Steganography Ed Norris ECE 5546 12/4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
Steganography Sami Dokheekh.
Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
BMP Hide ‘n’ Seek What is BMP Hide ‘n’ Seek ? –It’s a tool that lets you hide text messages in BMP files without much visible change in the picture. –Change.
F5 A Steganographic Algorithm
F5 a Steganographic algorithm - andreas westfeld
 Introduction  LSB algorithm  Jsteg algorithm  Χ^2 test  Adaptive algorithms  LSB Substitution Compatible Steganography(LSCS)  Adaptive DCT-based.
An Introduction Steganography with A Case Study of Steganalysis
Error detection and concealment for Multimedia Communications Senior Design Fall 06 and Spring 07.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Steganography The Art of Hiding Messages
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
Steganography Part 2 – Detection and Research. Introduction to Steganalysis What is steganalysis?  The art of detecting messages hidden by steganography.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
5. 1 JPEG “ JPEG ” is Joint Photographic Experts Group. compresses pictures which don't have sharp changes e.g. landscape pictures. May lose some of the.
Roger Cheng (JPEG slides courtesy of Brian Bailey) Spring 2007
Image Compression - JPEG. Video Compression MPEG –Audio compression Lossy / perceptually lossless / lossless 3 layers Models based on speech generation.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
CS559-Computer Graphics Copyright Stephen Chenney Image File Formats How big is the image? –All files in some way store width and height How is the image.
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Introduction to JPEG Alireza Shafaei ( ) Fall 2005.
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 8 – JPEG Compression (Part 3) Klara Nahrstedt Spring 2012.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Klara Nahrstedt Spring 2011
IEEE-WVU, Anchorage  1 The Unseen Challenge Data Sets Anderson Rocha Walter Scheirer Siome Goldenstein Terrance Boult.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot May 2011 May 2011 Steganalysis ITSS 4201 Internet Insurance and Information.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
IEEE-WVU, Anchorage  1 Steg in the Real World Two examples that move the work of steganalysis out of the lab –The massive data survey of Provos.
Addressing Image Compression Techniques on current Internet Technologies By: Eduardo J. Moreira & Onyeka Ezenwoye CIS-6931 Term Paper.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Introduction to Steganalysis Schemes Multimedia Security.
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Cryptographic Anonymity Project Alan Le
JPEG.
STATISTIC & INFORMATION THEORY (CSNB134) MODULE 11 COMPRESSION.
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization G. Sahoo1 and R. K. Tiwari2 Presented by Pan Meng.
YASS Yet Another Steganographic Scheme that Resists Blind Steganalysis K. Solanki*, A. Sarkar +, and B. Manjunath Vision Research Laboratory Department.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Digital Steganography
JPEG Compression What is JPEG? Motivation
Security and Error Correction/Detection in 802.1x and GSM
Welcome
Model-based Steganography
Steganography.
Look at Me Mod 4 Lesson 3 Graphics Module 4- Build a Game.
Visit for more Learning Resources
Steganography with Digital Images
Steganography Techniques and their use in Anonymity
Steganography in digital images
Detecting Hidden Message Using Higher Order Statistical Models Hany Farid By Jingyu Ye Yiqi Hu.
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Steganography Ed Norris ECE /4/03

Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself must remain secret  Low-tech examples  Roman tattooing  Lemon juice

Typical Method 1. Alice and Bob agree on a secret key 2. The key uniquely determines how the message is hidden in an image 3. Alice sends the image to Bob 4. Bob, using the shared key, reveals the hidden content They must be using the same steganographic system and most likely have another shared key for the message itself

Passive Eavesdroppers  (by definition)  The stenographic system must evade detection from passive eavesdropping  Routines analyze the image / sound / data file for statistical anomalies that indicate the presence of hidden messages  This will be explored in detail

JPEGs  JPEG images are useful for steganographic systems for several reasons  Common picture encoding  Relatively simple file format  Resistant to visual attacks (unlike palette based encoding, like BMP)

JPEG Encoding 1. Transform to a luminance / chrominance color space 2. Group pixels into 8x8 blocks and transform each block with the discrete cosine transform (DCT) 3. Divide each of the 64 values by a different quantization coefficient 4. Losslessly encode and package JPEG

Visual Attack  The simplest attack; relies on a noticeable visual distortion of the image

Which one contains the first chapter of The Hunting of the Snark? Each image was 640x480 with 24-bit color. The JPEG compressed size of each is 300K and the hidden information is 15K

JSTEG  Replaces the LSB of the DCT coefficients with the message data  Does not require a shared key The nature of JPEG encoding causes modification of a single coefficient to affect all 64 values in each block. The result is not visible to the eye.

Statistical Methods  The encoded message has a random bit distribution from encryption and compression or both  Addition of the data causes changes in the inherent statistical properties of the image  Using a chi-square (Χ²) test:

JSTEG Effect on Coefficient Distribution

JSTEG Detection Since JSTEG adds information starting at the beginning of the image data file, it is straightforward to discover the message length

OutGuess  Replaces random LSBs with stego image data  Randomizer is seeded with the shared key  Previous chi-square test does not detect OutGuess images

OutGuess Detection  Modified chi-square  Sliding sample of coefficients  Sample size determined by image analysis  Nearly 100% true-positive detection rate if 25% or more of the available LSBs in the image have been used

Trained Detectors  System contains known stego and non- stego images  Nonlinear support vector machine  Can also analyze images based on similarity to groups (outdoor, people, etc)  Class discrimination

Detection Summary  The previous steganalysis methods demonstrate that simple LSB replacement can be detected  Class discrimination  Inherent statistical properties

F5  Matrix encoding of DCT coefficients  Uses a Hamming code to recover from a single bit error (per block)

K5 Pseudocode

Statistics-Aware Steganography  If the statistical stego-detection methods are known, the unused LSBs can be modified to retain the original coefficient statistics of the image  In addition, the message could be encoded as the parity of groups of DCT coefficients

Real World Detection  Media reports assert that steganography is prevalent on the Internet  JSteg  JSteg-Shell is a Windows GUI  RC4 (40-bit) encryption  JPHide  Blowfish encryption  OutGuess

Image Sources  World Wide Web – Ebay auction pictures  More than two million images  Usenet groups  One million images  Approximately two percent of images appeared to contain steganographic content using Stegbreak

Data is Detected, Now What?  Dictionary Attack  850,000 words for WWW images  1.8 million words for Usenet images  Application header information can help

Find Anything?  No

Why Not?  Passwords were all robust  All positives were false positives  The steganographic systems used were not the ones looked for  Messages were too small for detection (Stegbreak has a 50 byte minimum)

Future Steps?  Look elsewhere for candidate images  Use more hardware for password cracking  Research new information hiding and detection algorithms  (give up – no one uses steganography)

Further Study  PPM – portable pixel maps  BMP – Microsoft bitmap  WAV – Windows sound file  Matlab – Available on school computers, has built-in importers for BMP and WAV (PPM is trivial)

References  Hide and Seek: An Introduction to Steganography, IEEE Security & Privacy, May/June 2003

Questions  What is a visual attack?  The presence of steganographic content is indicated by visual distortion of an image  When / why use steganography?  When the presence of communication is a secret