Technologies
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Novel Multiple Spatial Watermarking Technique in Color Images
An efficient reversible data hiding with reduplicated exploiting modification direction using image interpolation and edge detection Source: Multimedia.
Information Protection and Recovery with Reversible Data Hiding
An Iterative Method for Lossless Data Embedding in BMP Images
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Authors: Chin-Chen Chang, Yi-Hui Chen, and Chia-Chen Lin
Lossless Data Hiding in the Spatial Domain for High Quality Images
Presentation transcript:

RGB Intensity Based Variable- Bits Image Steganography 2008 IEEE Asia-Pacific Services Computing Conference (APSCC 2008) 1 st International Workshop on Multimedia, Information Privacy & Intelligent Computing Systems December 9-12, 2008, Yilan, Taiwan Mohammad Tanvir Parvez & Adnan Abdul-Aziz Gutub College of Computer Sciences & Engineering King Fahd University of Petroleum & Minerals (KFUPM) Dhahran, Saudi Arabia

Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia /212 Outline The problem Instance Goals Algorithm Idea Step Examples Experimentations Visual and statistical analysis Comparisons

Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia /213 The Problem Hide (embed) a file within another file Cover FileData File

Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia /214 Applications Hiding copyright info Avoid snooping Data encapsulation E.g. explanatory information within X-ray images Copyright protections

Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia /215 Algorithmic Goals Secure Less Distortion Visual Statistical (like Histogram) Not guessable Data location High capacity Not dependent on cover image

Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia /216 The Idea

Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia /217 Algorithm: Features One channel as indicator Data in one of the other channels Variable-bits per channel Lower color value – Higher no of bits

Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia /218 Algorithm Outline RGB The Algorithm 1.Chose an indicator 2.Chose the channel 3.Decide no of data bits -Partition scheme 4.Get & store the data [say 1101] 5.Modify the other channel (if needed)

Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia /219 Example Up to 7 bits have been modified

Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia /2110 Expectations Secure Random indicator sequence Statistically undetectable Only lower bits are changed High capacity How much of these can be achieved?

Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia /2111 Experimentations Image size: 640 X 480, Bit depth: 24 No of pixels = Image size: 150 X 117, Bit depth: 24 Data length = bits Cover ImageData File

Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia /2112 Experimentations Pixels utilized: Constant 3 bits per channel

Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia /2113 Experimentations Pixels utilized: /4 bits per channel

Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia /2114 Experimentations Pixels utilized: Constant 4 bits per channel

Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia /2115 Experimentations Pixels utilized: /5 bits per channel

Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia /2116 Histograms Histogram of Red channel: cover image Histogram of Red channel: stego file

Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia /2117 Histograms Histogram of Green channel: cover image Histogram of Green channel: stego file

Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia /2118 Histograms Histogram of Blue channel: cover image Histogram of Blue channel: stego file

Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia /2119 Comparison Technique No of data bits per channel (bits) No of pixels of cover media utilized (pixels) No of pixels of cover media utilized (percentage) Intensity Based Variable-Bits % 3 or % % 4 or % Pixel Indicator % % %

Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia /2120 Comparison: High Capacity Pixels utilized: 16.5% Constant 3 bits per channel Our Algorithm Pixel Indicator Algorithm Cover Image Data File

Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia /2121 Summary New idea in image based steganography Variable-bits per channel High capacity algorithm Secure Random indicator sequence