Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.

Slides:



Advertisements
Similar presentations
Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Advertisements

F5 A Steganographic Algorithm
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Forward Error Correction Demystified Presented by Sunrise Telecom Broadband … a step ahead.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Confidential 1 Corporate Research © THOMSON multimedia, 1999 Mixing cryptography and watermarking for copy protection in consumer electronic devices FURON.
Information Hiding: Watermarking and Steganography
Brodatz Textures Vistex Textures What is texture ? Texture can be considered to be repeating patterns of local variation of pixel intensities.
Biometrics based Cryptosystem Design. Cryptosystem A mechanism using which one can encode an information content to an incomprehensible form and also.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Review of : Spread Spectrum Image Watermarking Presenting: Rani Hoitash.
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Data Hiding within Audio Signals Matthew Wiedemer CSE691 November 20, 2001.
1. 2 u Copyright Protection u Authentication of multimedia data u Robust Data Hiding and Security issues.
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Sep 06, 2005CS477: Analog and Digital Communications1 Introduction Analog and Digital Communications Autumn
Spread Spectrum Steganography Nick Sterling Sarah Wahl Sarah Summers.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Spread Spectrum Steganography
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Why to Apply Digital Transmission?
STEGANOGRPAHY [APPLICATION – I]
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Digital Steganography
University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot May 2011 May 2011 Steganalysis ITSS 4201 Internet Insurance and Information.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.
Data Hiding in Image and Video Part I: Fundamental Issues and Solutions ECE 738 Class Presentation By Tanaphol Thaipanich
Spread Spectrum Spread-spectrum techniques are methods by which energy generated in a particular bandwidth is deliberately spread in the frequency domain,
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Lecture 2 Outline Announcements: No class next Wednesday MF lectures (1/13,1/17) start at 12:50pm Review of Last Lecture Analog and Digital Signals Information.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Reversible hiding in DCT-based compressed images Authors:Chin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng and Wei-Liang Tai Adviser: Jui-Che Teng Speaker:
Introduction to Steganalysis Schemes Multimedia Security.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Basic Message Coding 《 Digital Watermarking: Principles & Practice 》 Chapter 3 Multimedia Security.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Presenting: Yossi Salomon Noa Reiter Guides: Dr. Ofer Hadar Mr. Ehud Gonen.
Introduction to Audio Watermarking Schemes N. Lazic and P
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
K. ZEBBICHE , F. KHELIFI and A. BOURIDANE
Increasing Watermarking Robustness using Turbo Codes
Chair Professor Chin-Chen Chang Feng Chia University Aug. 2008
Direct Sequence Spread Spectrum Modulation and Demodulation using Compressive Sensing Under the guidance of M.Venugopala Rao Submitted by K.Y.K.Kumari.
Parag Agarwal Digital Watermarking Parag Agarwal
Partial reversible data hiding scheme using (7, 4) hamming code
Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking IEEE Trans. On Signal Processing, April 2003 Multimedia Security.
Presentation transcript:

Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden Communication dates back to the beginning of western history. Two commonly used techniques are: Cryptography and Steganography.  Cryptography is the art of using codes and ciphers to make the message unreadable. The message is visible, but needs to be deciphered. Example: kvofw  Steganography is the art and science of conveying information in such a way that its presence is unnoticed. The message is made invisible. Example: via the old lemon trick.  Applications of Steganography include Covert Communication, Security, and Data Augmentation. Imperceptibility is important for all these applications.  One of the key issues in Steganography is the volume of the message that can be hidden. As in any communication system, there is a trade-off between data rate (i.e., message length) and channel noise.  A Robust method has to be developed for Imperceptible High Capacity Information Hiding. RESEARCH OBJECTIVE  The goal of this research is to advance the state-of-the-art of high capacity information hiding in images, with particular application to covert communication (Steganography).  This is achieved by developing: Novel channel models for image steganography; Devising methods for bandwidth-efficient signal embedding, extraction and error protection; Ensuring visual and statistical imperceptibility. Message Encoding Scheme The following message encoding and decoding schemes have been implemented to date.  Each pixel in the Hidden Message embeds one raw bit.  The raw message bits are modulated by generating a uniform random number ui in [0,1) for every pixel position.  To embed a Zero, we use ui and to embed a One, we transform it using: ui + 0.5, 0.0 ≤ ui ≤ 0.5 g(ui) = ui - 0.5, 0.5 ≤ ui ≤ 1.0  The result is transformed into a Gaussian distribution using the Inverse Gaussian Cumulative Distribution Function.  Finally this is scaled, interleaved, and added to the cover image. Block Diagram of Spread Spectrum Image Steganography System Spread Spectrum Image Steganography Encoding Spread Spectrum Image Steganography Decoding Message Decoding Scheme  At the receiving end, first the embedded noise is estimated by subtracting a denoised version of the stego–image.  To demodulate:  The Gaussian noise estimate is first normalized;  Next, it is transformed by the Gaussian cumulative distribution function into a uniform sequence;  For each pixel position, the estimated value is compared to ui and g(ui), yielding the relative probability that a 0 or a 1 is represented.  After decoding the forward error correcting code and after decrypting / decompressing the data stream, an estimate of the embedded message is available. ON-GOING WORK Our on-going research is focused on development of Blind Detection methods for presence of hidden information in Images. = Modulated Message - ScaledCover ImageStego-Image = De-noised ImageExtracted Noise