Security 3 Distributed Systems Lecture # 16. Overview Steganography Digital Watermarking.

Slides:



Advertisements
Similar presentations
Information Hiding and Covert Channels
Advertisements

CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
F5 A Steganographic Algorithm
Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Steganography and Digital Watermarking Jonathan Cummins, Patrick Diskin, Samuel Lau, Robert Parlett.
An Introduction Steganography with A Case Study of Steganalysis
Khan, Mohammed Minhajuddin
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
1 Adnan Gutub Computer Engineering King Fahd University of Petroleum & Minerals Saudi Arabia A Novel Arabic Text Steganography Method Using Letter Points.
Survey on Information Assurance TEL 581 Presented by Viswesh Prabhu Subramanian Gregory Michel Lincoln Jean Louis Steganography.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Steganography Rayan Ghamri.
One possible way to encode information in text is print it in two slightly different typefaces. The secret message is decoded by ignoring one of the typefaces.
Steganography and Digital Watermarking Jonathan Cummins, Patrick Diskin, Samuel Lau, Robert Parlett, Mark Ryan.
حماية البيانات الإلكترونية نموذج البصمات المائية الهواري غوثي و د. جار الله الغامدي كلية علوم و هندسة الحاسب الآلي جامعة الملك فهد للبترول والمعادن شعبان.
STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic.
Digital Watermarking Parag Agarwal
Reza Mohammadi Shiraz University Of Technology
1 Chapter 7: Digital Watermarking and Copy(right) Protection.
Watermarking Relational Databases CSC 574/474 Information System Security.
Cryptography & Classical Ciphers
Steganography.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Steganography. Outline What is Steganography? History Steganography used nowadays? Terms Steganography methods Steganography Available Software Steganalysis.
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Steganography Paul Gretes Gangster pay ho Dennis Pattersonno sniper DNA test A lepers gut.
Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Information Hiding Nattawat Laksanawisit At National Chi Nan University.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
Steganography Leo Lee CS 265, Section 2 Dr. Stamp April 5, 2004.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Cryptographic Anonymity Project Alan Le
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Steganography Ryan Albright.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
A Partial Survey of the Perfect Digital Watermark Problem.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
STEGANOGRAPHY.
DONE BY S.MURALIRAJAN M.NIRMAL
Computers Talk Binary.
Department of Computer and Information Sciences
Visit for more Learning Resources
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Khan, Mohammed Minhajuddin
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
Information Hiding and Its Applications
STEGANOGRAPHY IN IMAGES
Chapter 1: Introduction
Presentation transcript:

Security 3 Distributed Systems Lecture # 16

Overview Steganography Digital Watermarking

Steganography Taken from An Analysis of Steganographic Techniques by Popa

Steganography First evidence in 440BC Histiaeus persian revolution messages Apparently neutral � s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects for pretext embargo on by-products, ejecting suets and vegetable oils. � � Pershing sails for NY June 1 � can be retrieved

Steganography Integrity of hidden information must be preserved Stego object must not visibly change Changes in the stego object must not affect the watermark Always assume the presence of watermark is well-known

Steganography Private vs public Private: Require secret key Public: Can look at watermark, but cannot tamper it Private Type I: Require original and modified objects, ouput watermark Type II: Require Orginal, Modified and Watermark, answer yes or no

Fingerprinting vs watermarking Fingerprints are user specific Encrypted checksum + user ID Watermarks are vendor specific Independent of users Protect against illegal copies Watermarks more feasible for mass produced CDs/disks

Techniques Audio Frequency masking Temporal masking Source code a = 5 b = 7 c = 9 Move around unordered statements to to encode a detectable pattern Useful for binary code as well

Techniques Text-based techniques Line-shift coding Word-shift coding Feature coding White-space Content-based

Image-based Visible watermarking taken from Jonathan et al univ of birmingjam

Least-significant bit encoding Host Pixel: Secret Pixel: New Image Pixel:

More techniques Image: DCT Round off coefficient Sound MP3: use parity bits Video Lots of room for sneaking in additional information

Example Results of StirMark. Taken from Information Hiding - A Survey by Peticolas et al.

Mosaic Attack

More attacks Intrepretation Attacks Confuse the watermark checker Implementation Attacks Digimarc was compromised by using a debugger to crack the ID checking part