Steganography detection Roland Cmorik, Martin Šumák.

Slides:



Advertisements
Similar presentations
Data Compression CS 147 Minh Nguyen.
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
F5 A Steganographic Algorithm
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Pictures Worth More Than 1000 Words
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Data dan Teknologi Multimedia Sesi 08 Nofriyadi Nurdam.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Introduction to Steganalysis Schemes Multimedia Security.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Graphics. … Can be immersive and capture imaginations. Largest Photographs In The World.
Cryptographic Anonymity Project Alan Le
Implementation of Steganographic Techniques Danny Friedheim pd. 2.
Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization G. Sahoo1 and R. K. Tiwari2 Presented by Pan Meng.
Information in Computers. Remember Computers Execute algorithms Need to be told what to do And to whom to do it.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
Submitted To-: Submitted By-: Mrs.Sushma Rani (HOD) Aashish Kr. Goyal (IT-7th) Deepak Soni (IT-8 th )
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Digital Steganography
Introduction to Steganography
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Steganography.
Visit for more Learning Resources
Steganography with Digital Images
Steganography Techniques and their use in Anonymity
Parag Agarwal Digital Watermarking Parag Agarwal
Detecting Hidden Message Using Higher Order Statistical Models Hany Farid By Jingyu Ye Yiqi Hu.
An Iterative Method for Lossless Data Embedding in BMP Images
JPEG Steganalysis Statistical Offset Tests
STEGANOGRAPHY IN IMAGES
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

Steganography detection Roland Cmorik, Martin Šumák

Introduction cryptography and steganography are used for exchanging a secret information, cryptography and steganography are used for exchanging a secret information, the difference - steganography is a method how to communicate invisibly, the difference - steganography is a method how to communicate invisibly, the cover medium is a message in which the secret message can be hidden, the cover medium is a message in which the secret message can be hidden,

Introduction hidden message can be also encrypted before embedding hidden message can be also encrypted before embedding cover medium should contain enough amount of redundancy and ucertainty, cover medium should contain enough amount of redundancy and ucertainty, the data such as images, videos and sounds contain huge amount of uncertainty (ex. the least significant bits of pictures) the data such as images, videos and sounds contain huge amount of uncertainty (ex. the least significant bits of pictures)

Watermarks Strong watermarks - keep indentity of author of some file (book, video, photography,...). They would be found even after the file undergoes a great deal of distortion. Strong watermarks - keep indentity of author of some file (book, video, photography,...). They would be found even after the file undergoes a great deal of distortion. Weak watermarks – are made as fragile as possible. They have to disappear even if a minimal change of the file would occur. Weak watermarks – are made as fragile as possible. They have to disappear even if a minimal change of the file would occur. The combination is a good protection before tampering the file. The combination is a good protection before tampering the file.

Steganography techniques replace the noise in an image, replace the noise in an image, eight bits for each color component (RGB) so colors of pixels are expressed with extra precision, eight bits for each color component (RGB) so colors of pixels are expressed with extra precision, the secret message can be stored in least significant bits of color components, the secret message can be stored in least significant bits of color components, changed image is for human eye identical with original image changed image is for human eye identical with original image disadvantage - easy to detect by visual or statistical attacks, disadvantage - easy to detect by visual or statistical attacks, more sophisticated way is to spread the information between many files (needs larger cover medium ). more sophisticated way is to spread the information between many files (needs larger cover medium ).

Steganography techniques Mimic data - this technique doesn’t try to change a cover medium, it tries to create a message only from the secret message. Mimic data - this technique doesn’t try to change a cover medium, it tries to create a message only from the secret message. Example - create a chess game notation, that represents a random chess game. The bits of secret message can be hidden as order of black or white squares of moves in the game. Example - create a chess game notation, that represents a random chess game. The bits of secret message can be hidden as order of black or white squares of moves in the game.

Attacks on steganography Attacking staganographic algorithms is very similar to attacking cryptographic algorithms. Attacking staganographic algorithms is very similar to attacking cryptographic algorithms. Some possible attacks: File only - determine if there is a hidden message. File and original Copy - destroy hidden information, extract the information, replace... Some possible attacks: File only - determine if there is a hidden message. File and original Copy - destroy hidden information, extract the information, replace...

Attacks on steganography Compression Attack: One of the simplest attacks is to compress the file. Compression algorithms try to remove the extraneous information from a file, and “hidden” is often equivalent to “extraneous”. Compression Attack: One of the simplest attacks is to compress the file. Compression algorithms try to remove the extraneous information from a file, and “hidden” is often equivalent to “extraneous”. Random Tweaking Attack: An attacker could simply add small, random tweaks. Random Tweaking Attack: An attacker could simply add small, random tweaks. Reformat Attack: One possible attack is to change the format of the file. Different file formats don’t store data in exactly same way (BMP, GIF, JPEG) Reformat Attack: One possible attack is to change the format of the file. Different file formats don’t store data in exactly same way (BMP, GIF, JPEG)

Staganalysis Deals with identifying the existence of a message (File Only Attack). Deals with identifying the existence of a message (File Only Attack). Many of the basic tests in steganalysis will just identify the possible existence of a message. In some cases, hidden bits are spread throughout the file. Many of the basic tests in steganalysis will just identify the possible existence of a message. In some cases, hidden bits are spread throughout the file. Some of these algorithms can’t tell you where they are, but they can tell that the hidden bits are probably there. Some of these algorithms can’t tell you where they are, but they can tell that the hidden bits are probably there.

Staganalysis The basic approaches can be divided into these categories: Structural Attacks Structural Attacks Visual or Aural Attacks Visual or Aural Attacks Statistical Attacks Statistical Attacks

Structural Attacks Steganographic algorithms often leave behind a characteristic structure to the data. Steganographic algorithms often leave behind a characteristic structure to the data. Hiding information in the least significant bit is simple when each pixel is represented by 24 bits such as BMP. Hiding information in the least significant bit is simple when each pixel is represented by 24 bits such as BMP. But, file formats such as GIF allocate 8 bits or fewer by building a palette of selected colors. Each pixel of image is represented by index of color in the palette. Hiding information in GIF format by tweaking the least significant bit can fail because the palette entries are often not close enough. But, file formats such as GIF allocate 8 bits or fewer by building a palette of selected colors. Each pixel of image is represented by index of color in the palette. Hiding information in GIF format by tweaking the least significant bit can fail because the palette entries are often not close enough.

Structural Attacks An effective way how to avoid this problem is to sort the palette An effective way how to avoid this problem is to sort the palette EzStego uses this technique EzStego uses this technique

Structural Attacks After hiding procedure the palette must be unsorted to the original form – attacker will not see that steganographic program was used. After hiding procedure the palette must be unsorted to the original form – attacker will not see that steganographic program was used. But if the attacker knows the sorting algorithm (it is deterministic) then he can access to hiden bits. But if the attacker knows the sorting algorithm (it is deterministic) then he can access to hiden bits.

Visual Attacks Human is trying to search for visual anomalies. Human is trying to search for visual anomalies. One common test displays the least significant bits of an image. One common test displays the least significant bits of an image. Completely random noise often reveals the existance of a hidden message because imperfect digitalizers leave echoes of the large structure in the least significant bits. Completely random noise often reveals the existance of a hidden message because imperfect digitalizers leave echoes of the large structure in the least significant bits.

Visual Attacks On the left is the original picture, on the right one is hiden message embedded in upper half of image (EzStego used). On the left is the original picture, on the right one is hiden message embedded in upper half of image (EzStego used). Least significant bits of pixels (after ordering the palette), it is easy to recognize that there was a hiden message embedded in the right picture. Least significant bits of pixels (after ordering the palette), it is easy to recognize that there was a hiden message embedded in the right picture.

Visual Attacks Disadvantages (for attacker): If there are no objects on the picture with clear shapes – it causes random noise on the least significant bits of the original image – can’t see the difference. If there are no objects on the picture with clear shapes – it causes random noise on the least significant bits of the original image – can’t see the difference. It is hard to automatize the visual attacks. It is hard to automatize the visual attacks.

Statistical Attacks Visual attacks show that the value of last significant bits of pixels is not as random as it seems. Visual attacks show that the value of last significant bits of pixels is not as random as it seems. Standard embedded message that has to be hidden is more random than the replaced bits. Standard embedded message that has to be hidden is more random than the replaced bits. This property is the main weakness explioted by statistical attacks on steganography. This property is the main weakness explioted by statistical attacks on steganography.

Statistical Attacks The simplest statistical test for detecting randomness is the χ2 (chi-squared) test. The simplest statistical test for detecting randomness is the χ2 (chi-squared) test. It is based on differences between expected number of some event occurrences and number of its real occurrences. It is based on differences between expected number of some event occurrences and number of its real occurrences.

Statistical Attacks Events e0,..., ek would occur with uniform probability (as bits in a message to hide). If there is n events in a sample sequence at all, the expected number of each ei event occurrences is then n/k. Let ci be the number of real occurrences of ei event. The amount of randomness in the sample sequence of n events is measured with this equation: Events e0,..., ek would occur with uniform probability (as bits in a message to hide). If there is n events in a sample sequence at all, the expected number of each ei event occurrences is then n/k. Let ci be the number of real occurrences of ei event. The amount of randomness in the sample sequence of n events is measured with this equation:

Statistical Attacks High scores indicate an unrandom condition and it is typical for any part of original picture. High scores indicate an unrandom condition and it is typical for any part of original picture. Low scores indicate high degree of randomness and it is typical for files with embedded hidden message. Low scores indicate high degree of randomness and it is typical for files with embedded hidden message.

Statistical Attacks In χ2 test of some image file the events can be the values of least significant bits (e1 = 0, e2 = 1, n is the number of least significant bits). In χ2 test of some image file the events can be the values of least significant bits (e1 = 0, e2 = 1, n is the number of least significant bits). Or we can also evaluate the randomness of pairs (triplets,…) of coterminously bits or the randomness of squares of p × p pixels in image. Or we can also evaluate the randomness of pairs (triplets,…) of coterminously bits or the randomness of squares of p × p pixels in image.