STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.

Slides:



Advertisements
Similar presentations
Information Hiding and Covert Channels
Advertisements

[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Brodatz Textures Vistex Textures What is texture ? Texture can be considered to be repeating patterns of local variation of pixel intensities.
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
Khan, Mohammed Minhajuddin
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Pictures Worth More Than 1000 Words
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
Digital Watermarking By: Li Yang
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Steganography “Hiding in Plain Sight” Gary Alan Davis, D.Sc. Department of Computer & Information Systems.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Digital Watermarking
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Introduction to Steganography
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
DONE BY S.MURALIRAJAN M.NIRMAL
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Parag Agarwal Digital Watermarking Parag Agarwal
“Hiding in Plain Sight”
STEGANOGRAPHY IN IMAGES
Presentation transcript:

STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL

COPY RIGHTS: Copyrights are the rights of an author or creator to control the reproduction of their own intellectual property COPYRIGHTS PROTECTION 1. Steganography 2. Digital Watermarking 3. Cryptography etc.,

WHY FOR STEGANOGRAPHY! WHAT IS STEGANOGRAPHY? HOW WITH STEGANOGRAPHY!

DEFINITION: Steganography is derived from the Greek name “steganos” (hidden or secret) and “graphy” (writing or drawing) and literally means hidden writing Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message.

HISTORICAL STEGANOGRAPHIC TECHNIQUES Hidden messages in wax tablets: in ancient Greece, people wrote messages on the wood, then covered it with wax so that it looked like an ordinary, unused, tablet. kings would shave the heads of slaves and tattoo important messages on their scalps. Then, hair was allowed to grow back and slaves would carry messages without anyone suspecting any kind of communication Other private codes used invisible ink. This would dry up after the message was written and would not be visible until it was exposed to heat

MODERN STEGANOGRAPHIC TECHNIQUES Steganography in TEXT FILES Steganography in AUDIO FILES Steganography in IMAGE FILES

Assume the original three pixels are represented by the three 24-bit words below: ( ) ( ) ( ) The binary value for the letter A is ( ). Inserting the binary value of A into the three pixels, starting from the left byte, would result in: ( ) ( ) ( )

“After the theater, all clients keep a tab down at Wesley’s Nook.” by taking first letter from each word, we get… ATTACK AT DAWN

Countermeasures The detection of steganographically encoded packages is called steganalysis.steganalysis The simplest method to detect modified files, however, is to compare them to the originals. To detect information being moved through the graphics on a website, for example, an analyst can maintain known-clean copies of these materials and compare them against the current contents of the site. The differences (assuming the carrier is the same) will compose the payload (the hidden message).

ADVANTAGES DISADVANTAGES If we misuse it causes great loss to nation’s integrity. If we misuse it causes great loss to nation’s integrity. Doesn't hide the fact that an e- mail was sent, negating the purpose of secret communications Doesn't hide the fact that an e- mail was sent, negating the purpose of secret communications Someone else with a steganography detection and cracking tool could expose the message Someone else with a steganography detection and cracking tool could expose the message ADVANTAGESDISADVANTAGES Used to combine explanatory information with an image If we misuse it causes great loss to nation’s integrity. Peer to peer private communications Doesn’t hide the fact that an was sent, negating the purpose of secret communications. Posting secret communications on the web to avoid transmissions. Someone else with a steganography detection and cracking tool could expose the message.

DIGITAL WATERMARKING DIGITAL WATERMARKING

DEFINITION Digital watermarking is the process of inserting a digital signal or pattern (indicative of the owner of the content) into the digital content. The signal, known as watermark, can be used later to identify the owner of the work.

CLASSIFICATION OF DIGITAL WATERMARKS Visibility of watermarks (1) Visible watermarks. (2) Invisible watermarks. Watermark Extraction. Fragile, semi-fragile or robust. Based on construction (1) Spatial –high quality pixels but not robust. (2) spectrum-incorporated into the image‘s transform coefficients

DESIRABLE CHARACTERISTICS OF WATERMARKS Robustness Transparency Capacity Low complexity Tamper resistance or tamper evident

DIGITAL WATERMARKING PROCESS The following are the stages involved in watermarking process, Generation of watermark. Embedding stage. Distribution stage. Extraction stage. Decision stage.

GENERAL WATERMARKING PROCESS ORIGINAL IMAGE EMBEDDING ALGORITHM WATERMARKED IMAGE WATERMARK WATERMARK GENERATION ALGORITHM DECISION EXTRACTED WATERMARK EXTRACTION ALGORITHM ATTACK ON WATERMARKED IMAGE

POSSIBLE ATTACKS ON WATERMARKS An attack on a watermark can be defined as an operation, coincidental or hostile, that may degrade a watermark and possibly make it unreliably detectable. CLASSIFICATIONS: JPEG compression Geometric transformations 1.Horizontal flip 2.Cropping 3.Scaling 4.Geometric distortions with JPEG

WATERMARKED IMAGEUNWATERMARKED IMAGE WATERMARK 2.VISIBLE WATERMARK 1.INVISIBLE WATERMARK

APPLICATIONS OF WATERMARKING Copyright Protection Fingerprinting Copy Protection Broadcast Monitoring Data Authentication and Integrity Data Hiding or Steganography Image Labeling

CONCLUSIONS: Digital Watermarking moves through nation and creates sensation STEGANOGRAPHY is source for vision 2020 This is basic concept for evolving bubble technology This basic concept prevents piracy in videos This gives the basic concept for white hat hackers

QUERIES ? QUERIES ?