Top Banner
1 Techniques Common approaches include: LSB insertion Masking and filtering  Algorithms and transfo rmations Image Steganography
26

Grey Level Modification Steganography2

Apr 07, 2018

Download

Documents

Ramesh Jain
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 1/26

1

Techniques

Common approaches include:

LSB insertion

Masking and filtering

 Algorithms and transformations

Image Steganography

Page 2: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 2/26

2

LSB insertion

Simplest approach

LSBs of bytes of cover image replaced withmessage bits

Techniques

Cover image

Message to be

embedded

Encryption

(optional)

MSB

LSB

Stego imageKey

Page 3: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 3/26

3

LSB insertion

Example:

Hiding letter A in an image

Binary code for A is 10000011

 Assume 3 pixels of raster data

(00100111 11101001 11001000)

(00100111 11001000 11101001)

(11001000 00100111 11101001)

Replace each LSB with bit of A 

Techniques

Page 4: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 4/26

4

LSB insertion

Example:

Hiding letter A in an image

Binary code for A is 10000011

New raster data is

(00100111 11101000 11001000)

(00100110 11001000 11101000)

(11001001 00100111 11101001)

Techniques

Page 5: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 5/26

5

DCT manipulation

Data is inserted during JPEG compressionprocess

First we divide image into 8 x 8 blocks of pixels

Techniques

Page 6: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 6/26

6

DCT manipulation

Data is inserted during JPEG compressionprocess

Now we take the 64 (8 x 8) pixel values f(x,y)  and calculate their DCT coefficients F(u,v)  

Next step is quantization

Techniques

Page 7: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 7/26

7

DCT manipulation

Data is inserted during JPEG compressionprocess

Data is placed in the LSBs of the quantized DCTcoefficients

Techniques

DCT coefficients

Message to be

embedded

Encryption

(optional)

MSB

LSB

Modified

coefficients

Key

Page 8: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 8/26

8

Basic concepts… 

Uncompressed audio files containredundant information

Human Auditory System has some limitations

This is exploited by compression algorithms

like MP3

Such compression algorithms can bemodified to spare some redundant portions

and then embed data in them

 Audio Steganography

Page 9: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 9/26

9

Techniques

Some methods are:

Low-bit encoding

Phase encoding

Spread-spectrum encoding

Echo data hiding

 Audio Steganography

Page 10: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 10/26

10

Low-bit encoding

 Audio version of LSB insertion

Message bits embedded in LSBs of audiosamples

Embedding may straight or random

 Audio Steganography

Page 11: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 11/26

11

Phase encoding

Message bit is represented by two valuesof phase

 Audio sample is broken into small segments

 Audio Steganography

Page 12: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 12/26

12

Phase encoding

Message bit value (0/1) is represented bytwo values of phase

Initial phase of each segment is changed toone of the two reference values

Phases of remaining samples are also changedto maintain phase relationships

 Audio Steganography

Change phase of 1st sampleaccording to message bit

Page 13: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 13/26

13

Spread spectrum

Same as for images

Message is OR-ed with PN sequence and addedto audio sample LSBs or LSBs of their FFT coefficients

 Audio Steganography

Page 14: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 14/26

14

Echo data hiding

Message is ‘hidden’ in the time delaybetween sounds and their echos

By having two values of echo delay, we canencode 0s and 1s

For small values of echo delay, human ear doesnot perceive echo as distortion

 Audio Steganography

Page 15: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 15/26

15

What is it?

Digital watermarks are embedded in audioor visual media primarily to protectcopyrights

Watermarks may be visible or invisible

E.g. Channel logo on the TV screen

They must be robust against destructivemanipulation

Capacity is not an issue here, nor is secrecy

Digital Watermarking

Page 16: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 16/26

16

Steganography vs. Watermarking

Differences

Steganography is a

means of covertcommunication

It must be ‘invisible’ toa third party

Cover capacity isimportant

Watermarking is used

to protect authorshipof digital media

Watermarks may ormay not be invisible

Cover capacity is notimportant, as messagesize is small

Page 17: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 17/26

17

Public domain software

S-Tools

Invisible Secrets

White Noise Storm

MP3Stego Many more… 

Steganography Tools

Page 18: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 18/26

18

Types

Passive

Involves detecting the presence of a hiddenmessage and guessing the algorithm used

 Active

Involves attempting to extract or modify themessage

Steganalysis

Page 19: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 19/26

19

Data erasure

 Audio

Replacing LSBs with random data

Resampling

Echo cancellation

Steganalysis

Page 20: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 20/26

20

Where has Steganography found use?

Governments, law enforcement agencies

Covert communication

Media companies

Digital watermarking

Medical institutions

Matching patients’ records and images 

Corporations and individuals

 Applications

Page 21: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 21/26

21

Some cases of misuse… 

Extensive use of steganography by al-Qaeda terrorists to exchange information

Revealed by CIA after 9/11

Cases reported of corporate employees

using steganography to leak out sensitivedata

Some anti-social groups using it for covert

communication

 Applications

Page 22: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 22/26

22

On the future of Steganography… 

Steganography has advanced greatly since

the advent of computers, and will continueto do so

Steganography can be very successful,

provided the proper mechanisms arechosen

Future lies in ‘on-the-fly’ steganography 

Concluding Remarks

Page 23: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 23/26

23

On the future of Steganography… 

Governments are investing heavy sums in

developing powerful Steganalysis tools todeal with hazards of unchecked data flow

Restrictions on development or export of 

steganography will only provecounterproductive

Concluding Remarks

Page 24: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 24/26

Outline

Steganography history

Steganography and Steganalysis

Security and capacity Targeted steganalysis techniques

Universal steganalysis

Next generation practical steganography Conclusion

Page 25: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 25/26

Cover Media

Many options in modern communication system: Text Slack space Alternative Data Streams

TCP/IP headers Etc.

Perhaps most attractive are multimedia objects - Images Audio Video

We focus on Images as cover media. Though mostideas apply to video and audio as well.

Page 26: Grey Level Modification Steganography2

8/3/2019 Grey Level Modification Steganography2

http://slidepdf.com/reader/full/grey-level-modification-steganography2 26/26

ISME Audio File

kab method or

enformation dal

dena