nps1ac

Upload: pranitha-kuchipudi

Post on 08-Apr-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/7/2019 nps1AC

    1/5

    1

    A Review of Data Hiding in Images

    Eugene T. Lin and Edward J. Delp

    Kristin Burke 2

    Overview

    Introduction

    Digital Steganography

    Applications

    Copyright Protection

    Feature Tagging

    Secret Communications

    Data Hiding Techniques

    Digital Embedding

    Steganalysis

    3

    Introduction

    Steganography - hiding secret information

    so that its existence is concealed

    Used for hundreds of years

    Example:

    Im feeling really stuffy. Emilys medicine

    wasnt strong enough without another

    febrifuge.

    4

    Digital Steganography

    Terminology

    Message

    Data that the sender wishes to hide

    Can be text, images, audio, video, etc.

    Cover

    Medium in which the message is embedded

    Stego-image

    The resulting image and the message combined

    Stego-key (optional)

    used to extract the message from the stego-image

    5 6

    Digital Steganography

    Recovering the message from the stego-

    image requires:

    stego-image

    stego-key (if applicable)

    (sometimes) original image

  • 8/7/2019 nps1AC

    2/5

  • 8/7/2019 nps1AC

    3/5

    13

    Steganos

    Specific LSB technique

    Can imbed data in image, audio and text

    covers

    Digital Image Steganography: Data Sneaking Between the Pixels 14

    24 bit image example:

    24 bit images use 3 bytes to represent a color value (8 bits = 1 byte)

    1 pixel = (00100111 11101001 11001000)

    red green blue

    Simplified Example with a 24 bit pixel:

    1 pixel: (00100111 11101001 11001000)

    Insert 101: (00100111 11101000 11001001)

    red green blue

    http://www.mills.edu/ACAD_INFO/MCS/CS/S02MCS125/Steganography.htm

    LSB

    15

    LSB Example- Step 1

    16

    LSB Example - Step 2

    The first least signifi cant bitplane of Arctic hare has been replaced with the f irst mostsignificant bitplane of F15: 64 KB hidden. Extracted to the right.

    17

    LSB Example - Step 3

    The 2 least significant bitplanes of Arctic hare have been replaced with the 2 mostsignificant bitplanes of F15: 129 KB hidden.

    18

    LSB Example - Step 6

    The 5 least significant bitplanes of Arctic hare have been replaced with the 5 mostsignificant bitplanes of F15: 323 KB hidden

  • 8/7/2019 nps1AC

    4/5

    19

    LSB Example - Step 7

    The 7 least significant bitplanes of Arctic hare have been replaced with the 7 mostsignificant bitplanes of F15: 452 KB hidden.

    http://www.cl.cam.ac.uk/~fapp2/steganography/image_downgrading/08.html

    20

    Transform Embedding

    Embedding the message by modulating thecoefficients in a transform domain

    Discrete-Cosine Transformation (DCT) Discrete Courier Transform

    Wavelet Transform

    Offer superior robustness against lossycompression

    Spread-spectrum techniques spread energyof message across frequency bands

    21

    DCT

    DCT or wavelettransform

    f

    Find

    insignificant

    coefficients

    Insert

    101110111011

    110011010011

    101101011101

    100011011101

    (message)

    into coefficientsTake inverse

    transform

    f-1

    22

    Perceptual Masking Systems

    Exploit properties of the human visual

    system

    Masking - signal is imperceptible in the

    presence of other signals (needle in a

    haystack)

    Perform analysis of image before

    imbedding and place data in specific

    regions

    23

    Steganalysis

    Practice of attacking steganographicmethods by detection, destruction,

    extraction or modification of embedded data Success:

    Finding message in secret communication

    Finding & changing watermark in copyrightimages

    Like cryptanalysis in that entire securitybased on stego-key

    24

    Steganalysis

    Techniques divided into categories:

    stego-only

    known cover known message

    chosen stego

    chosen message (most powerful)

    Most difficult attacks:

    Modifying the embedded message

    Deducing the stego-key

  • 8/7/2019 nps1AC

    5/5

    25

    Review

    Introduction

    Digital Steganography

    Applications

    Data Hiding Techniques

    Digital Embedding

    Steganalysis

    26

    Questions?