Image Steganography (cont.)

Similar documents
Jeff Hinson CS525, Spring 2010

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

Breaking the OutGuess

Multimedia Security: So What s the Big Deal?

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

Watermarking Using Bit Plane Complexity Segmentation and Artificial Neural Network Rashmeet Kaur Chawla 1, Sunil Kumar Muttoo 2

SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Sign-up Sheet posted outside of my office HFH 1121

Image and Video Watermarking

[Patil* et al., 5(7): July, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

Dr. Nasseer M. Basheer, Lecturer, Technical Engineering College/Mosul Northern Technical University/Iraq

A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function

Data Hiding in Video

An Empirical Study of Machine Learning Techniques Applied to image Watermarking.

Graphical Interface for Watermarking

Speech Modulation for Image Watermarking

A General Framework for the Structural Steganalysis of LSB Replacement

Steganography. Brent McClain Rob Carey

Fidelity Analysis of Additive and Multiplicative Watermarked Images in Integrated Domain

A New Approach to Compressed Image Steganography Using Wavelet Transform

Information and Communications Security: Encryption and Information Hiding

Steganography: Hiding Data In Plain Sight. Ryan Gibson

SECURITY ENHANCEMENT: STEGANO-CRYPTO USING CHOAS BASED Sblock EMBEDDING TECHNIQUE

Compression-Compatible Fragile and Semi-Fragile Tamper Detection

Image Steganography Method Using Integer Wavelet Transform

ELE 201, Spring 2014 Laboratory No. 4 Compression, Error Correction, and Watermarking

Watermarking 3D images and 3D meshes

A Reversible Data Hiding Scheme For JPEG Images

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

An Improvement Technique based on Structural Similarity Thresholding for Digital Watermarking

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Invisible Watermarking Audio Digital with Discrete Cosine Transform

Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

Enhancing the Image Compression Rate Using Steganography

Improved Qualitative Color Image Steganography Based on DWT

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

Comparison of Digital Image Watermarking Algorithms. Xu Zhou Colorado School of Mines December 1, 2014

Comparison of Digital Water Marking methods

Analysis of Information Hiding Techniques in HEVC.

Steganalysis Techniques: A Comparative Study

Part II Authentication Techniques

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

Copy Protection for Multimedia Data based on Labeling Techniques

STEGANOGRAPHY: HIDDEN IN PLAIN SIGHT BY: KEVIN R. MEDINA SANTIAGO

Steganography and Steganalysis

Watermarking Moble Phone Color Images With Error Correction Codes

Image Processor. Copyright 18/04/2018 by clive homewood. All Rights Reserved.

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

Digital Watermarking Using 2-DCT

ACEAIT-3055 High-Capacity Steganography Using MRF-Synthesized Cover Images

A DWT Based Steganography Approach

Data Hiding on Text Using Big-5 Code

A Review: A Digital Image Steganography Mrs.M.A.Wakure [1], Mrs.S.A.Wakure [2]

Department of Computer Science and Engineering. CSE 3482 Introduction to Computer Security. Instructor: N. Vlajic Date: Mar 1, 2017

2

Message Security over Image Communication

Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT

Robust DWT Based Technique for Digital Watermarking

A Survey on Digital Image Steganography and Steganalysis

Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography

CHAPTER 3. Digital Carriers of Steganography

ROBUSTNESS TESTING OF SOME WATERMARKING METHODS USING IDCT-II G. Petrosyan 1, H. Sarukhanyan 1, S.Agaian 2, J. Astola 3

Efficient Image Steganography Using Integer Wavelet Transform

EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS

CHAPTER 3 DIFFERENT DOMAINS OF WATERMARKING. domain. In spatial domain the watermark bits directly added to the pixels of the cover

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

International Journal of Advance Research in Engineering, Science & Technology

A Robust Digital Watermarking Scheme using BTC-PF in Wavelet Domain

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

Analysis of Robustness of Digital Watermarking Techniques under Various Attacks

Digital Image Watermarking Using DWT Based DCT Technique

Image Watermarking with Biorthogonal and Coiflet Wavelets at Different Levels

Abstract. Keywords: Semi-fragile watermarking, DCT embedding, Localisation, Restoration

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

An Efficient Watermarking Algorithm Based on DWT and FFT Approach

Current classification and introduction of Watermarking Techniques in Digital Images

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

The Optimized Image Watermarking Using Genetic Algorithm

SCALED WAVELET TRANSFORM VIDEO WATERMARKING METHOD USING HYBRID TECHNIQUE: SWT-SVD-DCT

Watermarking for Security in Database

FPGA IMPLEMENTATION OF INVISIBLE VIDEO WATERMARKING USING DWT TECHNIQUE

Frequency Domain Watermarking: An Overview

Fusion of Digital Signature & Fingerprint Watermarking using Bit plane slicing

Robust Digital Image Watermarking based on complex wavelet transform

DATA HIDING TECHNIQUES IN DIGITAL MULTIMEDIA Girish Kumar BS 1, Prof (Dr) Ajay Rana 2 1 M Tech Scholar Computer Science & Engineering,

SE 4C03 Winter 2004 Steganography. Derek Lunn ( ) Last Revised: April 6th Introduction

LETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration

FRAGILE WATERMARKING USING SUBBAND CODING

Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers

Digital Watermarking with Copyright Authentication for Image Communication

Network Forensics and Covert Channels Analysis in Internet Protocols

A Robust Multiwatermarking Scheme for Multiple Digital Input Images in DWT Domain

Robustness Test of Discrete Cosine Transform Algorithm in Digital Image Watermarking on Android Platform

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Steganography Process- A Review

Transcription:

Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm: (1) algorithm is split in 8x8 pixel squares (2) each square is transformed via DCT to 64 frequency components (3) each DCT coefficient is quantized against a reference table many bits get removed more bits are used for low-freq. and fewer for high-freq. components (human eye is more sensitive to low-freq. info) (4) many coefficients are (now) close in value => run/variable length coding can be used

Image Steganography (cont.) http://www.eetimes.com/document.asp?doc_id=1275437

Image Steganography (cont.) http://medical-dictionary.thefreedictionary.com/function+(disambiguation)

Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) - cont. Possible Approaches to Hiding Data in DCT (A) hide secret data in LSBs of DCT coefficients (B) hide secret data in LSBs of selected or nonsignificant DCT coefficients (frequencies) (B) hide one bit of data in each 8x8 block of DCT: 0 => all coefficients even 1 => all coefficients odd

Image Steganography (cont.) http://www.abbascheddad.net/survey.pdf

http://www.abbascheddad.net/survey.pdf Image Steganography (cont.) Example: Comparison of Different Tools for Image Steganography space frequency encryption random.

Image Steganography (cont.) Example: Comparison of Different Tools for Image Steganography http://www.tr.ietejournals.org/viewimage.asp?img=ietetechrev_2013_30_4_344_116724_t13.jpg

http://www.abbascheddad.net/survey.pdf Image Steganography (cont.) Example: Comparison of Spatial vs. DCT Based Steganography

IMPERCEPTIBILITY ROBUSTNESS Image Steganography (cont.) Magic Triangle of Data Hiding Techniques outlines different goals / trade-off of digital steganography capacity: how much bits can be hidden in a cover image imperceptibility: how easy it is to spot hidden data (security) robustness: hidden message in stego-object unaffected by rotation compression cropping additive noise CAPACITY

EMBEDDING COMPLEXITY Image Steganography (cont.) Additional Requirements on Data Hiding Techniq. secrecy: difficulty to extract/remove hidden information extraction complexity: computational effort to extract hidden information embedding complexity: computational effort to embed hidden information SECURITY CAPACITY EXTRACTION COMPLEXITY IMPERCEPTIBILITY ROBUSTNESS

Image Steganography (cont.) Comprehensive Look at Requirements of Digital Image Steganography Requirements Low High capacity robustness invisibility secrecy embedding complexity extraction complexity

Audio Steganography 3.1) Audio Steganography: Least Significant Bit (LSB) Coding LSB of each audio sample is replaced with a secret bit

Audio Steganography (cont.) 3.2) Audio Steganography: Spread Spectrum secret bit is spread across cover audio in form of noise http://www.sersc.org/journals/ijdta/vol2_no2/1.pdf

Datagram Steganography 4.1) IP Datagram Steganography: Using Identification Field in IP Packet IP Identification Field = 16 bits long - used to uniquely identify an IP packet - useful in case of fragmentation Could Source & Destination Address be used to hide data?! How about Options field?

Datagram Steganography (cont.) 4.2) Datagram Steganography: Using Sequence Number in TCP Packets TCP Sequence Number = 32 bits - keeps track of byte order in payload - useful in payload reassembly

Watermarking Watermarking - Process Components Watermark (W) each owner has a unique watermark Marking Algorithm incorporates the watermark into the image Verification Algorithm determines the integrity/ownership of the image

Watermarking (cont.) Example: Watermarking in Space Domain verification algorithm marking algorithm http://scien.stanford.edu/pages/labsite/2001/ee368/projects2001/dropbox/project06/

Watermarking (cont.) Watermarking - Categories Private vs. Public Private a secret key was used in watermarking process => only authorized users can recover it (can be used by owner to demonstrate ownership once he discovers illicit use) Public anyone can read the watermark (can be used to actually discover all illicit uses e.g., by providing the watermark key to search crawlers)

Watermarking (cont.) Watermarking vs. Steganography key key http://cgi.csc.liv.ac.uk/~leszek/comp526/week4/comp526-3.pdf

Watermarking (cont.) Watermarking - Common Applications verify the owner of a digital object - copyright protection placing a (unique) watermark = placing a (unique) signature Requirements Low High capacity robustness invisibility secrecy embedding complexity extraction complexity

Watermarking (cont.) Watermarking - Common Applications identify illegal theatrical release copies of a movie: watermark prior to release copy control in DVD player Requirements Low High capacity robustness invisibility secrecy embedding complexity extraction complexity

Watermarking (cont.) Watermarking - Other Applications forensics and piracy deterrence http://www.digitalwatermarkingalliance.org/app_forensics.asp

Watermarking (cont.) Watermarking - Other Applications content filtering capacity robustness invisibility secrecy embedding complexity extraction complexity http://www.digitalwatermarkingalliance.org/app_forensics.asp

Digital Fingerprinting Digital Fingerprinting process of embedding unique information for each user- -copy of a digital object in order to be able to identify entities involved in illegal distribution of the digital object if object with Alice s ID is found on Bob s computer => copy is illegal AND likely provided by Alice

Digital Fingerprinting (cont.) requirements of digital fingerprinting Requirements capacity robustness invisibility security embedding complexity extraction complexity Low High

Excellent Book: Digital Watermarking and Steganography By Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton Kalker