Jeff Hinson CS525, Spring 2010

Similar documents
Image Steganography (cont.)

Steganography. Brent McClain Rob Carey

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

Clemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY. BaSoTI 2012, Tartu

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

STEGANOGRAPHY Question Definition. Historical Cases of Steganography. Can we send hidden information?

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

Compression-Compatible Fragile and Semi-Fragile Tamper Detection

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS

Breaking the OutGuess

Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers

Information and Communications Security: Encryption and Information Hiding

Digital Image Steganography Techniques: Case Study. Karnataka, India.

STEGANOGRAPHY: HIDDEN IN PLAIN SIGHT BY: KEVIN R. MEDINA SANTIAGO

Steganography and Steganalysis

Steganography: Hiding Data In Plain Sight. Ryan Gibson

SE 4C03 Winter 2004 Steganography. Derek Lunn ( ) Last Revised: April 6th Introduction

A Review of Approaches for Steganography

A Survey on Digital Image Steganography and Steganalysis

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY

Multimedia Security: So What s the Big Deal?

Webpage: Volume 4, Issue V, May 2016 ISSN

Secret Sharing, Random Numbers, and Information Hiding. Prof. Tom Austin San José State University Spring 2014

International Journal of Advance Research in Engineering, Science & Technology

Topics. Number Theory Review. Public Key Cryptography

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review

Random Image Embedded in Videos using LSB Insertion Algorithm

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

AN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS

Data Hiding in Video

F5 A Steganographic Algorithm

A New Approach to Compressed Image Steganography Using Wavelet Transform

A Survey on An Advanced Approach For Motion Video Steganography Using LSB Technique

Advanced Steganography using Image, Audio and Video as a Cover Media

Steganalysis Techniques: A Comparative Study

A NOVEL METHOD FOR HIDING INFORMATION

Secret Communication through Audio for Defense Application

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES

A Steganography method for JPEG2000 Baseline System

Distributed Steganography

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

Message Security over Image Communication

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Secured Way of Ciphering Text Using Audio Steganography

Architectural Design of Multi Level Steganography System for Data Transmission

Enhancing the Image Compression Rate Using Steganography

The DCT domain and JPEG

A Study on Different JPEG Steganograhic Schemes

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

A General Framework for the Structural Steganalysis of LSB Replacement

Detecting Hidden Information in Images: A Comparative Study

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Improved Qualitative Color Image Steganography Based on DWT

Comparative Analysis of Different Transformation Techniques in Image Steganography

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Steganalysis of Hydan

An introduction to steganography methods

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE

A Hybrid Approach for Detecting Stego Content in Corporate Mail Using Neural Network Based Simplified-Data Encryption Standard Algorithm

Application of Data Hiding in Audio-Video Using Advance Algorithm

Steganography: A Security Model for Open Communication

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm

FPGA IMPLEMENTATION OF INVISIBLE VIDEO WATERMARKING USING DWT TECHNIQUE

Steganography: Applying and Evaluating Two Algorithms for Embedding Audio Data in an Image

Steganography: Dct Coefficient Replacement Method and Compare With JSteg Algorithm

Secret Sharing in Audio Steganography

Steganography Workshop

Comparision in cover media under Stegnography Digital media by Hide and Seek Approach

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING

Peak-Shaped-Based Steganographic Technique for MP3 Audio

Appendix A. Definition of Terms

THE COMBINATION OF WATERMARKING ALGORITHMS FOR MP4 VIDEO

A Novel Information Security Scheme using Cryptic Steganography

Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography

Survey paper - Audio-Video Steganography Using Anti Forensics Technique

Review On Secrete Sharing Scheme for Color Image Steganography

Data Hiding on Text Using Big-5 Code

[Patil* et al., 5(7): July, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

Complex Encryption Methodology Based On Two Level Encryption Technique

Optimizing Image Steganography using Genetic Algorithm

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Image Steganography Method Using Integer Wavelet Transform

Watermarking 3D images and 3D meshes

Searching For Hidden Messages: Automatic Detection of Steganography

A New hybrid method in watermarking using DCT and AES

EFFECTS ON QUALITY IN AUDIO STEGANOGRAPHY HO MAN YEN

A Reversible Data Hiding Scheme for BTC- Compressed Images

Comparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection

Implementation of Random Byte Hiding algorithm in Video Steganography

Keywords: Steganography, Cryptography, Encryption, Data hiding

Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching

Sign-up Sheet posted outside of my office HFH 1121

KEYWORDS: Least Significant Bits(LSB),Discrete Cosine Tranform(DCT),H.264 AVC/SVC. INTRODUCTION Steganography is the science of hiding secret RESULT:

CALIFORNIA STATE UNIVERSITY, NORTHRIDGE APPLICATIONS OF STEGANOGRAPHY

SECURITY ENHANCEMENT: STEGANO-CRYPTO USING CHOAS BASED Sblock EMBEDDING TECHNIQUE

Transcription:

DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010

Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1

Introduction Digital Watermarking is embedding information into a digital signal that is difficult to remove Visible vs. invisible Examples Television (the station mark in a corner) Photos (copyrighting, etc.) Music, videos, movies (to prevent piracy) Applications piracy prevention/copyright infringement Source Tracking Covert Communication / Steganography Jeff Hinson CS525 Slide #2

Challenges Media may be vulnerable to attacks and/or modifications after watermarking Original Medium Embed Watermark Modification or Attack Final Object Minimize the size of the watermark Is the watermark / message still retrievable? Prevent errors during compression/decompression Prevent hackers from just editing out the watermark How to detect tampering? not just retrieving watermark, but telling if someone has changed the original work in any way Jeff Hinson CS525 Slide #3

Algorithms / Methods Steganography: more than just encryption Where cryptography seeks encryption, steganography seeks obscurity Watermark is invisible Hide watermark (i.e., some unique value) into object Seek to hide information in images, audio, and/or video so that you don t know it s there unless you are looking for it Jeff Hinson CS525 Slide #4

Watermarking Images LSB Least Significant Bit Hiding Original pixels: 10110001 and 01100100 Secret Byte: 11001011 New Pixels: 10111100 and 01101011 Easy and effective, but easy to detect DCT Direct Cosine Transformation Recall JPEG compression we use DCT to make multidimensional array of coefficients as we are using DCT to compress, stuff hidden data in Effect and almost impossible to detect, but vulnerable to noise Wavelet Transformation used for higher compression than plausible with DCT same basic idea as DCT add data during compression stage is is still an ongoing research topic Jeff Hinson CS525 Slide #5

Watermarking Audio MIDI Change numeric values of pitches with hidden data Changes are barely noticeable to human ear (at worst) Easy to do, but easy to detect MP3 Similar to DCT and Wavelet: as audio is being compressed, toss some information in and/or control rounding Spread Spectrum Algorithm to add background noise that is barely audible Noise contains the secret information Can be applied to numerous formats, including MP3 (after compression) Jeff Hinson CS525 Slide #6

Watermarking Video Watermarking Video Combination of Image and Audio techniques It all depends on the specific codec For example, H.264 Compression method similar to DCT Control compression process to insert information instead of rounding off Jeff Hinson CS525 Slide #7

Detection Must know what method was used to encode watermark There are too many formats and methods to check every possible method on a single medium Computers not fast enough to check every method Detection is a large concern, and has much research called Steganalysis lots of good papers on steganalysis for audio and still images, but nothing great for video detecting watermark in video is a good topic for future research Jeff Hinson CS525 Slide #8

Existing Programs Image Watermarking / Steganography JSteg <http://www.jsteg.org> QuickCrypto <http://www.quickcrypto.com> VisualWatermark <http://www.visualwatermark.com> Audio MP3Stego <http://www.petitcolas.net> AudioPaint <http://nicolasfournel.com/audiopaint.htm> Video Hermetic Stego <http://www.hermetic.ch> Video Watermark Factory <http://www.videowatermarkfactory.com> Jeff Hinson CS525 Slide #9

Lessons Learned / Conclusion No set way to watermark something General ideas: minutely altering numerical values control rounding of values during compression it all depends on what format/codec you are using no good way to recover info after tampering Detection is near impossible Easy if you know what you are looking for Too many methods and formats to check them all Digital Watermarking is a hot topic Concerns for intellectual property, copyrights, terrorism, source tracking, etc. Jeff Hinson CS525 Slide #10

Questions or Comments?