B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

Slides:



Advertisements
Similar presentations
Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Advertisements

Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
F5 A Steganographic Algorithm
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Grey Level Enhancement Contrast stretching Linear mapping Non-linear mapping Efficient implementation of mapping algorithms Design of classes to support.
I NFORMATION H IDING : S TEGANOGRAPHY Dr. Shahriar Bijani Shahed University Sep 2014.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
Lecture 23 Symmetric Encryption
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
CS430 © 2006 Ray S. Babcock Lossy Compression Examples JPEG MPEG JPEG MPEG.
Spring 2015 Mathematics in Management Science Binary Linear Codes Two Examples.
Chapter 2 – Classical Encryption Techniques
Trevor McCasland Arch Kelley.  Goal: reduce the size of stored files and data while retaining all necessary perceptual information  Used to create an.
STEGANOGRPAHY [APPLICATION – I]
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
CS559-Computer Graphics Copyright Stephen Chenney Image File Formats How big is the image? –All files in some way store width and height How is the image.
Digital Watermarking Parag Agarwal
Steganography.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Lab #5-6 Follow-Up: More Python; Images Images ● A signal (e.g. sound, temperature infrared sensor reading) is a single (one- dimensional) quantity that.
: Chapter 12: Image Compression 1 Montri Karnjanadecha ac.th/~montri Image Processing.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Chapter 20 Symmetric Encryption and Message Confidentiality.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Image Compression – Fundamentals and Lossless Compression Techniques
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
1 影像偽裝術的最新發展 Chair Professor Chin-Chen Chang Feng Chia University National Chung Cheng University National Tsing Hua University.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
Introduction to Steganalysis Schemes Multimedia Security.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Lecture 23 Symmetric Encryption
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Basic Message Coding 《 Digital Watermarking: Principles & Practice 》 Chapter 3 Multimedia Security.
Course 3 Binary Image Binary Images have only two gray levels: “1” and “0”, i.e., black / white. —— save memory —— fast processing —— many features of.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
JPEG Compression What is JPEG? Motivation
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Model-based Steganography
Steganography.
Visit for more Learning Resources
Recent Developments on Multimedia and Secure Networking Technologies
Steganography with Digital Images
A Data Hiding Scheme Based Upon Block Truncation Coding
Steganography Techniques and their use in Anonymity
Parag Agarwal Digital Watermarking Parag Agarwal
Image Compression Purposes Requirements Types
A Restricted Region-based Data-hiding Scheme
Recent Developments on Multimedia and Secure Networking Technologies
一種兼顧影像壓縮與資訊隱藏之技術 張 真 誠 國立中正大學資訊工程學系 講座教授
A Data Hiding Scheme Based Upon Block Truncation Coding
Department of Computer Science, University of Central Florida ,Orlando
STEGANOGRAPHY IN IMAGES
A Restricted Region-based Data-hiding Scheme
Presentation transcript:

B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

O VERVIEW Why BPCS was developed How it works Several implementations Kawaguchi, Eason Beaullieu, Crissey, Smith Stoleru Results Possible improvements

S TEGANOGRAPHY Hiding a secret message by embedding it in data Different from: Cryptography Scrambling a secret message such that the message is not hidden, but simply unreadable Watermarking Embedding copyright/ownership information inside data

B IT -P LANE C OMPLEXITY S TEGANOGRAPHY BPCS Invented by Eiji Kawaguchi and Richard Eason in 1997 Kyushu Institute of Technology University of Maine Created because traditional forms of steganography were limited in information- hiding capacity Estimated at ≤10%

O LD S TEGANOGRAPHY VS. BPCS Old stego. Replace small frequency components of vessel data Replace LSB of vessel data BPCS Separate vessel into bit-planes Replace noisy regions in bit-planes with secret data Does not deteriorate quality Works because of limitations in human vision

V ISUALIZATION OF BPCS

K AWAGUCHI & E ASON ’ S F INDINGS Information-hiding capability is ≈50% Sharpening operations on vessel image increase embedding capacity significantly Canonical Gray coded bit-planes are better than binary bit-planes Randomization of the secret data by a compression operation makes the embedded data even harder to spot BPCS will never be overwriting the same bit- planes the same way from image to image

C ANONICAL G RAY VS. P URE B INARY Goal of BPCS is to maximize space in an image that can be used for data hiding PBC More space (noisier) Runs into “Hamming Cliff” problem Small change in color affects many bits CGC Flat regions stay flat at lower planes Does not have Hamming Cliffs Allows for more intelligent embedding

CGC VS PBC E XAMPLE PBC difference between 127 and CGC difference between 127 and

CGC VS PBC E XAMPLE

I MAGE C OMPLEXITY Length of black-and-white border in a binary image is used to measure complexity Length determined by number of color changes along the rows and columns in an image Image complexity α α = border length / max possible B-W changes 0 ≤ α ≤ 1 In BPCS, α is measured on a local level Small pixel areas, as opposed to entire image

A NALYSIS OF N OISY R EGIONS Conjugation α(P*) = 1 – α(P) Complexity of P* is symmetric to P about α=0.5 If the data is informative, it must be conjugated before embedding into vessel image

A NALYSIS OF N OISY R EGIONS Create a complexity distribution of vessel image Find point at which embedding data is viable e.g. α = 0.5 ± k*σ k is some constant σ is some deviation Not viable Viable

A NALYSIS OF N OISY R EGIONS Kawaguchi and Eason have determined that there is often a majority of noise-like 8x8 binary patterns In the previous example, 6.67x % were simple This is where BPCS gets its effectiveness compared to LSB steganography

K AWAGUCHI & E ASON I MPLEMENTATION Transform vessel image from PBC to CGC Segment bit-planes into informative and noisy regions using threshold value (e.g. α 0 =0.3) Group bytes of secret file into secret blocks If a block (S) is less complex than threshold (α 0 ), conjugate it Embed each secret block into noisy regions of the bit-planes Record conjugated blocks in conjugation map Embed conjugation map with secret blocks Convert vessel image back to PBC

K AWAGUCHI & E ASON I MPLEMENTATION Data to hide:

R ESULTS Image with a lot of flat regions

R ESULTS Image with few flat regions

M ODIFIABLE A LGORITHM P ARAMETERS Embedding location of secret file headers Embedding threshold α 0 Sequence in which 8x8 regions are considered for embedding Encoding of conjugation map Special operations XOR of header bytes with pseudo-random numbers Encryption parameters of secret files Compression parameters of secret files

R EGION S ELECTION S EQUENCE Demonstrated by Steve Beaullieu, Jon Crissey, Ian Smith UTSA Regions for embedding are considered from the bottom left to the top right This could be modified if a particular image warranted it

C ONT. Starting the embedding process from the LSB is another option to make the image more convincing Alternatively, change parameter for complexity with each plane

F URTHER I MPROVEMENTS Determining complexity using run length irregularity or border noisiness As opposed to number of borders Randomly distribute data As opposed to linearly, from one bit plane to next Encrypting data before embedding it

P ROBLEMS WITH BPCS Bit operations after embedding data may make data unrecoverable Not robust Complexity histogram of vessel image will be noticeably different

A PPLICATIONS Secrecy Embedding data publicly Without discernably altering quality of vessel Applying bit plane algorithms to files other than PBC images

M ULTIPLE -I MAGE S CHEME (D. S TOLERU )

M ULTIPLE -I MAGE S CHEME

M ORE E XAMPLES

S OURCES df