Stego-SIRDS William L. Bahn CS-591 Project 07 December 2005.

Slides:



Advertisements
Similar presentations
BMP Hide ‘n’ Seek What is BMP Hide ‘n’ Seek ? –It’s a tool that lets you hide text messages in BMP files without much visible change in the picture. –Change.
Advertisements

Steganography and Network Security
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
Piyu Tsia,Yu-Chen Hu,Hsiu-Lien Yen Signal Processing 日期 :1 月 4 號 報告者 : 許睿中.
Reversible data hiding based on histogram shifting scheme Reporter: Date: Wan-Yu Lu 2012/12/13.
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
RGB Intensity Based Variable- Bits Image Steganography 2008 IEEE Asia-Pacific Services Computing Conference (APSCC 2008) 1 st International Workshop on.
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Original image: 512 pixels by 512 pixels. Probe is the size of 1 pixel. Picture is sampled at every pixel ( samples taken)
Multi-media graphics--JOUR 205 Vectors vs. bitmaps.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Computer Systems 1 Fundamentals of Computing Negative Binary.
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Steganography. Outline What is Steganography? History Steganography used nowadays? Terms Steganography methods Steganography Available Software Steganalysis.
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
1 Hiding Data in Images by Simple LSB Substitution Source: Pattern Recognition, Vol. 37, pp , 2004 Authors: Chi-Kwong Chan and L.M. Cheng Speaker:
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.
1 濕影像的資訊隱藏技術 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
File Sizes & Storage Requirements.  An image has a width in pixels and a height in pixels  Start by calculating the number of pixels all up  640 x.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
Group 6 Arthur Garza Lizeth Gonzalez Javier Guzman.
1 A Steganographic Scheme for Secure Communications Based on the Chaos and Eular Theorem Der-Chyuan Lou and Chia-Hung Sung IEEE Transactions on Multimedia,
Detection of Image Alterations Using Semi-fragile Watermarks
ECE-1021 Instructor’s Project SIRDS Single Image Random Dot Stereograms STATUS UPDATE #5 02 DEC 03.
Steganography Leo Lee CS 265, Section 2 Dr. Stamp April 5, 2004.
ECE-1021 Instructor’s Project SIRDS Single Image Random Dot Stereograms STATUS UPDATE #4 29 NOV 03.
Reporter :Chien-Wen Huang Date : Information Sciences, Vol. 176, No. 22, Nov. 2006, pp Received 29 December 2004; received in revised.
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Steganalysis of Block-DCT Image Steganography Ying Wang and Pierre Moulin Beckman Institute, CSL & ECE Department University of Illinois at Urbana-Champaign.
1 An LSB Substitution base Information Hiding Technique 國立彰化師範大學 資訊工程學系教授兼系主任 蕭如淵 (Ju-Yuan Hsiao) 中華民國九十四年十二月十六日.
Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization G. Sahoo1 and R. K. Tiwari2 Presented by Pan Meng.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Digital Steganography
Source: IEEE Signal Processing Letters (Accepted)2016
Computed Tomography Image Reconstruction
Steganography.
DIGITAL DATA COMMUNICATION TECHNIQUES
Images in Binary.
Dividing Decimals Setting up the Problem
Separable and error-free reversible data hiding in encrypted images
Reversible Data Hiding Scheme Using Two Steganographic Images
Introduction to Medical Computing
Data hiding based Hamming code
Information Hiding and Its Applications
Digital Steganography Utilizing Features of JPEG Images
Can you calculate the actual file size of a computer image
Chair Professor Chin-Chen Chang Feng Chia University
Chair Professor Chin-Chen Chang Feng Chia University
The Image The pixels in the image The mask The resulting image 255 X
Compression.
De-clustering and Its Application to Steganography
Encryption & Steganography: Amazing Things To Do with Bits
Image Based Steganography Using LSB Insertion Technique
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Stego-SIRDS William L. Bahn CS-591 Project 07 December 2005

A Common Steganographic Technique  Use a 24-bit image file  Strip 1 or 2 LSB’s from each byte  Replace with the Stego-data

How to embed the buried data?  As part of the fundamental image.  Use data source as random number source.  Mark non-random pixels.  Between 20% and 75% of pixels are random.  Fill factors of up to 60% to 70% achievable.  Full pixel replacement  Use some agreed upon selection function.  Fill factors of 25% to 33% achievable.  The typical way – LSB replacement.  Random data – fill factors of 87.5% achievable.  Raw data – fill factors of 50% to 75% achievable.

2-bit Stego-Image (25% fill factor) (taken from Wikipedia)

Normal image at 50% fill Unmodified Cover Image Stego-image w / 50% fill

Normal image at 75% reverse fill Unmodified Cover Image Stego-image w / 75% rev fill

Unmodified SIRDS image

Strong stereo image even with only the most significant bit retained! Unmodified Cover Image Stego-image w / 87.5% fill

BUT….  Prior image used pseudorandom buried data.  Use of encryption/compression can randomize data.  Random buried data can sometime ease analysis.  But this is not the case here - the “R’ in SIRDS!

Even side by side it isn’t too obvious Unmodified Cover Image Stego-image w / 50% fill

So what does it hide? Stego-image w / 50% fill My house!

87.5% fill is a waste of time Unmodified Cover Image Stego-image w / 87.5% fill

75% fill has obvious artifacts - very difficult to view stereo-image Unmodified Cover Image Stego-image w / 75% fill

75% reverse fill shows minor artifacts but is viewable as a stereo image Stego-image w / 75% rev fill Unmodified Cover Image