Robert Krenn January 21, 2004 Steganography Implementation & Detection.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
F5 A Steganographic Algorithm
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Khan, Mohammed Minhajuddin
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Data Hiding within Audio Signals Matthew Wiedemer CSE691 November 20, 2001.
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Survey on Information Assurance TEL 581 Presented by Viswesh Prabhu Subramanian Gregory Michel Lincoln Jean Louis Steganography.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Steganography Rayan Ghamri.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Reza Mohammadi Shiraz University Of Technology
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Introduction to Steganalysis Schemes Multimedia Security.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Cryptographic Anonymity Project Alan Le
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Introduction to Steganography
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
DONE BY S.MURALIRAJAN M.NIRMAL
Hidden Communications: The Effectiveness of Steganography
Steganography.
Visit for more Learning Resources
Steganography with Digital Images
Khan, Mohammed Minhajuddin
A Data Hiding Scheme Based Upon Block Truncation Coding
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Steganography Techniques and their use in Anonymity
Steganography in digital images
Parag Agarwal Digital Watermarking Parag Agarwal
Information Hiding and Its Applications
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Robert Krenn January 21, 2004 Steganography Implementation & Detection

Overview ● What is steganography? ● Implementations ● Detection ● Defeating steganography ● Conclusion ● Questions

What is steganography? Stega- covered, from the Greek “stegos” or roof -nography writing, from the Greek “graphia”

What is steganography? ● The art of hiding information inside information Since everyone can read, encoding text in neutral sentences is doubtfully effective

What is steganography? ● The art of hiding information inside information Since everyone can read, encoding text in neutral sentences is doubtfully effective Since Everyone Can Read, Encoding Text In Neutral Sentences Is Doubtfully Effective ⇒ Secret inside

What is steganography? What is it used for? ● Hiding the fact that you are sending messages ● Hiding several messages inside data ● Digital watermarking Kerckhoffs' principle ● Secure with knowlegde of the system ● Message can only be read with secret key

What is steganography? Hiding several messages ● Deniable cryptography ● Knowledge of encrypted data ● No proof of how much information is stored ● Rubberhose (

What is steganography? Digital watermarking ● Not really hiding information ● Important: not modificable ● Uses the hiding-property of steganography ● Recent: MPAA hides watermarks in movies

Implementation Hiding information ● Text / Webpages ● Images ● Audio ● Video

Implementation Text / Webpages ● Use of a codebook ● Layout of texts ● Every Nth character ● Use of whitespaces and newlines ● Can be difficult to detect and decode

Implementation Text / Webpages In the midway of this our mortal life, I found me in a gloomy wood, astray Gone from the path direct: and e'en to tell It were no easy task, how savage wild That forest, how robust and rough its growth, Which to remember only, my dismay Renews, in bitterness not far from death. Yet to discourse of what there good befell, All else will I relate discover'd there. How first I enter'd it I scarce can say

Implementation Text / Webpages In the midway of this our mortal life, I found me in a gloomy wood, astray Gone from the path direct: and e'en to tell It were no easy task, how savage wild That forest, how robust and rough its growth, Which to remember only, my dismay Renews, in bitterness not far from death. Yet to discourse of what there good befell, All else will I relate discover'd there. How first I enter'd it I scarce can say ⇒ meet at dawn

Implementation Images ● Cover image ● Identify redundant data ● Replace (a subset of) redundant bits with data

Implementation Images ● JPEG uses discrete cosine transformations (DCT) ● Transform pixel blocks to DCT coefficients ● Get least significant bit of each DCT coefficient ● Replace LSB with secret message bit ● Insert modified DCT into output image

Implementation Images Original image Data embedded inside

Implementation Images ● JPEG stegencryption ● Operates in transformation space ● No visual changes ● GIF and BMP stegencryption ● Operates in low bit planes ● Subject to visual attacks

Implementation Images Original image Data embedded inside

Implementation Audio ● Use frequencies inaudible to humans ● Embed data using the LSB ● Encoding musical tones

Implementation Video ● Visible signals (gestures, movements) ● Same techniques as with images ● Same techniques as with audio

Detection Text ● Look for (disturbings of) patterns ● Odd use of language ● Line heights and whitespaces

Detection Images ● Examine color palette ● Size of the image ● Differences: − Format − Last modified date

Detection Images ● Statistical analysis ● Analyze frequency of DCT coefficients ● Entropy of redundant data − Hidden content » ⇒ higher entropy

Detection Images ● Apply filters to steganograms ● Visible representation of statistical data

Detection Filtered Original image Embedded data

Detection Filtered Original image Embedded data

Detection Audio ● Statistical analysis ● Analyze patterns in background noise ● Distortions ● Measure inaudible frequencies

Detection Video ● Look for distinguishing movements ● Same techniques as with images ● Same techniques as with audio

Defeating steganography Text ● Change spacing, interpunction ● Modify line heights, layout ● Add or remove words

Defeating steganography Images ● Compress with lossy compression ● Convert to different format ● Resize the image ● Modify colors

Defeating steganography Audio ● Compress with lossy compression ● Change bitrate ● Alter / limit frequency spectrum

Defeating steganography Video ● Same techniques as with images ● Same techniques as with audio

Conclusion ● Hide data practically everywhere ● Detection of steganography − Possible, but can be difficult − Hard when valid to Kerckhoffs' principle ● Defeating steganography is not hard

Steganography ● Questions?

Steganography