A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf (10-09-5015) Sushil sharma (10-09-5019)

Slides:



Advertisements
Similar presentations
Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Information Hiding: Watermarking and Steganography
Chapter 3 Reusing a Presentation and Adding Media and Animation
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Spread Spectrum Steganography Nick Sterling Sarah Wahl Sarah Summers.
Spread Spectrum Steganography
Steganography Rayan Ghamri.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
1 Advanced PowerPoint Cliff Solomon. 2 Presentation Outline Inserting Movies and Animations Into Your Presentations Using Progressive Disclosures and.
PowerPoint Lesson 2 Creating and Enhancing PowerPoint Presentations
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall. Microsoft Office 2010 PowerPoint, Workshop 3 Applying and Modifying Multimedia.
XP New Perspectives on Integrating Microsoft Office XP Tutorial 1 1 Integrating Microsoft Office XP Tutorial 1 – Integrating Word and Excel.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
PowerPoint Lesson 5 Editing and Formatting Slide Content Microsoft Office 2010 Advanced Cable / Morrison 1.
Working with Layouts and Graphics. 1. The layout of a slide can be changed at any time during the creation of the presentation. 2. Various types of slide.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Lesson 17 Enhancing Presentations with Multimedia Effects
Steganography detection Roland Cmorik, Martin Šumák.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
A Method for Protecting Digital Images from Being Copied Illegally Chin-Chen Chang, Jyh-Chiang Yeh, and Ju-Yuan Hsiao.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Digital Steganography
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
© Cheltenham Computer Training 2002 Microsoft PowerPoint Slide No 1 Microsoft PowerPoint 2002 Intermediate Level Course.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Advances in digital image compression techniques Guojun Lu, Computer Communications, Vol. 16, No. 4, Apr, 1993, pp
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Preset and custom animation
POWERPOINT 101. TRANSITIONS  This is used to create an entrance to the next slide  Choose the Transition  Choose a Sound and the Duration  Choose.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1 Committed to Shaping the Next Generation of IT Experts. Chapter 4: Enhancing with.
PowerPoint Notes Mrs. Raynor Computer Apps Slide Titles All slides MUST have a title Gives a clue to what the slide is about Use title case Comes in.
Chapter 1. SIGNAL PROCESSING:  Signal processing is concerned with the efficient and accurate extraction of information in a signal process.  Signal.
Animating Objects in PowerPoint XP/2003 Using Motion Paths and Custom Animations to add interest to your classroom presentations.
1 Committed to Shaping the Next Generation of IT Experts. Chapter 4: Enhancing with Multimedia Exploring Microsoft Office PowerPoint 2007 Robert Grauer,
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
For those who hate computers.
PowerPoint PowerPoint is used for creating slideshows that accompany speeches, lectures, or other types of presentations. Slides can include text, images,
PowerPoint PowerPoint is used for creating slideshows that accompany speeches, lectures, or other types of presentations. Slides can include text, images,
Welcome
GO! with Microsoft Office 2016
STEGANOGRAPHY.
DONE BY S.MURALIRAJAN M.NIRMAL
Model-based Steganography
Inserting Graphics, Media, and Objects
Steganography.
MS 2013 POWERPOINT.
Lesson 21 Enhancing Presentations with Multimedia Effects
AN INTRODUCTION TO: POWERPOINT.
Lesson 22 Enhancing Presentations with Multimedia Effects
Steganography Techniques and their use in Anonymity
Information Hiding and Its Applications
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
STEGANOGRAPHY IN IMAGES
Introduction to Multimedia Security Topics Covered in this Course
Intermediate Level Course
Presentation transcript:

A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( ) Syed Basheer ( ) Batch no.7

Contents Introduction Existing System Advantages Disadvantages Proposed method Future Enhancement Conclusion

Introduction: Due to fast growth of Internet applications, digitized data becomes more and more popular. Because of the property of digitized data, easy to duplicate and modify, the researches of information security become prosperous. The techniques of cryptography and steganography are usually used in privacy communication. The term of Steganography comes from the Greek words, ‘stegano’ and ‘graphia’, and means “covered writing” which is usually interpreted to mean hiding information in other information.

In contrast to ‘cryptography’ which is about protecting the content of privacy messages, the ‘steganography’ is about concealing their very existence.

Existing System Microsoft PowerPoint is a ubiquitous presentation program and widely used by businesspeople, researchers, and educators Animations are applied on text, images, or other elements and appear on a slide at timed intervals or with a mouse click.

Figure 1 shows three different types of objects appearing on a slide of a PowerPoint file. Each of them is a text box, a directed line, and a sunset image.

Here, we will give an example to illustrate the animation effects. Figure 2 shows a slide without animation effect. If we add the “Bold Reveal” animation effect in the text box “Steganography & Watermarking”, the animation effect as shown in figure 3

Figure 3 will appear when we click mouse. This will attract the objects to leave the Slide Show with animations.

Motion Paths allow objects to move around the Slide Show. Each effect contains variables such as start,delay, speed, repeat and trigger. This makes animations more flexible and interactive. After analyzing the animation effects, we find that the perceptive results of “Emphasis” and “Motion Paths” animation categories are similar somewhere So we re-group the PowerPoint animation effects into three categories: Entrance, Emphasis/Motion Paths, and Exit. Two selected effects for each category are shown in Figure 4 to 9.

Advantages Hard to detect. Original image is very similar to altered image. Embedded data resembles Gaussian noise. Hard to detect as message and fundamental image data share same range. Altered picture closely resembles original. Not susceptible to attacks such as rotation and translation.

Disadvantages Message is hard to recover if image is subject to attack such as translation and rotation Significant damage to picture appearance. Message difficult to recover. Relatively easy to detect, as our project has shown. Image is distorted. Message easily lost if picture subject to compression such as JPEG.

The Proposed Method The proposed method uses different animation effects to stand for different characters. Thus a codebook is designed to record the corresponding between the animation effects and characters. The proposed method contains two parts, one is the embedding process and the other is extracting process.

Embedding Process Before introducing the embedding process, we will make two general assumptions. Assumption 1: The transmitter and receiver have the same animation codebook. Assumption 2: The embedding animation effect applied on objects must obey the human perception.

In the Embedding process, we need three materials to create the embedded PowerPoint file. The first is the secret message M being transmitted. The second is the Animation Codebook (AC), which will record the corresponding between characters used in secret message and the animation effects. The last is the cover media, the PowerPoint file, which will be used to embed secret message.

An example of animation code book

In the following, we will describe the Embedding steps in detail. 1. Find out the set of objects, O, which could be text boxes, directed lines, and images, in all slides. 2. Generate a random binary sequence, R, with the number of 1 being the same as the length of secret message. 3. Process each object in O based on the binary sequence R.

4. For each object processed and the corresponding bit on R, R i : If R i = 0, no animation effect is applied. If R i = 1, the animation effect in AC corresponding to the secret character is applied. 5. Repeat step 4 until all characters in secret message are embedded.

Extracting Process Similar to the embedding process, we need two materials to extract our secret message in the extracting process. One is the embedded PowerPoint file and the other is the same Animation Codebook. The steps of the extracting process are described as follows. 1. Extract animation effects, applied in objects from the embedded PowerPoint file sequentially. 2. For each extracted animation effect, check if it is in AC. If yes, convert it to the corresponding character based on AC. Otherwise, skip. 3.Merge all extracted characters to form the secret message.

Example Assume that Imran wants to go to a movie a movie with Bilal on October 30 at IMAX, he wants to transmit the message “IMAX3010” to Bilal in secret. First, Imran creates a PowerPoint file which contains ten fields. This PowerPoint file contains one slide with 10 fields and each field is considered as text object.

Then he generates binary sequence After getting the random binary sequence, the secret message “IMAX3010” can be embedded in selected objects of the PowerPoint file. “I” can be embedded in all the fields considered as a text object through Entrance-faded zoom effect. “M” in the first field through emphasis- Shimmer effect “A” in the second field through emphasis Complementary Colour effect

“X” in the fourth field through emphasis-curvy star effect. “3” in the fifth field through emphasis-Change Font Style effect. “0” in the seventh field through emphasis-neuron effect. “1” in the ninth field through emphasis-change font size effect. “0” in the tenth field through Exit-Blind effect

Conclusion In this presentation, we have proposed a steganography method to show the performance of the proposed method. In contrast to other steganography methods, our method does not distort the PowerPoint file and can naturally hide information.