F5 A Steganographic Algorithm

Slides:



Advertisements
Similar presentations
CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
Advertisements

Steganography Sami Dokheekh.
F5 a Steganographic algorithm - andreas westfeld
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Steganography and Network Security
Khan, Mohammed Minhajuddin
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
Spread Spectrum Steganography
Steganography Rayan Ghamri.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Steganography and Approaches of Data Hiding in Digital Images
IEEE-WVU, Anchorage  1 The Unseen Challenge Data Sets Anderson Rocha Walter Scheirer Siome Goldenstein Terrance Boult.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
A Novel steganographic method for JPEG images by Vasiliy Sachnev - Introduction  JPEG compression  Steganography - Block based steganography method (F5)
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Introduction to Steganalysis Schemes Multimedia Security.
Benchmarking steganographic and steganalysis techniques Electronic Imaging of SPIE 2005 Authors:Kharrazi, Mehdi, Husrev T. Sencar, and Nasir Memon Department.
Cryptographic Anonymity Project Alan Le
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
基於 (7,4) 漢明碼的隱寫技術 Chair Professor Chin-Chen Chang ( 張真誠 ) National Tsing Hua University National Chung Cheng University Feng Chia University
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Introduction to Steganography
基於(7,4)漢明碼的隱寫技術 Chair Professor Chin-Chen Chang (張真誠)
Security and Error Correction/Detection in 802.1x and GSM
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
STEGANOGRAPHY.
Model-based Steganography
Reversible Data Hiding in JPEG Images using Ordered Embedding
Visit for more Learning Resources
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Steganography with Digital Images
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams
A Data Hiding Scheme Based Upon Block Truncation Coding
Steganography Techniques and their use in Anonymity
Steganography in digital images
Parag Agarwal Digital Watermarking Parag Agarwal
Reversible Data Hiding Scheme Using Two Steganographic Images
Information Hiding and Its Applications
Digital Steganography Utilizing Features of JPEG Images
Detecting Hidden Message Using Higher Order Statistical Models Hany Farid By Jingyu Ye Yiqi Hu.
Source: IEICE-Transactions on Info and Systems
De-clustering and Its Application to Steganography
A Data Hiding Scheme Based Upon Block Truncation Coding
Department of Computer Science, University of Central Florida ,Orlando
STEGANOGRAPHY IN IMAGES
Presentation transcript:

F5 A Steganographic Algorithm Davang Patel Thomas Schulze

Agenda Introduction Capacity vs. Security JPEG JSTEG F3 F4 F5

steganographical decryption What is Steganography? Steganography is the art and science of embedding hidden messages in a carrier medium such that no one apart from the sender and intended recipient even realizes there is a hidden message. Mediums can include images, video, and audio. Message Carrier steganographical encryption algorithm steganographical decryption Attack Message should be invisible to an aggressor Message should be not readable to an aggressor Steganogram

Steganogram Example The Story Behind the MATLAB Default Image More Info: http://blogs.mathworks.com/steve/2006

Capacity vs. Security F5 algorithm combines BOTH advantages!! e.g. Jsteg Embedding capacity 12 % Secure against visual attacks Weak against statistical attacks First algorithm great Capacity for steganographic messages Weak against attacks (visual or statistic)‏ Second algorithm small Capacity for steganographic messages Strong against attacks (visual or statistic)‏ e.g. MP3Stego Embedding capacity less then 1 % Secure against visual attacks Secure against statistical attacks F5 algorithm combines BOTH advantages!! Great capacity for steganographic messages Strong against statistical and visual attacks 13.4% embedding capacity

Histogram for JPEG coefficient after quantization JPEG Mechanism Histogram for JPEG coefficient after quantization The coefficient’s frequency of occurrence decreases with increasing absolute value. The difference between two bars in the middle of the histogram is greater than the difference between two bars near the ends.

JSTEG Algorithm After quantization, Jsteg replaces (over writes) the least significant bits (LSB) of the frequency coefficient by the secret message. The embedding mechanism skips all coefficient with the value 0 and 1. Resistant against the visual attacks and good capacity with 12.8 % of the steganogram's size, but the secret message is easily detected by statistical attacks. (chi-square test) Jsteg influences pairs of the coefficients frequency of occurrence !!! JSTEG

F3 Algorithm Original F3 Algorithm JSTEG Does not overwrite bits -- Decrement the non-zero coefficient’s absolute value only if the LSB does not match. Zero coefficients are skipped. The LSB of a non-zero coefficient will match the secret message after embedding. Advantage: statistical attack (chi-square test) will not be successful Disadvantage: Less capacity and surplus of even coefficients caused by shrinking. The surplus of even coefficients can be detected by statistical means. Original F3 Algorithm JSTEG

F3 Shrinkage Shrinkage of coefficients causes a decrease in embedding capacity. Since the receiver cannot tell between a skipped zero and a zero that was generated due to shrinkage, repetitive embedding is necessary. -4 -3 -2 -1 0 1 2 3 4

F4 Algorithm Mapping negative coefficients to the inverted steganographic value. Even negative coefficients and odd positive coefficients represent a steganographic one. Even positive coefficients and odd negative coefficients represent a steganographic zero.

F4 embedding example Embed the code “01110” If LSB and message does not match, Increment negative Coefficients Decrement positive coefficients

F5 Algorithm Overall algorithm the same as F4. Extends F4 by adding two distinct features: Permutative straddling Matrix encoding

Permutative Straddling F4 embeds the data into the next available non-zero coefficient. F5 will scatter the entire message throughout the carrier. Uses permutation to equalize the spread of embedded data. F5 F4 carrier permutation carrier carrier+ message permutation + message Inverse permutation Note: treat each pixel as if it was a JPEG coefficient.

Improves the embedding efficiency from 1.5 bit to 3.8 bit per change. Matrix Encoding Improves the embedding efficiency from 1.5 bit to 3.8 bit per change. Embed 1736 bit message 459 changes 1157 changes F4 F5 How does it work? Consider we want to embed x1 and x2 in LSB locations a1, a2, and a3.

F5 encoding process Permutation is generated using user-defined password. Discrete Cosine Transform Quantization Permutation F5 Embedding function Inverse Huffman Encoder Steganogram (JPEG) Bitmap Carrier Message Random Number Generator Password Quality

Resultant Steganogram F5 example Carrier Image F5 Encrypt/Decrypt Program Resultant Steganogram Secret Message

Conclusion F5 has high embedding capacity (>13%) but can be pushed even further. Resistance to both visual and statistical attacks. Uses a common image format (JPEG).

Any Questions?