OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

Similar documents
A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Image Steganography (cont.)

Steganography. Brent McClain Rob Carey

Jeff Hinson CS525, Spring 2010

Breaking the OutGuess

STEGANOGRAPHY Question Definition. Historical Cases of Steganography. Can we send hidden information?

APPLICATIONS OF DATA HIDING IN DIGITAL IMAGES

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Clemens H. Cap Universität Rostock clemens.cap (at) uni-rostock (dot) de STEGANOGRAPHY. BaSoTI 2012, Tartu

Nathanaël COTTIN 14/05/2010 Hide secret information within innocuous carriers

Information and Communications Security: Encryption and Information Hiding

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

Multimedia Security: So What s the Big Deal?

AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

Random Image Embedded in Videos using LSB Insertion Algorithm

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

Smart Data Encryption And Transfer : Steganographic tool for hiding data A JAVA based open source application program

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review

EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS

A Hybrid Approach for Detecting Stego Content in Corporate Mail Using Neural Network Based Simplified-Data Encryption Standard Algorithm

LSB Based Audio Steganography Using Pattern Matching

Sign-up Sheet posted outside of my office HFH 1121

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

Webpage: Volume 4, Issue V, May 2016 ISSN

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE

A Novel Information Security Scheme using Cryptic Steganography

Image and Video Watermarking

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Adaptive data hiding based on VQ compressed images

A Review: A Digital Image Steganography Mrs.M.A.Wakure [1], Mrs.S.A.Wakure [2]

CHAPTER-4 WATERMARKING OF GRAY IMAGES

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY

A Steganography method for JPEG2000 Baseline System

Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm

A New Approach to Compressed Image Steganography Using Wavelet Transform

Data Hiding in Video

KEYWORDS: Least Significant Bits(LSB),Discrete Cosine Tranform(DCT),H.264 AVC/SVC. INTRODUCTION Steganography is the science of hiding secret RESULT:

Optimizing Pixel Predictors for Steganalysis

Architectural Design of Multi Level Steganography System for Data Transmission

Combined Hashing/Watermarking Method for Image Authentication

Application of Data Hiding in Audio-Video Using Advance Algorithm

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Tampering Detection in Compressed Digital Video Using Watermarking

Shubha Dubey Dept. of computer science) Radharaman institute of technology and science bhopal, india

Reversible Data Hiding in Colour Images using AES Data Encryption System

Compression-Compatible Fragile and Semi-Fragile Tamper Detection

Steganalysis Techniques: A Comparative Study

Appendix A. Definition of Terms

A Study on Different JPEG Steganograhic Schemes

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

FPGA IMPLEMENTATION OF INVISIBLE VIDEO WATERMARKING USING DWT TECHNIQUE

An introduction to steganography methods

A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography

Image Steganography Method Using Integer Wavelet Transform

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

A Robust Audio Steganographic Technique based on Phase Shifting and Psycho acoustic Persistence of Human Hearing Ability

Steganography and Steganalysis

Lecture 8. (Part 2.) Digital watermarks. Models of WM and classification :

A NOVEL METHOD FOR HIDING INFORMATION

Hiding Data in Wave Files

SECURITY ENHANCEMENT: STEGANO-CRYPTO USING CHOAS BASED Sblock EMBEDDING TECHNIQUE

STEGANOGRAPYH FOR HIDING MESSAGE INTO MP3 FILE

Filtering. -If we denote the original image as f(x,y), then the noisy image can be denoted as f(x,y)+n(x,y) where n(x,y) is a cosine function.

Data Hiding on Text Using Big-5 Code

Biometric Data Hiding: A 3 Factor Authentication Approach to Verify Identity with a Single Image Using Steganography, Encryption and Matching

Implementation of Random Byte Hiding algorithm in Video Steganography

GENETIC ALGORITHM BASED SUBSTITUTION TECHNIQUE OF IMAGE STEGANOGRAPHY

Secret Communication through Audio for Defense Application

Topics. Number Theory Review. Public Key Cryptography

A Survey on Digital Image Steganography and Steganalysis

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

THE COMBINATION OF WATERMARKING ALGORITHMS FOR MP4 VIDEO

CHAPTER-6 WATERMARKING OF JPEG IMAGES

Steganalysis of Hydan

CSC 474/574 Information Systems Security

Information Cloaking Technique with Tree Based Similarity

CALIFORNIA STATE UNIVERSITY, NORTHRIDGE APPLICATIONS OF STEGANOGRAPHY

Steganography: A Security Model for Open Communication

Towards a Telltale Watermarking Technique for Tamper-Proofing

Secret Sharing in Audio Steganography

COMPARISON BETWEEN TWO WATERMARKING ALGORITHMS USING DCT COEFFICIENT, AND LSB REPLACEMENT

Steganography: Applying and Evaluating Two Algorithms for Embedding Audio Data in an Image

Overview Of Techniques Of Stegnography On Various Media

An Enhanced Edge Adaptive Steganography Approach using Threshold Value for Region Selection

Steganography Workshop

Performance Evaluation of LSB based Steganography for optimization of PSNR and MSE

A Reversible Data Hiding Scheme For JPEG Images

A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques

A Multi-Algorithm, High Reliability, Extensible Steganalyzer Using Services Oriented Architecture

International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 5, Sep - Oct 2016

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES

Comparative Analysis of Different Transformation Techniques in Image Steganography

QR-Code Image Steganography

ELE 201, Spring 2014 Laboratory No. 4 Compression, Error Correction, and Watermarking

Conventional Protection Mechanisms in File Systems

Transcription:

OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting secret messages through innocuous cover carriers in such a manner that the existence of the embedded messages is undetectable Carriers can be audio, video, text, or any other digitally represented code or transmission The hidden message may be plaintext, ciphertext, or anything that can be represented as a bit stream 2

The Need for Data Hiding Covert communication using images (secret message is hidden in a carrier image) Ownership of digital images, authentication, copyright Data integrity, fraud detection, self-correcting images Traitor-tracing (fingerprinting video-tapes) Adding captions to images, additional information, such as subtitles, to video, embedding subtitles or audio tracks to video (video-in-video) Intelligent browsers, automatic copyright information, viewing a movie in a given rated version Copy control (secondary protection for DVD) 3

Requirements Application Covert communication Copyright protection of images (authentication) Fingerprinting (traitor-tracing) Adding captions to images, additional information, such as subtitles, to videos Image integrity protection (fraud detection) Copy control in DVD capacity robustness invisibility security embedding complexity detection complexity Intelligent browsers, automatic copyright information, viewing movies in given rated version Low Requirements High 4

Data Hiding - Definition Key Secret message Secret message Carrier document Embedding algorithm Transmission via network Detector Key Relationship carrier - message Who extracts the message? (source versus destination coding) How many recipients are there? Is the key a public knowledge or a shared secret? Do we embed different messages into one carrier? Embedding / detection bundled with a key in a tamper-proof hardware? Is the speed of embedding / detection important? 5

Properties of hiding schemes Robustness The ability to extract hidden information after common image processing operations: linear and nonlinear filters, lossy compression, contrast adjustment, recoloring, resampling, scaling, rotation, noise adding, cropping, printing / copying / scanning, D/A and A/D conversion, pixel permutation in small neighborhood, color quantization (as in palette images), skipping rows / columns, adding rows / columns, frame swapping, frame averaging (temporal averaging), etc. Undetectability Impossibility to prove the presence of a hidden message. This concept is inherently tied to the statistical model of the carrier image. The ability to detect the presence does not automatically imply the ability to read the hidden message. Undetectability should not be mistaken for invisibility a concept related to human perception. Invisibility Perceptual transparency. This concept is based on the properties of the human visual system or the human audio system. Security The embedded information cannot be removed beyond reliable detection by targeted attacks based on a full knowledge of the embedding algorithm and the detector (except a secret key), and the knowledge of at least one carrier with hidden message. 6

The Magic Triangle Capacity Naïve steganography There is a trade-off between capacity, invisibility, and robustness Secure steganographic techniques Digital watermarking Undetectability Robustness Additional factors: Complexity of embedding / extraction Security 7

Steganography for RGB images LSB Encoding (Least Significant Bit) Method: Replace the LSB of each pixel with the secret message Pixels may be chosen randomly according to a secret key Pixels may be chosen adaptively according to neighborhood Message should always be encrypted Comments: The simplest and most common steganographic technique Premise = changes to the least significant bit will be masked by noise commonly present in digital images. Color images provide more room for hiding messages If more than one LSB is used, statistically detectable changes may result A provably secure method should introduce changes consistent with the noise model 8

OTP Steg [Encrypt] 9

OTB Steg [Decrypt] 10

OTP Steg [Generate Keys] 11

12

XOR - "one or the other but not both" XOR Truth Table Input A B Output 0 0 0 0 1 1 1 0 1 1 1 0 13

XOR 14

Decryption XOR Process 15

Adaptive Steganography Non-adaptive steganography = modifications due to message embedding are uncorrelated with image features. Examples are LSB encoding in randomly selected pixels, modulation of randomly selected frequency bins in a fixed band, etc. Adaptive steganography = modifications are correlated with the image content (features). - Pixels carrying message bits are selected adaptively depending on the image - Avoiding areas of uniform color - Selecting pixels with large local standard deviation Potential problem with message recovery: We have to be able to extract the same set of message carrying pixels at the receiving end from the modified image. 16

Artifacts caused by nonadaptive methods Artifacts around the Julia set. Artifacts in the fonts. 17

Adaptive block embedding Message embedding Divide the image into disjoint 3 3 blocks Randomly choose blocks and evaluate some loc statistical quantity, such as standard deviation o number of colors and decide whether or not a message bit can be embedded (good vs. bad bl If block is bad, skip it and do not insert message If block is good, insert the bit into the block parit If after embedding the block becomes bad, keep the change but repeat the same message bit in next block Message extraction Generate the same random walk through the image blocks Read the parity from all good blocks 18

Limitations Ultimately, image understanding is important for secure adaptive steganography. A human can easily recognize that a pixel is actually a dot above the letter "i" and must not be changed. However, it would be very hard to write a computer program capable of making such intelligent decisions in all possible cases. Example of a difficult area for secure adaptive message embedding - fonts on a complex background 19

Performance example Test image in JPEG format Original Non-adaptive Adaptive 20

Steganalysis Modern steganography s goal is to keep its mere presence undetectable, but steganographic systems, because of their invasive nature, leave behind detectable traces in the cover medium. Even if secret content is not revealed, the existence of it is there. The process of finding these distortions is called statistical steganalysis 21

HUGO (Highly Undetectable stego) - B.O.S.S. http://agents.fel.cvut.cz/boss/index.php?mode=view&t mpl=home 22