Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA 24060.

Slides:



Advertisements
Similar presentations
Multimedia: Digitised Sound Data Section 3. Sound in Multimedia Types: Voice Overs Special Effects Musical Backdrops Sound can make multimedia presentations.
Advertisements

Department of Computer Engineering University of California at Santa Cruz MPEG Audio Compression Layer 3 (MP3) Hai Tao.
An Exploration in the Detection of Hidden Data in Audio Bit Streams Presented by: John Monk CS 525, Spring Semester 2002
Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
Entropy and Information Theory
CALEB WALTER 7/14/2013 Audio Stego – A Brief How To.
Time-Frequency Analysis Analyzing sounds as a sequence of frames
Dale & Lewis Chapter 3 Data Representation Analog and digital information The real world is continuous and finite, data on computers are finite  need.
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
F5 A Steganographic Algorithm
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Digital Representation of Audio Information Kevin D. Donohue Electrical Engineering University of Kentucky.
Watermarking & Steganography Sanjay Goel University at Albany, SUNY.
Lecture 7 AM and FM Signal Demodulation
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Pictures Worth More Than 1000 Words
Spread Spectrum Steganography Nick Sterling Sarah Wahl Sarah Summers.
Spread Spectrum Steganography
Audio Steganography Echo Data Hiding
Communications IB physics.
STEGANOGRPAHY [APPLICATION – I]
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Fundamentals of Digital Communication
Data Compression and Security Chapter 20, Exploring the Digital Domain.
Steganography.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
IEEE-WVU, Anchorage  1 The Unseen Challenge Data Sets Anderson Rocha Walter Scheirer Siome Goldenstein Terrance Boult.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 9 This presentation © 2004, MacAvon Media Productions Sound.
Speech Hiding Reference: “A New Speech Hiding Scheme Based upon Sub-Band Coding” Chin-Chen Chang; Richard Char-Tung Lee; Guang-Xue Xiao; Tung-Shou Chen.
8. 1 MPEG MPEG is Moving Picture Experts Group On 1992 MPEG-1 was the standard, but was replaced only a year after by MPEG-2. Nowadays, MPEG-2 is gradually.
Alice Workshop Working with Sound. Sound Working with sound is appealing to students Demo: Penguin Sound.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
Digital watermarking: algorithms and applications
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
Digital Watermarking
CS Spring 2009 CS 414 – Multimedia Systems Design Lecture 3 – Digital Audio Representation Klara Nahrstedt Spring 2009.
MPEG-1Standard By Alejandro Mendoza. Introduction The major goal of video compression is to represent a video source with as few bits as possible while.
Digital Audio III. Sound compression (I) Compression of sound data requires different techniques from those for graphical data Requirements are less stringent.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
STEGANOGRAPHY Sibaka Mahapatra Computer Science 3rd Year, Sec-E
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Digital Steganography
Introduction to Steganography
Introduction to Audio Watermarking Schemes N. Lazic and P
Welcome
Steganography Example
Spread Spectrum Audio Steganography using Sub-band Phase Shifting
Multimedia: Digitised Sound Data
Department of Computer and Information Sciences
Sound Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman
Basic Concepts of Audio Watermarking
Visit for more Learning Resources
第七章 資訊隱藏 張真誠 國立中正大學資訊工程研究所.
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Information Hiding and Its Applications
Image Based Steganography Using LSB Insertion Technique
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA 24060

Copyright 2003, Marchany Introduction Hackers and Identity thieves are constantly coming up with ways to subvert computer & network defenses. Steganography (literal meaning: covered writing) is one way to accomplish this. Steganography is the art of passing information in a manner that the very existence of the message is unknown.

Copyright 2003, Marchany Audio Steganography Basics K. Weeks note that digital steganography is based on the fact that artifacts like bitmaps and audio files contain redundant information. Compression techniques like JPEG and MP3 eliminate part of the redundancy allowing the file to be compressed.

Copyright 2003, Marchany Audio Steganography Basics With DigSteg, you replace some of the redundant information with other data. The Human Auditory System (HAS) operates over a wide dynamic range of frequencies but it’s fairly poor with respect to its differential range. Loud sounds tend to mask out software sounds easily. This gives us a clue on possible candidates for DigSteg masking.

Copyright 2003, Marchany Ways to Hide Data in Audio Low-bit encoding replaces the LSB of information in each sampling point with a coded binary string. Can encode large amounts of hidden data in a given audio signal at the examples of introducing significant noise at the upper limits.

Copyright 2003, Marchany Ways to Hide Data in Audio Phase encoding substitutes the phase of an initial audio segment with a reference to the phase that represents the data. The phase of subsequent segments is adjusted in order to preserve the relative phase between segments. More complicated than low-bit.

Copyright 2003, Marchany Ways to Hide Data in Audio Spread Spectrum spreads the encoded data across as much of the frequency spectrum as possible. Makes it difficult for an adversary to find the data unless they have access to and or reconstruct the pseudo-random signal used to spread the data across the frequency range.

Copyright 2003, Marchany Ways to Hide Data in Audio Echo Data Hiding embeds data into a host signal by introducing an echo. The data are hidden by varying 3 parameters of the echo: Initial amplitude Decay rate Offset The echo blends as the offset between the original and the echo decreases. The echo is perceived as the original sound.

Copyright 2003, Marchany MP3 in a Nutshell MP3 = ISO-MPEG Audio Layer-3 standard Basic principle is the audio signal contains a significant portion of info that can be discarded w/o the average listener noticing the change. How telephones work.

Copyright 2003, Marchany MP3 in a Nutshell Layer-3 encoder uses 2 nested iteration loops. Inner loop is a rate loop. Outer loop is a noise control/distortion loop. MP3stego tool operates within the MP3 encoding process. It hides data during data compression.

Copyright 2003, Marchany MP3Stego Created by Fabien Petitcolas The secret data is compressed, encrypted and then hidden in the MP3 bit stream. Hiding process takes place in the inner loop

Copyright 2003, Marchany MP3Stego Encode –E secret_text.txt –P passphrase hells_bells.wav hells_bells.mp3 Decode –X –P passphrase hells_bells.mp3 Example compresses hells_bells.wav with secret_text.txt into hells_bells.mp3. To decrypt, you need the password “passphrase”.

Copyright 2003, Marchany Caveats The.wav file must be a mono 16 bit file encoded with pulse code modulation at Hz. MP3Stego can be used to insert a copyright marking system for MP3 files. Makes it easier to track illegal copies.

Copyright 2003, Marchany References “MP3Stego: Hiding Text in MP3 Files” by Mark Noto, SANS GIAC paper “On the limits of steganography” by Anderson, R. & Petticolas F.\ “Hiding in plain sight” by K. Weeks