Model-based Steganography

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Capacity-Approaching Codes for Reversible Data Hiding Weiming Zhang, Biao Chen, and Nenghai Yu Department of Electrical Engineering & Information Science.
CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
Steganography Sami Dokheekh.
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
F5 A Steganographic Algorithm
F5 a Steganographic algorithm - andreas westfeld
Feature-Based Steganalysis for JPEG images and its applications for future design of steganographic schemes. - Jessica Fridrich Submitted by: Praveena.
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
1 Self-Recovery Fragile Watermarking Scheme with Variable Watermark Payload Fan Chen, Hong-Jie He, Yaoran Huo, Hongxia Wang Southwest Jiaotong University,
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
RGB Intensity Based Variable- Bits Image Steganography 2008 IEEE Asia-Pacific Services Computing Conference (APSCC 2008) 1 st International Workshop on.
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Watermarking For Image Authentication Presented by San-Hao Wang.
Overview of Digital Stenography
Further Study on YASS: Steganography Based on Randomized Embedding to Resists Blind Steganalysis A. Sarkar +, K. Solanki*, and B. Manjunath Vision.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Digital Steganography
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Multiple Image Watermarking Applied to Health Information Management
IEEE-WVU, Anchorage  1 Steg in the Real World Two examples that move the work of steganalysis out of the lab –The massive data survey of Provos.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Introduction to Steganalysis Schemes Multimedia Security.
Detection of Image Alterations Using Semi-fragile Watermarks
Benchmarking steganographic and steganalysis techniques Electronic Imaging of SPIE 2005 Authors:Kharrazi, Mehdi, Husrev T. Sencar, and Nasir Memon Department.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Advanced Science and Technology Letters Vol.35(Security 2013), pp Image Steganograpy via Video Using Lifting.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Cryptographic Anonymity Project Alan Le
Speaker: Po-Kai Shen Advisor: Tsai-Rong Chang Date: 2010/11/16 1 Steganalysis of LSB matching based on statistical modeling of pixel difference distributions.
YASS Yet Another Steganographic Scheme that Resists Blind Steganalysis K. Solanki*, A. Sarkar +, and B. Manjunath Vision Research Laboratory Department.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
Digital Steganography
Security and Error Correction/Detection in 802.1x and GSM
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Welcome
Measures for Classification and Detection
K. ZEBBICHE , F. KHELIFI and A. BOURIDANE
Steganography.
Reversible Data Hiding in JPEG Images using Ordered Embedding
Increasing Watermarking Robustness using Turbo Codes
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Steganography with Digital Images
Scalable Speech Coding for IP Networks: Beyond iLBC
A Data Hiding Scheme Based Upon Block Truncation Coding
Steganography in digital images
Distributed Compression For Binary Symetric Channels
Information Hiding and Its Applications
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
A Data Hiding Scheme Based Upon Block Truncation Coding
JPEG Steganalysis Statistical Offset Tests
Presentation transcript:

Model-based Steganography Phil Sallee University of California, Davis IWDW 2003 October 20, 2003 Seoul, Korea

Outline Introduction Current methods Model-based steganography framework JPEG steganography example Results Conclusions Future Work

Steganography + = Covered + Writing Cryptography: Conceal message content Steganography: Conceal communication 101101011010101010100101000101101101101010100101011010101011110000101010100101110101101011010100101001000010011101010011110110111101110111010001 + =

Steganography vs. Watermarking Emphasis on avoiding detection Largest hidden message possible Usually fragile Watermarking: Emphasis on avoiding distortion of cover As robust as possible Usually small hidden message

Measurements of Interest Capacity: <message size> / <steganogram size> Embedding Efficiency: <message size> / <# changes to cover>

Current Steganography Methods Coefficient Histogram Maximum Capacity Embedding efficiency JSteg 13% 2 F5 1.5 Outguess 6.5% 1

Can we do better? What is the maximum capacity achievable before risking detection? How can we achieve this maximum capacity? At what embedding efficiency can we obtain this maximum capacity?

Model-based Steganography Cover x is an instance of a random variable X distributed according to model: PX x = ( xa , xb ) Choose x0 = (xa , x0b ) to encode a message M while maintaining model statistics PX

Model-Based Steganography: Encoding

Model-Based Steganography: Decoding

Capacity Maximum capacity = entropy of PXb |Xa: Entropy codec designed to achieve the entropy limit

Steganalysis Determine likelihood that xb is drawn from PXb | Xa(xb | xa). Compute expected message length Decode “message” Longer than expected message indicates a violation of the statistical model

An example: JPEG Steganography Model: marginal statistics of DCT coefficients Achieve maximum capacity without altering marginal statistics Measure capacity, embedding rate achievable Compare results to current JPEG steganography methods F5 and Outguess

u = coefficient value p>1, s>0 are fit to each coefficient type Model u = coefficient value p>1, s>0 are fit to each coefficient type

Model CDF Cumulative density function easy to calculate: Used to integrate density function for a given histogram bin

Fitting the Model Parameters Parameters p, s fit by maximum likelihood: where h is a coefficient histogram

Model Fit to Histogram

Embedding step size = 2 xb Î{0,1} xa = bin group xb = offset (like LSB) xb Î{0,1} xa

Embedding step size = 2 step size = 3 xb Î{0,1} xa = bin group xb = offset (like LSB) step size = 3 xa is lower precision 3 offsets per group xb Î{0,1} xa xb Î{0,1,2} xa

Embedding Efficiency Embedding rate = where p = P(xb = 0 | xa) Change rate = Efficiency =

Embedding Efficiency Embedding efficiency >= 2!

Example Each image is 47k bytes. Which contains a 6.5kb message?

Example original image: 47k steganogram: 47k message: 6.46k (13.7%) embed. efficiency: 2.1

Results Image name File size (bytes) Message size (bytes) Capacity Embedding Efficiency barb 48,459 6,573 13.56% 2.06 boat 41,192 5,185 12.59% 2.03 bridge 55,698 7,022 12.61% 2.07 goldhill 48,169 6,607 13.72% 2.11 lena 37,678 4,707 12.49% 2.16 mandrill 78,316 10,902 13.92%

Histogram Comparison

JPEG Steganography Methods Coefficient Histogram Maximum Capacity Embedding efficiency JSteg 13% 2 F5 1.5 Outguess 6.5% 1 Model-based >2

Conclusions Presented a unifying framework for steganography and steganalysis Proposed method maximizes capacity while preserving a given set of statistics Steganographic security is based on a statistical model of the cover media

Future Work Use extra capacity to correct additional statistics: ‘blockiness’, wavelet statistics Improve model: Dependencies between coefficients Embed in wavelet domain JPEG2000, MP3, MPEG, …

Matlab code available: http://redwood.ucdavis.edu/phil Email: sallee@cs.ucdavis.edu