A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)

Slides:



Advertisements
Similar presentations
Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
Advertisements

CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
F5 A Steganographic Algorithm
Feature-Based Steganalysis for JPEG images and its applications for future design of steganographic schemes. - Jessica Fridrich Submitted by: Praveena.
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
1 A Markov Process Based Approach to Effective Attacking JPEG Steganography By Y. Q. Shi, Chunhua Chen, Wen Chen NJIT Presented by Hanlin Hu and Xiao Zhang.
Further Study on YASS: Steganography Based on Randomized Embedding to Resists Blind Steganalysis A. Sarkar +, K. Solanki*, and B. Manjunath Vision.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Introduction to Steganalysis Schemes Multimedia Security.
1 Information Hiding Based on Search Order Coding for VQ Indices Source: Pattern Recognition Letters, Vol.25, 2004, pp.1253 – 1261 Authors: Chin-Chen Chang,
Benchmarking steganographic and steganalysis techniques Electronic Imaging of SPIE 2005 Authors:Kharrazi, Mehdi, Husrev T. Sencar, and Nasir Memon Department.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
YASS Yet Another Steganographic Scheme that Resists Blind Steganalysis K. Solanki*, A. Sarkar +, and B. Manjunath Vision Research Laboratory Department.
Vishnu Vardhan Reddy Mukku Mav ID : Under the guidance of.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Steganography Example
An Information Hiding Scheme Using Sudoku
Information Steganography Using Magic Matrix
Model-based Steganography
Reversible Data Hiding in JPEG Images using Ordered Embedding
Source : Signal Processing, Volume 133, April 2017, Pages
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Steganography with Digital Images
Information Steganography Using Magic Matrix
Deep Learning Hierarchical Representations for Image Steganalysis
Steganography in digital images
Hiding Data in a Color Palette Image with Hybrid Strategies
A Study of Digital Image Coding and Retrieving Techniques
Embedding Secrets Using Magic Matrices
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
A Restricted Region-based Data-hiding Scheme
Some Novel Steganographic Methods for Digital Images
Reversible Data Hiding Scheme Using Two Steganographic Images
Information Steganography Using Magic Matrix
Reversible Data Hiding in JPEG Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Hiding and Its Applications
Digital Steganography Utilizing Features of JPEG Images
Partial reversible data hiding scheme using (7, 4) hamming code
High Capacity Data Hiding for Grayscale Images
Chair Professor Chin-Chen Chang Feng Chia University
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
Chair Professor Chin-Chen Chang Feng Chia University
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Partial reversible data hiding scheme using (7, 4) hamming code
Novel Multiple Spatial Watermarking Technique in Color Images
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
De-clustering and Its Application to Steganography
A Data Hiding Scheme Based Upon Block Truncation Coding
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
Source: Pattern Recognition, Volume 40, Issue 2, February 2007, pp
Information Hiding Techniques Using Magic Matrix
Steganographic Systems for Secret Messages
Department of Computer Science, University of Central Florida ,Orlando
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Lossless Data Hiding in the Spatial Domain for High Quality Images
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Presentation transcript:

A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5) - Improved matrix encoding - Experimental results - Conclusion

JPEG compression

Introduction JPEG steganography:

Matrix Encoding (F5) Matrix encoding allows to hide n bits of data to stream of 2 n -1 coefficients (S) by modifying one coefficient. ME schemes: (m, 2 m -1), examples (2, 3) (3, 7) (4, 15) 1) Get stream of non-zero DCT coefficients: 1, -1, 2, 3, 1, -1, -3, 1, 8, 3, -1, -1, -1, 2, 1, 1, 1, 2, 3, 1, 12,…, N 2) Compute stream of corresponding informative bits b: 1, -1, 2, 3, 1, -1, -3, 1, 8, 3, -1, -1, -1, 2, 1, 1, 1, 2, 3, 1, 12, … 1, 0, 0, 1, 1, 0, 0, 1, 0, 1, 0, 0, 0, 0, 1, 1, 1, 0, 1, 1, 0, … 3) Define the matrix encoding scheme (n, 2 n -1) such as, where C is the size of hidden message.

Matrix encoding(F5) Assume that the ME scheme is(3,7). Hidden message (M) is (0 0 1). Stream of DCT coefficients (D) and stream of informative bits (S) are (3, -1, 2, 1, 1, -1, -3) and (1, 0, 0, 1, 1, 0, 0) respectively. For embedding message M to S one coefficient from D has to be modified. Compute necessary position (P={p 1, p 2, p 3 }) : S = {a 1, a 2, a 3, a 4,a 5,a 6,a 7 } 1) Compute syndrome O = {o 1, o 2, o 3 } o 1 = xor(a 4,a 5,a 6,a 7 ) o 2 = xor(a 2,a 3,a 6,a 7 ) o 3 = xor(a 1,a 3,a 5,a 7 ) 2) Position (P) in binary representation is computed as: P = xor(O,M)

Matrix Encoding (F5), example Hiding message M (0 0 1) to (3, -1, 2, 1, 1, -1, -3) or (1, 0, 0, 1, 1, 0, 0) 1)Get syndrome : o 1 = xor(a 4,a 5,a 6,a 7 )=xor(1,1,0,0) = 0 o 2 = xor(a 2,a 3,a 6,a 7 )=xor(0,0,0,0) = 0 o 3 = xor(a 1,a 3,a 5,a 7 )=xor(1,0,1,0) = 0 2)Get position: P = xor(M,O) = {xor(0,0), xor(0,0), xor(1,0)} = {0, 0, 1}. P 10 = 1 3)Get stream of modified coefficients and informative bits (2(4), -1, 2, 1, 1, -1, -3) and (0, 0, 0, 1, 1, 0, 0) 4)Verification (get syndrome): (0, 0, 0, 1, 1, 0, 0) m 1 = xor(a 4,a 5,a 6,a 7 )=xor(1,1,0,0) = 0 m 2 = xor(a 2,a 3,a 6,a 7 )=xor(0,0,0,0) = 0 m 3 = xor(a 1,a 3,a 5,a 7 )=xor(0,0,1,0) = 1

Modified matrix encoding Each 1 flip solution P can be replaced to floor(n/2) 2 flips solutions P 1, P 2, such that P = xor(P 1, P 2 ). Example: P = 5 10 = P 1 P flips solution is also possible: P = xor(P 1, P 2, P 3 )

Overlapped matrix encoding Original ME: Overlapped ME: I

Overlapped matrix encoding Assume that A and B are the positions to flip for block 1 and 2. (a 1, a 2 ), (b 1,b 2 ), (a 11,a 12,a 13 ) or (b 11,b 12,b 13 ) are the numbers such that A = xor(a 1,a 2 ) = xor (a 11,a 12,a 13 ), and B = xor(b 1,b 2 ) = xor (b 11,b 12,b 13 ) B’ is a position for block 2, if A, (a 1 or a 2 ), or (a 11 or a 12 or a 13 ) belong to I. B’ = xor(b’ 1,b’ 2 ) = xor (b’ 11,b’ 12,b’ 13 ) 1 flip solution: A = B, (A,B) ϵ I 2 flips solution: (A,B), (a 1,a 2 = B) or (b’ 1 = A, b’ 2 ) 3 flips solution: (a 1,a 2,B), (a 1,a 2 = b’ 1,b’ 2 ), (A, b 1, b 2 ) or (a 11,a 12 = b’ 1,a 13 = b’ 2 ), (a 1 = b’ 11,a 2 = b’ 12,b’ 13 ) 4 flips solution: (a 1,a 2,b 1,b 2 ), (a 11,a 12,a 13 = b’ 1,b’ 2 ), (a 11,a 12 = b’ 11,a 13 = b’ 12, b’ 13 ), (a 1,a 2 = b’ 11,b’ 12,b’ 13 )

Example: Assume that A = 4 and B = 2: Possible solutions: (2, 6) 2 = 010, 6 = 110, xor(010,110) = 100 = 4. Coefficient 6 has index 2 for block 2. (B = 2) (4,9,11), A = 4, 9 th and 11 th coefficients have the indexes 5 and 7 correspondingly. Thus, 5 = 101, 7 = 111, xor(101,111) = 010 =2.

Insert - Remove (IR) approach The stream of non-rounded AC coefficients: 1.45,0.21, 0.35, 1.02, -0.01, -0.28, -5.12, 9.87, -0.45, 0.02, 1.89, -0.85, 4.01, -8.74, -6.04, 1.55, 3.11, , 5.04 Hidden data: m 1 =101, m 2 =100 Assume that the candidates for inserting are the AC coefficients belonging to the (0.25, 0.5) and (-0.5, -0.25). 0.35, -0.28, are the candidates for inserting (c I ). 1.45, 1.02, are the candidates for removing (c R ). The stream of non-rounded AC coefficients for hiding data. 1.45, 1.02, -5.12, 9.87, 1.89, -0.85, 4.01, -6.04, 1.55, 3.11, Rounded: 1, 1, -5, 10, 2, -1, 4, -6, 2, 3, -10 Block 1: 1, 1, -5, 10, 2, -1, 4 Block 2: 2, -1, 4, -6, 2, 3, -10 Intersected area I : 2, -1, 4

Distortion impact Distortion impact due to modification: D = E 2 ∙ Q 2 Distortion impact due to insertion or removing: D IR = |0.5-|C|| 2 ∙ Q 2 Total distortion impact:

IR approach (without IR) AC: Q : D : D IR : AC: Q : D : D IR : Hidden data: m 1 =101, m 2 =100 Block 1: 1, 1, -5, 10, 2, -1, 4 Block 2: 2, -1, 4, -6, 2, 3, -10 Among one, two, and three flips solutions define A = (1,4), B = (6) Distortion for original approach is 100.2

IR approach (Insertion and removing) Insert 0.35 (i.e > 1), then Block 1: 1, 1,1, -5, 10, 2, -1 Block 2: 10, 2, -1, 4, -6, 2, 3 Among one, two, and three flips solutions define A = (1 7), B = (6) Distortion after inserting is = 22.7 Remove 1.45 (i.e > 0), then Block 1: 1, -5, 10, 2, -1, 4, -6 Block 2: -1, 4, -6, 2, 3, -10, 5 Among one, two, and three flips solutions define A = (2 4 6), B = (7) Distortion for original approach is = 210.9

Experimental results The stego images have been tested by using 274 – features steganalysis method proposed by Pevny and Fridrich

Conclusion The proposed oimproved matrix encoding: - achieves higher capacity. -can improve any block based steganographic method -decrease detectability of steganalysis - can be improved further.