1 Undetectable Stegosystem Based on Noisy Channels V. Korzhik, G. Morales Luna, K. Loban Singapor, NTU, 2010.

Slides:



Advertisements
Similar presentations
Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
Advertisements

Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Evaluating Classifiers
1. INTRODUCTION In order to transmit digital information over * bandpass channels, we have to transfer the information to a carrier wave of.appropriate.
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Bounds on Code Length Theorem: Let l ∗ 1, l ∗ 2,..., l ∗ m be optimal codeword lengths for a source distribution p and a D-ary alphabet, and let L ∗ be.
Sampling Distributions (§ )
Audio and Video Watermarking Joseph Huang & Weechoon Teo Mr. Pirate.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Desynchronization Attacks on Watermarks
Fifth International Conference on Information
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Descriptive statistics Experiment  Data  Sample Statistics Experiment  Data  Sample Statistics Sample mean Sample mean Sample variance Sample variance.
Code and Decoder Design of LDPC Codes for Gbps Systems Jeremy Thorpe Presented to: Microsoft Research
STEGANOGRPAHY [APPLICATION – I]
A Review on: Spread Spectrum Watermarking Techniques
Hypothesis Testing.
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY * By: Ricardo A. Garcia *Research done at: University.
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY By: Ricardo A. Garcia University of Miami School.
Review of modern noise proof coding methods D. Sc. Valeri V. Zolotarev.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
REVISED CONTEXTUAL LRT FOR VOICE ACTIVITY DETECTION Javier Ram’ırez, Jos’e C. Segura and J.M. G’orriz Dept. of Signal Theory Networking and Communications.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Reversible Color Image Watermarking in YCoCg-R Color Space Aniket Roy under the supervision of Dr. Rajat Subhra Chakraborty.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
1 Chapter 10: Introduction to Inference. 2 Inference Inference is the statistical process by which we use information collected from a sample to infer.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
1 Chapter 9 Detection of Spread-Spectrum Signals.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
University of Massachusetts Amherst · Department of Computer Science Square Root Law for Communication with Low Probability of Detection on AWGN Channels.
CHAPTER 5 SIGNAL SPACE ANALYSIS
Introduction to Digital Signals
Computer and Robot Vision II Chapter 20 Accuracy Presented by: 傅楸善 & 王林農 指導教授 : 傅楸善 博士.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Computer simulation Sep. 9, QUIZ 2 Determine whether the following experiments have discrete or continuous out comes A fair die is tossed and the.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
Sampling and estimation Petter Mostad
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Spectrum Sensing In Cognitive Radio Networks
Cryptographic Anonymity Project Alan Le
Education 793 Class Notes Inference and Hypothesis Testing Using the Normal Distribution 8 October 2003.
Baseband Receiver Receiver Design: Demodulation Matched Filter Correlator Receiver Detection Max. Likelihood Detector Probability of Error.
September 28, 2000 Improved Simultaneous Data Reconciliation, Bias Detection and Identification Using Mixed Integer Optimization Methods Presented by:
A Low-Complexity Universal Architecture for Distributed Rate-Constrained Nonparametric Statistical Learning in Sensor Networks Avon Loy Fernandes, Maxim.
The Unscented Particle Filter 2000/09/29 이 시은. Introduction Filtering –estimate the states(parameters or hidden variable) as a set of observations becomes.
ECE 8443 – Pattern Recognition ECE 8527 – Introduction to Machine Learning and Pattern Recognition Objectives: Statistical Significance Hypothesis Testing.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
Performance of Digital Communications System
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Statistics for Business and Economics 8 th Edition Chapter 7 Estimation: Single Population Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Institute for Experimental Mathematics Ellernstrasse Essen - Germany DATA COMMUNICATION introduction A.J. Han Vinck May 10, 2003.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Virtual University of Pakistan
Introduction to Audio Watermarking Schemes N. Lazic and P
Advanced Wireless Networks
K. ZEBBICHE , F. KHELIFI and A. BOURIDANE
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Steganalysis of Block-Structured Stegotext
Basic Concepts of Audio Watermarking
CONCEPTS OF HYPOTHESIS TESTING
Discrete Event Simulation - 4
ELEC6111: Detection and Estimation Theory Course Objective
Sampling Distributions (§ )
Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking IEEE Trans. On Signal Processing, April 2003 Multimedia Security.
Information Theoretical Analysis of Digital Watermarking
DIGITAL WATERMARKING OF AUDIO SIGNALS USING A PSYCHOACOUSTIC AUDITORY MODEL AND SPREAD SPECTRUM THEORY By: Ricardo A. Garcia University of Miami School.
Presentation transcript:

1 Undetectable Stegosystem Based on Noisy Channels V. Korzhik, G. Morales Luna, K. Loban Singapor, NTU, 2010

2 1. Introduction Steganography (SG) is the information hiding technique that embeds the hidden information into an innocent cover message (CM) under the conditions that the CM is not corrupted significantly and that the presence of the additional information into the CM may not be detected. Basic principle of undetectability: The CM and the SG signal have to be indistinguishable even with the use of the best statistical methods.

3 Designer’s problem: He (or She) should know the full statistics of the CM, but it is a rather very hard to study completely the probability distribution of such CM as video or audio signals. In order to be successful within this risky situation (which is, indeed, a “bottleneck” of any SG system) we propose to move into another concept of SG system setting, namely to SG based on noisy channels. This setting can be justified if there exists in a natural manner a noisy channel and the attacker (“stegobreaker”) is able to receive the stegosignal just over this channel and nothing else.

4 Attacker’s problem: To distinguish statistically the CM after its passing over the noisy channel and SG signal passing over the same noisy channel. Reducing of the steganalysis problem: Recognition of channel noise and the sum of the channel noise and the embedded signal. Since the channel noise distribution is, as a rule, known much better than the CM distribution, the problem to design SG systems which are resistant to their detection is simplified. New assumption: CM can be publicized; such assumption is impossible for conventional SG, because otherwise they can be detected trivially – if SG ≠ CM, then something has been embedded.

5 Model of SG design for a Gaussian noisy channel: After a passing of the watermarked signal through the Gaussian channel we get: (1) (2)

6 More early results [1] for the case when an attacker knows CM: Where D is the relative entropy (introduced in [2] as a measure of SG system security, Approximation of D for large : It is well known from Information Theory [2] the following inequality for any hypothesis testing: From eq. (4) it follows that (4) (3) (5) (6) (7)

7 The bit error probability [1]: The general relation that comprises both security and reliability [1]: (8) (10) (9)

8 Optimistic draw: Our proposal: To use so called spread-time stegosystem (STS) – see next Section. For any security level D and the number of secure bits m there can be chosen an appropriated N such that the SG system provides any given reliability. Pessimistic draw: The more is N for given D the less (see eq.(7)) should be “signal-to- noise” ratio and this results in a problem for practical implementation (especially for digital processing). Example. Let D=0.1 (that provides an acceptable level of security) and let m=10 be the number of the secure embedded bits If we choose then by (10) which is acceptable. But. by (7) and if the CM signal-to-noise ratio. where then which is indeed unacceptable.

9 2. Description of STS and its performance evolution Uncoded system. Practical implementation: Let be an increasing sequence of indexes, generated by a secret stegokey K, determining the samples in which the WM’s are to be embedded (see Fig.1.) Then for a large value of N we may assume that Fig.1. STS system with embedding into pseudorandom samples. In order to embed one secret bit b are used consecutive chosen samples. Hence the total number of secret bits embedded into samples is (11)

10 Legal user knows the stegokey K, hence he knows exactly the samples with embedding and can execute the decision rule (8). The error probability can be found by (9). Optimal STS detecting by an attacker: The two hypothesis have to be tested: (12)

11 Let us assume that (for a good security guarantee), then we get from (14) after simple normalization. The optimal hypothesis testing based on maximum livelihood ratio [3] is By changing the threshold in (13) it is possible to pass to the logarithmic livelihood ratio: (13) (14) (15)

12 The series expansion of up to its linear term and next the series expansion of. up to its linear term renders the following decision rule: Let us estimate (using the Central Limit Theorem) the missing and false alarm probabilities, (16) (17) (18)

13 Let us select (for simplicity) the threshold in such away to be Then after simple transforms of eq’s (17)-(18) we get Substituting (20) into (19) we obtain: (20) (21) (19)

We can see that for large enough N it is possible to provide a good undetectability ( ) and reliability ( ) of STS and embed up to 232 secure bits.

Coded system. We restrict our attention to binary linear systematic Embedding: Decoding: (24) (23) (22)

16 The simplex codes (SC): The Reed-Muller codes (RMC): Example:

17 3. Optimal SG system detecting rule. Let us verify if the use of the optimal decision rule (15) can provide an appreciable improvement of STS detecting in comparison with the suboptimal decision rule (16)? Since N is sufficiently large, we can apply the Central Limit Theorem [4] to the sum in (15). Similar to the proof of (19) we get for such a choice of threshold, which provides where random values have the probability distributions by (12)

18 We can see that the use of the optimal decision rule does not break undetectability of STS.

19 4. Simulation of STS for audio cover messages. We use audio music file with duration about 29 sec in format wav where the sampling frequency is 44.1 kHz. The CM signal-to-noise ratio, whereas watermark-to-noise ratio (WNR) The embedding rule was taken by (11), where. In Fig. 2 the wave forms of original audio signal, audio signal after passing over a noisy channel and after secret message embedding at the same time interval are presented. One can see that noise corrupts slightly the audio signal and this fact can also be appreciated by human ear, whilist, at the same time, the embedding procedure is not observable by human ear.

20 Fig.2. The waveforms of audio signal (a), audio signal after its passing over noisy channel with CM signal-to-noise ratio (b), and after embedding by STS algorithm with (c)

21 In Fig.3 the waveforms of channel noise are shown, as well as this noise after embedding. Fig.3. The waveform of channel noise (a) and the same channel noise after embedding (b)

22 5. Conclusion. 1.Some modification of the stegosystem based on noisy channel called spread-time stegosystem (STS) has been proposed. 2.Both STS security and reliability can be provided by an appropriate selection of the system parameters. 3.The main defect of STS is its low embedding rate. The use of error correcting codes improve this situation but only slightly. 4.The suboptimal system detection by (16) is practically as much efficient as the optimal by (15). 5.Simulation of the STS with audio CM shows that its detection by ear and eye is impossible, whereas the embedded bits can be extracted reliably.

23 Open problems. 1.To specify security of STS for digital CM and after a saving the stegosignal in digital formats. 2.Consider applications of STS in real noisy channels (including optical fiber channels). 3.An extraction of secret bits by a “blind” decoder (see [6]) while keeping a good undetectability of STS. 4.Investigation of attack to prevent an extraction of secure embedded bits (additive noise, compression/decompression, resynchronization ). 5.Improvement of coded STS (farther optimization of codes and decoding algorithms).

24 References. [1] Valery Korzhik, Moon Ho Lee, Gullermo Morales Luna, “Stegosystem Based on Noisy Channels”, Trans. VII Spanish Meeting on Cryptography and Information Security, 2006; [2] Cachin C., “An information theoretic model for stegonography”. In: International workshop on IH, 1998, pp [3] Van Der Warden, “Mathematische Statistik”, Springer-Verlag, [4] Papoulis, A. “Pobability, Random Variables, and Stochastic Processes”, McGraw-Hill, New- York, [5] MacWilliams, F. Sloan, N. “The Theory of Error Correcting Codes”. Bell Labs, [6] Malvar, H.S. Florencio, D. “Improved spread spectrum: A new modulation technique for robust watermarking”. IEEE Transaction on Signal Processing 51 (2003), pp / [7] Valery Korzhik, Guillermo Morales-Luna, Ksenia Loban, “Undetectable Spread-time Stegosystem Based on Noisy Channels”. Submitted for journal “Information Hiding”, Lecture Notes in Computer Science, 2009