Steganography: Hiding Data In Plain Sight. Ryan Gibson

Similar documents
Introduction ti to JPEG

INF5063: Programming heterogeneous multi-core processors. September 17, 2010

Multimedia Systems Image III (Image Compression, JPEG) Mahdi Amiri April 2011 Sharif University of Technology

Features. Sequential encoding. Progressive encoding. Hierarchical encoding. Lossless encoding using a different strategy

Digital Image Representation Image Compression

ECE 417 Guest Lecture Video Compression in MPEG-1/2/4. Min-Hsuan Tsai Apr 02, 2013

Steganography. Brent McClain Rob Carey

The DCT domain and JPEG

Jeff Hinson CS525, Spring 2010

An introduction to JPEG compression using MATLAB

DigiPoints Volume 1. Student Workbook. Module 8 Digital Compression

Image Steganography (cont.)

Image Compression Techniques

Image, video and audio coding concepts. Roadmap. Rationale. Stefan Alfredsson. (based on material by Johan Garcia)

Wireless Communication

Compression of Stereo Images using a Huffman-Zip Scheme

CMPT 365 Multimedia Systems. Media Compression - Image

IMAGE COMPRESSION USING FOURIER TRANSFORMS

Data encoding. Lauri Võsandi

JPEG Compression. What is JPEG?

Digital Video Processing

CHAPTER-5 WATERMARKING OF COLOR IMAGES

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Compression Part 2 Lossy Image Compression (JPEG) Norm Zeck

Lecture 8 JPEG Compression (Part 3)

7.5 Dictionary-based Coding

SD 575 Image Processing

Breaking the OutGuess

Digital Image Steganography Techniques: Case Study. Karnataka, India.

LETTER Improvement of JPEG Compression Efficiency Using Information Hiding and Image Restoration

Compression II: Images (JPEG)

Computer Vision 2. SS 18 Dr. Benjamin Guthier Professur für Bildverarbeitung. Computer Vision 2 Dr. Benjamin Guthier

Towards copy-evident JPEG images

A New Approach to Compressed Image Steganography Using Wavelet Transform

IMAGE COMPRESSION. Image Compression. Why? Reducing transportation times Reducing file size. A two way event - compression and decompression

Robert Matthew Buckley. Nova Southeastern University. Dr. Laszlo. MCIS625 On Line. Module 2 Graphics File Format Essay

Ian Snyder. December 14, 2009

COLOR IMAGE COMPRESSION USING DISCRETE COSINUS TRANSFORM (DCT)

Lecture 5: Compression I. This Week s Schedule

Enhancing the Image Compression Rate Using Steganography

Binary representation and data

Forensic analysis of JPEG image compression

Image Steganography Technique By Using Braille Method of Blind People (LSBraille)

Watermarking Moble Phone Color Images With Error Correction Codes

Lecture 8 JPEG Compression (Part 3)

Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography

Index. 1. Motivation 2. Background 3. JPEG Compression The Discrete Cosine Transformation Quantization Coding 4. MPEG 5.

Interframe coding A video scene captured as a sequence of frames can be efficiently coded by estimating and compensating for motion between frames pri

Introduction to Computer Science (I1100) Data Storage

Digital Image Processing

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

POISON PIXELS: COMBATTING IMAGE STEGANOGRAPHY IN CYBERCRIME

2.2: Images and Graphics Digital image representation Image formats and color models JPEG, JPEG2000 Image synthesis and graphics systems

Lossy compression CSCI 470: Web Science Keith Vertanen Copyright 2013

DTC-350. VISUALmpeg PRO MPEG Analyser Software.

Nios II Embedded Electronic Photo Album

15 Data Compression 2014/9/21. Objectives After studying this chapter, the student should be able to: 15-1 LOSSLESS COMPRESSION

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Digital Image Representation. Image Representation. Color Models

Open Access Side-Informed Image Watermarking Scheme Based on Dither Modulation in the Frequency Domain

Application of Data Hiding in Audio-Video Using Advance Algorithm

Chapter 1. Digital Data Representation and Communication. Part 2

JPEG Modes of Operation. Nimrod Peleg Dec. 2005

Redundant Data Elimination for Image Compression and Internet Transmission using MATLAB

AN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS

ROI Based Image Compression in Baseline JPEG

Motivation. Gray Levels

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016

Motivation. Intensity Levels

JPEG 2000 compression

MPEG-4: Simple Profile (SP)

Image and Video Watermarking

06/12/2017. Image compression. Image compression. Image compression. Image compression. Coding redundancy: image 1 has four gray levels

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

FPGA Implementation of 2-D DCT Architecture for JPEG Image Compression

Steganography and Steganalysis

Multimedia Signals and Systems Still Image Compression - JPEG

VC 12/13 T16 Video Compression

CISC 7610 Lecture 3 Multimedia data and data formats

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

A Image Comparative Study using DCT, Fast Fourier, Wavelet Transforms and Huffman Algorithm

Lecture 3 Image and Video (MPEG) Coding

A Review of Approaches for Steganography

Overview Of Techniques Of Stegnography On Various Media

Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

CHAPTER-4 WATERMARKING OF GRAY IMAGES

A Digital Video Watermarking Algorithm Based on LSB and DCT

An introduction to steganography methods

compression and coding ii

Professor Laurence S. Dooley. School of Computing and Communications Milton Keynes, UK

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

Steganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram

Copyright Detection System for Videos Using TIRI-DCT Algorithm

An Empirical Study of Machine Learning Techniques Applied to image Watermarking.

2014 Summer School on MPEG/VCEG Video. Video Coding Concept

Data Hiding in Video

From Wikipedia, the free encyclopedia

Lecture Coding Theory. Source Coding. Image and Video Compression. Images: Wikipedia

Transcription:

Steganography: Hiding Data In Plain Sight Ryan Gibson

What Is Steganography? The practice of concealing messages or information within other nonsecret text or data. Comes from the Greek words steganos ( covered, concealed, or protected ) and graphein ( writing ). Essentially, hiding data within data.

General Techniques Digital steganographic techniques mainly fall into two categories: Alteration of numeric representations of data. Overlay data or patterns on top of carrier file in the hopes that it can be recovered later.

EURion Constellation Pattern of circles incorporated into ~5 countries' banknotes since 1996. Added to help imaging software detect the presence of banknotes in digital images to combat counterfeiting. Discovered in 22 when Marcus Kuhn's printer refused to print banknotes.

EURion Constellation Examples

Printer Steganography Color laser printers (and some monochrome ones) tile a pattern of small yellow dots across printed pages. Intended to produce minimal visible change to the printout, ideally being imperceptible to the naked eye.

Xerox DocuColor printers 1x Magnification Under blue light

World Of Warcraft ( World Of Watermarks ) User ID Time of screenshot capture Client version IP address of the server Implemented by Digimarc Sells steganographic methods to combat piracy, copyright infringement, etc.

Least Signicant Bit Steganography: What's In A Bitmap Image? Grid of pixels, squares of color represented by integers for the red, green, and blue color components. These are 8-bit integers and thus range from 255.

Bitmap Example 64 112 174 66 112 172 7 114 177 68 112 175 72 112 171 75 112 167 82 114 165 99 122 164 119 133 159 153 157 168 18 186 186 29 21 24 22 219 215 228 228 216 232 23 217 236 234 222 27,26,25,24,23,22,21,2 (1111, 11111, 11111)

Least Significant Bit Steganography R = 255 = 11111111 R = 254 = 1111111 (Previous Images Superimposed) Based on the fact that we can't differentiate between small color differences. Altering the least significant bits of a color channel won't make a noticeable difference. We can hide a binary string in the LSBs of consecutive color channels.

LSB Steganography (Hypothetical) Example We want to hide the binary string 11. (R, G, B) = (, 163, 233) 1111 11111 1 111 11111 (R, G, B) = (1, 162, 233) Change LSBs Old Pixel New Pixel

How Many Bits To Use? We replace a percentage of the image's data, but lose much less color information. 1 LSB: Replace 12.5% Lose ~.4% 2 LSBs: Replace 25.% Lose ~1.2% 3 LSBs: Replace 37.5% Lose ~2.75% 4 LSBs: Replace 5.% Lose ~5.88% 5 LSBs: Replace 62.5% Lose ~12.16% 6 LSBs: Replace 75.% Lose ~24.71% 7 LSBs: Replace 82.5% Lose ~49.8% 8 LSBs: Replace 1.% Lose ~1%

LSB Steganography Example (Original)

LSB Steganography Example (Steganographed)

The Steganographed Image Contains: The Complete Works of William Shakespeare 37 plays, 154 sonnets 124,788 lines of text 1,4,56 words Image Resolution: 192x18

Other Examples Using 2 LSBs: Twitter Profile Picture (4x4) We can hide: 12, Bytes ~117.19 KiB 18p Desktop Background (192x18) We can hide: 1,555,2 Bytes ~1.48 MiB NASA Image of Pluto (8x8) We can hide: 48,, Bytes ~45.78 MiB Panorama of Milky Way (1672x6568) We can hide: 82,274,52 Bytes ~78.46 MiB

Detecting LSB Steganography LSB Steganography depends on altering the LSBs of each color value. We can isolate these LSBs and display them alone through linear normalization. This is called a visual attack.

Example Original LSBs of Original LSBs of Steganographed Version

Example (Original Image)

Example Non-Steganographed (2 LSBs)

Example Steganographed (2 LSBs)

JPEG Images Much more popular on the internet than.png or.bmp images. Lossy compression when saving an image, the output is different than the input. Least Significant Bit Steganography no longer works.

Discrete Cosine Transform Steganography: JFIF (JPEG) Compression Image Color Transform JPEG Compression relies on two basic assumptions: We see differences in intensity (grayscale) much better than differences in color. We don't see high frequency (rapid and repeated) changes in intensity/color well either. Discrete Cosine Transform Quantization Encoding JPEG

Discrete Cosine Transform Steganography: JFIF (JPEG) Compression Image Separate color and grayscale components JPEG Compression relies on two basic assumptions: We see differences in intensity (grayscale) much better than differences in color. We don't see high frequency (rapid and repeated) changes in intensity/color well either. Approximate patterns using cosine waves Remove data that only slightly affects the image Further compression JPEG

Color Transform Convert image from RGB to YCbCr. Y = Luminance, Intensity Cb = Chroma Blue Cr = Chroma Red

Color Transform (Downsampling) To save space, we can downsample the chrominance components of our image. Normally downsample by a factor of 4. Most people won't be able to see too much of a difference. Original 25x Less Color

Color Transform (Downsampling) Y unchanged Cb downsampled Cr downsampled

Discrete Cosine Transform In general, we represent a sequence of data points as the sum of weighted cosine waves. n data points can be represented by n cosine waves of different frequencies.

Discrete Cosine Transform We split a JFIF image into 8x8 squares and apply DCT separately for each one. We have 64 data points (8x8 pixels), so we can represent them with 64 weighted cosine waves.

Discrete Cosine Transform (Example) Get values 62 55 55 54 49 48 47 55 62 57 54 52 48 47 48 53 61 6 52 49 48 47 49 54 63 61 6 6 63 65 68 65 67 67 7 74 79 85 91 92 82 95 11 16 114 115 112 117 96 111 115 119 128 128 13 127 19 121 127 133 139 141 14 133 Input block -66-73 -73-74 -79-8 -81-73 -66-71 -74-76 -8-81 -8-75 -67-68 -76-79 -8-81 -79-74 -65-67 -68-68 -65-63 -6-63 -61-61 -58-54 -49-43 -37-36 -46-33 -27-22 -14-13 -16-11 -32-17 -13-9 2-1 -19-7 11 13 12 5-1 5 Shifted Block Shift values down by 127 to center them around (like a cosine wave)

Discrete Cosine Transform (Example) -37-29.7-2.6-2.5-1.1-3.7-1.5 -.8-231 44.9 24.5 -.3 9.3 3.9 4.3-1.4 62.8 8.5-7.6-2.7.3 -.4.5 -.8 12.5-14.6-3.5-3.4 2.4-1.3 2.7 -.4-4.9-3.9.9 3.6.1 5.1 1.1.5 -.5 3.1-1.4.2-1.1-1.5-1.1.9 4.4 2.3-1.7-1.6 1.1-2.7 1.1 1.4-1.2-1.8 5.9 -.4.3.4-1 DCTII Coefficients (range from -124 to 124) -66-73 -73-74 -79-8 -81-73 -66-71 -74-76 -8-81 -8-75 -67-68 -76-79 -8-81 -79-74 -65-67 -68-68 -65-63 -6-63 Apply DCTII -61-61 -58-54 -49-43 -37-36 -46-33 -27-22 -14-13 -16-11 -32-17 -13-9 2-1 -19-7 11 13 12 5-1 5 Shifted Block

Quantization We can remove some of the smaller DCT coefficients to save more space. High frequency cosine waves (near the bottom right of the table) are not seen by the eye well and can be removed as well. We divide each coefficient by the corresponding quantization value and round to the nearest integer. 16 12 14 14 18 24 49 72 11 12 13 17 22 35 64 92 1 14 16 22 37 55 78 95 16 19 24 29 56 64 87 98 24 26 4 51 68 81 13 112 4 58 57 87 19 14 121 1 51 6 69 8 13 113 12 13 61 55 56 62 77 92 11 99 Standard Y JPEG quantization table for 5% quality

Discrete Cosine Transform (Example) -37-29.7-2.6-2.5-1.1-3.7-1.5 -.8 16 12 14 14 18 24 49 72-231 44.9 24.5 -.3 9.3 3.9 4.3-1.4 11 12 13 17 22 35 64 92 62.8 8.5-7.6-2.7.3 -.4.5 -.8 1 14 16 22 37 55 78 95 12.5-14.6-3.5-3.4 2.4-1.3 2.7 -.4 16 19 24 29 56 64 87 98-4.9-3.9.9 3.6.1 5.1 1.1.5 24 26 4 51 68 81 13 112 -.5 3.1-1.4.2-1.1-1.5-1.1.9 4 58 57 87 19 14 121 1 4.4 2.3-1.7-1.6 1.1-2.7 1.1 1.4 51 6 69 8 13 113 12 13-1.2-1.8 5.9 -.4.3.4-1 61 55 56 62 77 92 Quantization Table DCTII Coefficients (range from -124 to 124) -23-2 -21 4 2 6 1 1-1 Quantized Table 11 99

Retrieving the Image Image Color Transform DCT III (Inverse DCT) Multiply by Quantization Table Decoding JPEG

Input Image (Example)

Output Image (Example)

DCT Steganography We can hide data in the least significant bits of the values in the quantized tables. In practice, we don't alter the value in the upperleft corner (the DC coefficient) or any values that are or 1. -23-2 -21 4 2 6 1 1-1 Quantized Table

DCT Steganography Example

DCT Steganography Example

Other Examples (Images Converted to JPEG, 9% Quality) Twitter Profile Picture (4x4) We can hide: 39 Bytes ~.3 KiB 18p Desktop Background (192x18) We can hide: 28,955 Bytes ~28.28 KiB NASA Image of Pluto (8x8) We can hide: 778,313 Bytes ~76.7 KiB Panorama of Milky Way (1672x6568) We can hide: 2,791,778 Bytes ~2.66 MiB

Detecting DCT Steganography The method is robust to visual attack, but A histogram of the DCT coefficients in an image will normally be fairly symmetric about. Simple steganographic techniques will cause an image to deviate from this pattern. Analysis of this symmetry can usually estimate the percentage of the image used for data embedding within ~1%. DCT Coefficients of unaltered JPEG DCT Coefficients of steganographed JPEG

Detecting DCT Steganography In unaltered JPEG compression, rapid changes in color/intensity distort nearby pixels in a predictable manner. A chi-square test will tell us the probability of an image deviating from this expectation and the probability of the presence of embedded data. Accuracy depends on the significance level used. Lower significance levels result in more false negatives. Higher significance levels result in more false positives.

Extension to Audio Similar to images, audio files are composed of a series of integers representing amplitude at any given time. These integers can be represented as binary strings for Least Significant Bit embedding.

Questions?