Compression-Compatible Fragile and Semi-Fragile Tamper Detection

Similar documents
Jeff Hinson CS525, Spring 2010

Steganography. Brent McClain Rob Carey

Breaking the OutGuess

Part II Authentication Techniques

Sign-up Sheet posted outside of my office HFH 1121

Information and Communications Security: Encryption and Information Hiding

Image Steganography (cont.)

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

Multimedia Security: So What s the Big Deal?

SECURE SEMI-FRAGILE WATERMARKING FOR IMAGE AUTHENTICATION

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

Program Integrity: Why Worry?

A Novel Fast Self-restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression

Steganography and Steganalysis

A Steganography method for JPEG2000 Baseline System

Enhancing the Image Compression Rate Using Steganography

A Novel Method for Compressing Encrypted Images using Auxiliary Information

Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching

Abstract. Keywords: Semi-fragile watermarking, DCT embedding, Localisation, Restoration

Image Authentication and Recovery Scheme Based on Watermarking Technique

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

An introduction to steganography methods

J2: REFINEMENT OF A TOPOLOGICAL IMAGE STEGANOGRAPHIC METHOD

FRAGILE WATERMARKING USING SUBBAND CODING

JPEG decoding using end of block markers to concurrently partition channels on a GPU. Patrick Chieppe (u ) Supervisor: Dr.

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

COMPARISONS OF DCT-BASED AND DWT-BASED WATERMARKING TECHNIQUES

The DCT domain and JPEG

Bit-Plane Decomposition Steganography Using Wavelet Compressed Video

Webpage: Volume 4, Issue V, May 2016 ISSN

DIGITAL watermarking technology is emerging as a

EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS

PROTECTION OF WAVELET-BASED WATERMARKING SYSTEMS USING FILTER PARAMETRIZATION

Data Hiding in Video

Steganography and Steganalysis of JPEG Images

A Crypto Signature Scheme for Image Authentication over Wireless Channel

Modern Steganalysis Can Detect YASS

Keywords: Steganography, Cryptography, Encryption, Data hiding

A Robust Watermarking Algorithm For JPEG Images

Alpha-trimmed Image Estimation for JPEG Steganography Detection

A Robust Image Watermarking Scheme using Image Moment Normalization

Combined Hashing/Watermarking Method for Image Authentication

Optimizing Pixel Predictors for Steganalysis

Algorithm for a robust Message Authentication

Current classification and introduction of Watermarking Techniques in Digital Images

Robust Lossless Data Hiding. Outline

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

Frequency Domain Watermarking: An Overview

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

A Study on Different JPEG Steganograhic Schemes

GENETIC ALGORITHM BASED SUBSTITUTION TECHNIQUE OF IMAGE STEGANOGRAPHY

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Survey on Digital Image Steganography and Steganalysis

Data hiding technique in JPEG compressed domain

Watermarking Moble Phone Color Images With Error Correction Codes

F5 A Steganographic Algorithm

No Reference Medical Image Quality Measurement Based on Spread Spectrum and Discrete Wavelet Transform using ROI Processing

A Reversible Data Hiding Scheme For JPEG Images

Tampering Detection in Compressed Digital Video Using Watermarking

KEYWORDS: Least Significant Bits(LSB),Discrete Cosine Tranform(DCT),H.264 AVC/SVC. INTRODUCTION Steganography is the science of hiding secret RESULT:

BLIND EXTRACTION OF HIDDEN DATA FROM DIGITAL IMAGE USING M-IGLS ALGORITHM

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

BLIND MEASUREMENT OF BLOCKING ARTIFACTS IN IMAGES Zhou Wang, Alan C. Bovik, and Brian L. Evans. (

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

Robust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review

Robustness Test of Discrete Cosine Transform Algorithm in Digital Image Watermarking on Android Platform

A Case study on Steganography and its Attacks

A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography

Digital watermarking techniques for JPEG2000 scalable image coding

Searching For Hidden Messages: Automatic Detection of Steganography

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

CHAPTER-4 WATERMARKING OF GRAY IMAGES

A SEMI-FRAGILE WATERMARKING SCHEME FOR IMAGE TAMPER LOCALIZATION AND RECOVERY

A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash Function

A Novel Information Security Scheme using Cryptic Steganography

Towards a Telltale Watermarking Technique for Tamper-Proofing

Perceptible Content Retrieval in DCT Domain and Semi-Fragile Watermarking Technique for Perceptible Content Authentication

SELF-AUTHENTICATION OF NATURAL COLOR IMAGES IN PASCAL TRANSFORM DOMAIN. E. E. Varsaki, V. Fotopoulos and A. N. Skodras

A Hybrid Approach for Detecting Stego Content in Corporate Mail Using Neural Network Based Simplified-Data Encryption Standard Algorithm

Steganography in Multiple Data: Review

Improvements on Image Authentication and Recovery Using Distributed Source Coding

Implementation of Random Byte Hiding algorithm in Video Steganography

A Survey of Fragile Watermarking-based Image Authentication Techniques

Block Mean Value Based Image Perceptual Hashing for Content Identification

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Digital Watermarking Algorithm for Embedding Color Image using Two Level DWT

A DWT and DCT based Hybrid Approach for Audio Watermarking

Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack

IMAGE WATERMARKING AND ITS HARDWARE REALIZATION: A SURVEY

Image and Video Watermarking

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

Attack Detection in Watermarked Images with PSNR and RGB Intensity

Steganography: Hiding Data In Plain Sight. Ryan Gibson

7 MULTIMEDIA AUTHENTICATION

A Robust and Secure Media Signature Scheme for JPEG Images

H.264/AVC video authentication using skipped macroblocks for an erasable watermark

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

Transcription:

Compression-Compatible Fragile and Semi-Fragile Tamper Detection Lisa M. Marvel George W. Hartwig, Jr. Charles Boncelet, Jr. Presentation by Peter Macko

Motivation Direct Applications Establishing credibility of the image Tracking small changes to the image Contribution of the Paper Fragile watermark, which detects any modification of the image Semi-fragile watermark, which detects only significant modifications, ignoring lossy compression and noisy channels

Basic Idea Embed a specially crafted watermark to the image using some steganographic method Use the watermark (both its presence and its content) to check whether any changes were made to the image after the watermark was embedded

Fragile Tamper Detection Any change to the image will either: Destroy the watermark Be detectable using the information embedded in the watermark The watermark consists of a cryptographic hash embedded to several random blocks of the image using Stego-JPEG

Embedding the Watermark Algorithm: 1. Choose N random blocks of the image (remember the seed) 2. Compute cryptographic hash of the other blocks 3. Embed the hash into the N blocks

Tamper Detection Algorithm: 1. Using the same seed as in the watermarking stage (key), find the N blocks containing the hash 2. Compute the hash of the other blocks 3. Compare the hashes

Practical Issues If the hash is strong enough (such as MD5 or MAC), the probability that the hash of the image is not changed by tampering is extremely small (about 2-128 for MD5) The person tampering with the image does not know the seed, without which the watermark cannot be updated to reflect the changes

Stego-JPEG Stego-JPEG is a natural choice of the embedding algorithm for DCT compressed images Embeds one bit per one DCT block without practically any loss of visual quality

Stego-JPEG Embedding (1) To embed bit b to block Z: 1. Choose the DCT coefficient closest to the midpoint between two quantization levels Change to this coefficient results in smallest degradation of visual quality DCT Coefficients 689-768 248 52 54-123 108-43 Quantized 43.1-64.0 15.5 1.8 0.8-1.2 0.9 0.43 Rounded 43-64 16 2 1-1 1 0 Closest to the midpoint between two quantization levels

Stego-JPEG Embedding (2) To embed bit b to block Z: 2. Change the parity of the coefficient to make the parity of the sum of the coefficients to match the parity of b DCT Coefficients 689-768 248 52 54-123 108-43 Quantized 43.1-64.0 15.5 1.8 0.8-1.2 0.9 0.43 Rounded 43-64 16 2 1-1 1 0 Sum of the Coefficients = 2 b = 0 b = 1 16 Sum = 2 (parity 0) 15 Sum = 1 (parity 1)

Stego-JPEG Decoding 1. Compute the sum of the DCT coefficients within the given block 2. The parity of the sum is the embedded bit

Semi-Fragile Tamper Detection The watermark is not destroyed by lossy compression or additive noise Large changes will destroy the watermark Smaller changes can be detected using the embedded thumbnail Very small changes will not be detected A thumbnail of the image is embedded using an error-resilient stego-technique

Embedding the Watermark Algorithm: 1. Create the thumbnail of the image 2. Embed the thumbnail using Spread Spectrum Image Stegonagraphy (SSIS) SSIS Add Thumbnail 0xCAFEBABE Secret Key SSIS Gaussian Pseudo-Noise Cover Image

Tamper Detection Algorithm: 1. Decode the thumbnail 2. Create a new thumbnail of the image 3. Compare the two thumbnails Thumbnail of a Tampered Image Decoded Thumbnail (of the original image) Absolute Difference

Spread Spectrum Image Steganography (SSIS) An error-resilient steganographic method Can embed long messages with none to small loss of visual quality Resistant to small modification of the image, lossy compression, and additive noise Resistant to JPEG compression up to quality level 80

SSIS: Embedding Cover Image Stego Image 101100100110111 Encrypted Message 0xCAFEBABE Secret Key Error Codes Pseudo-Random Noise Modulated Signal 2D Interleaved Signal

SSIS: Decoding 101100100110111 Original Message Stego Image Alpha Trimming Difference ECC Decoder 111101010111011 Restored Message Restored Image 0xCAFEBABE Secret Key Restored Signal Pseudo-Random Noise

Fragile Watermarks Conclusion Detects any change to the image Constructed using cryptographic hashes Embedded using a block-based steganographic method Semi-Fragile Watermarks Detects only significant manipulations Constructed using thumbnails Embedded using an error-resilient spread- spectrum steganographic method