Steganography with Digital Images

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
Steganography Sami Dokheekh.
F5 A Steganographic Algorithm
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
 Introduction  LSB algorithm  Jsteg algorithm  Χ^2 test  Adaptive algorithms  LSB Substitution Compatible Steganography(LSCS)  Adaptive DCT-based.
An Introduction Steganography with A Case Study of Steganalysis
Steganography Techniques and Countermeasures with Images, Text, and Audio  First speaker – Chris Kleeschulte  Second speaker – David Miller  Third speaker.
» Copying images is easy » Distributing images is easy » But what if we want to protect our rights to an image?
Watermarking Technology Ishani Vyas CS590 Winter 2008.
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
Steganography Rayan Ghamri.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Steganography detection Roland Cmorik, Martin Šumák.
Steganography.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
IEEE-WVU, Anchorage  1 The Unseen Challenge Data Sets Anderson Rocha Walter Scheirer Siome Goldenstein Terrance Boult.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Information hiding in stationary images staff corporal Piotr Lenarczyk Military Uniwersity of Technology Institute of Electronics and Telecomunication.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Introduction to Steganalysis Schemes Multimedia Security.
Benchmarking steganographic and steganalysis techniques Electronic Imaging of SPIE 2005 Authors:Kharrazi, Mehdi, Husrev T. Sencar, and Nasir Memon Department.
Cryptographic Anonymity Project Alan Le
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Digital Steganography
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Security and Error Correction/Detection in 802.1x and GSM
Welcome
Measures for Classification and Detection
Model-based Steganography
Visit for more Learning Resources
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
High-capacity image hiding scheme based on vector quantization
A Data Hiding Scheme Based Upon Block Truncation Coding
Steganography Techniques and their use in Anonymity
Steganography in digital images
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
A Restricted Region-based Data-hiding Scheme
Some Novel Steganographic Methods for Digital Images
Reversible Data Hiding Scheme Using Two Steganographic Images
Data hiding based Hamming code
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Information Hiding and Its Applications
Partial reversible data hiding scheme using (7, 4) hamming code
UIT Unconference December 06, 2018 Ian Redzic
Detecting Hidden Message Using Higher Order Statistical Models Hany Farid By Jingyu Ye Yiqi Hu.
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Partial reversible data hiding scheme using (7, 4) hamming code
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
A New Method for Tamper Detection and Recovery
Image Based Steganography Using LSB Insertion Technique
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
A Quadratic-Residue-based Fragile Watermarking Scheme
A Restricted Region-based Data-hiding Scheme
Presentation transcript:

Steganography with Digital Images By Karl Schramm

Generic Stegosystem Cover Data Key Stego Data Embedding Algorithm Secret Message

Embedding Guidelines Alteration must be invisible Don’t alter the header The message must be contained in the cover data Use error-correcting code if possible Don’t reuse the cover data

LSB Modification Hide data by altering the LSB of a pixel Choose pixels pseudo-randomly Works with both true color and color index modes Blue 220 Blue 221

JPEG Algorithms Modify discrete cosine transform (DCT) coefficients Choose either larger coefficient values or coefficients in a particular range Attack at dawn!

Patchwork Choose random pixel pairs Let d = p1 – p2 Encode information with values: d < 0 == 0 d > 0 == 1 Swap the pixels if necessary If d == 0, choose a new pair

Steganalysis Traffic analysis Detection Brute force Manipulation