1 Techniques Common approaches include: LSB insertion Masking and filtering Algorithms and transfo rmations Image Steganography
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 1/26
1
Techniques
Common approaches include:
LSB insertion
Masking and filtering
Algorithms and transformations
Image Steganography
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 2/26
2
LSB insertion
Simplest approach
LSBs of bytes of cover image replaced withmessage bits
Techniques
Cover image
Message to be
embedded
Encryption
(optional)
MSB
LSB
Stego imageKey
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 3/26
3
LSB insertion
Example:
Hiding letter A in an image
Binary code for A is 10000011
Assume 3 pixels of raster data
(00100111 11101001 11001000)
(00100111 11001000 11101001)
(11001000 00100111 11101001)
Replace each LSB with bit of A
Techniques
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 4/26
4
LSB insertion
Example:
Hiding letter A in an image
Binary code for A is 10000011
New raster data is
(00100111 11101000 11001000)
(00100110 11001000 11101000)
(11001001 00100111 11101001)
Techniques
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 5/26
5
DCT manipulation
Data is inserted during JPEG compressionprocess
First we divide image into 8 x 8 blocks of pixels
Techniques
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 6/26
6
DCT manipulation
Data is inserted during JPEG compressionprocess
Now we take the 64 (8 x 8) pixel values f(x,y) and calculate their DCT coefficients F(u,v)
Next step is quantization
Techniques
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 7/26
7
DCT manipulation
Data is inserted during JPEG compressionprocess
Data is placed in the LSBs of the quantized DCTcoefficients
Techniques
DCT coefficients
Message to be
embedded
Encryption
(optional)
MSB
LSB
Modified
coefficients
Key
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 8/26
8
Basic concepts…
Uncompressed audio files containredundant information
Human Auditory System has some limitations
This is exploited by compression algorithms
like MP3
Such compression algorithms can bemodified to spare some redundant portions
and then embed data in them
Audio Steganography
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 9/26
9
Techniques
Some methods are:
Low-bit encoding
Phase encoding
Spread-spectrum encoding
Echo data hiding
Audio Steganography
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 10/26
10
Low-bit encoding
Audio version of LSB insertion
Message bits embedded in LSBs of audiosamples
Embedding may straight or random
Audio Steganography
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 11/26
11
Phase encoding
Message bit is represented by two valuesof phase
Audio sample is broken into small segments
Audio Steganography
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 12/26
12
Phase encoding
Message bit value (0/1) is represented bytwo values of phase
Initial phase of each segment is changed toone of the two reference values
Phases of remaining samples are also changedto maintain phase relationships
Audio Steganography
Change phase of 1st sampleaccording to message bit
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 13/26
13
Spread spectrum
Same as for images
Message is OR-ed with PN sequence and addedto audio sample LSBs or LSBs of their FFT coefficients
Audio Steganography
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 14/26
14
Echo data hiding
Message is ‘hidden’ in the time delaybetween sounds and their echos
By having two values of echo delay, we canencode 0s and 1s
For small values of echo delay, human ear doesnot perceive echo as distortion
Audio Steganography
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 15/26
15
What is it?
Digital watermarks are embedded in audioor visual media primarily to protectcopyrights
Watermarks may be visible or invisible
E.g. Channel logo on the TV screen
They must be robust against destructivemanipulation
Capacity is not an issue here, nor is secrecy
Digital Watermarking
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 16/26
16
Steganography vs. Watermarking
Differences
Steganography is a
means of covertcommunication
It must be ‘invisible’ toa third party
Cover capacity isimportant
Watermarking is used
to protect authorshipof digital media
Watermarks may ormay not be invisible
Cover capacity is notimportant, as messagesize is small
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 17/26
17
Public domain software
S-Tools
Invisible Secrets
White Noise Storm
MP3Stego Many more…
Steganography Tools
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 18/26
18
Types
Passive
Involves detecting the presence of a hiddenmessage and guessing the algorithm used
Active
Involves attempting to extract or modify themessage
Steganalysis
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 19/26
19
Data erasure
Audio
Replacing LSBs with random data
Resampling
Echo cancellation
Steganalysis
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 20/26
20
Where has Steganography found use?
Governments, law enforcement agencies
Covert communication
Media companies
Digital watermarking
Medical institutions
Matching patients’ records and images
Corporations and individuals
Applications
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 21/26
21
Some cases of misuse…
Extensive use of steganography by al-Qaeda terrorists to exchange information
Revealed by CIA after 9/11
Cases reported of corporate employees
using steganography to leak out sensitivedata
Some anti-social groups using it for covert
communication
Applications
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 22/26
22
On the future of Steganography…
Steganography has advanced greatly since
the advent of computers, and will continueto do so
Steganography can be very successful,
provided the proper mechanisms arechosen
Future lies in ‘on-the-fly’ steganography
Concluding Remarks
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 23/26
23
On the future of Steganography…
Governments are investing heavy sums in
developing powerful Steganalysis tools todeal with hazards of unchecked data flow
Restrictions on development or export of
steganography will only provecounterproductive
Concluding Remarks
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 24/26
Outline
Steganography history
Steganography and Steganalysis
Security and capacity Targeted steganalysis techniques
Universal steganalysis
Next generation practical steganography Conclusion
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 25/26
Cover Media
Many options in modern communication system: Text Slack space Alternative Data Streams
TCP/IP headers Etc.
Perhaps most attractive are multimedia objects - Images Audio Video
We focus on Images as cover media. Though mostideas apply to video and audio as well.
8/3/2019 Grey Level Modification Steganography2
http://slidepdf.com/reader/full/grey-level-modification-steganography2 26/26
ISME Audio File
kab method or
enformation dal
dena