Top Banner
JPEG Image Steganalysis Using Variation Technique IIT School of Applied Technology Stephen Daniel [email protected] Indhi Powlette [email protected] Ana Orozco [email protected] Cruz Tovar [email protected]
22
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: SteganalysisPres

JPEG Image Steganalysis Using Variation Technique

IIT School of Applied Technology

Stephen [email protected]

Indhi [email protected]

Ana [email protected]

Cruz [email protected]

Page 2: SteganalysisPres

Steganography

Steganography is the art of passing information in a manner that the existence of the message is unknown.

Page 3: SteganalysisPres

Steganalysis

Steganalysis is the study of detecting a hidden message in an object.

Page 4: SteganalysisPres

Project Goals

Create JPEG images with hidden data using steganographic tools

Use Variation Technique to analyze clean and dirty images

Test variation technique validity by analyzing clean and dirty images

Page 5: SteganalysisPres

What is JPEG?

JPEG stores 24 bits of color per pixel = 16 million colorsJPEG is able to display rich colorsCan alter up to 3,932 pixels in a 65,535X65,535 pixel image

JPEG is a lossy compression algorithmJPEG discards some data when compressed to reduce file size

Page 6: SteganalysisPres

JPEG Compression

Compresses 8x8 pixel blocks from RGB to YCbCr

Page 7: SteganalysisPres

Least Significant BitIs a common technique used in Steganography

LSB is the lowest value in the bit orderLSB is replaced with the hidden data

Allows stego image to not appear significantly different from original

Page 8: SteganalysisPres

1 2

Page 9: SteganalysisPres

Stego & Steganalysis

Steganography

Steganography

Steganalysis

Stego

Page 10: SteganalysisPres

Variation TechniqueDeveloped by Jessica Fridrich and first detailed her book.

Statistical analysis may uncover clues of hidden data in an image.

Page 11: SteganalysisPres

EntropyOccurs when hidden data is

embedded into an image

Random uniform noise from the hidden data

Entropy increases when hidden data is embedded

Page 12: SteganalysisPres

Variation TechniqueIt is a measure of the entropy in an

image

The more hidden information in the

carrier, the amount of entropy increases

Page 13: SteganalysisPres

Process150 Clean Images

150 Outguess Images

150 F5 Images

Text files ranged from 65 bytes to over 9000 bytes

Page 14: SteganalysisPres

Variation Formula

Page 15: SteganalysisPres

Steganographic ToolsOutguess

Open source programHides data in least significant bit

F5Hides data by implementing matrix encoding Improves the efficiency of embedding

Page 16: SteganalysisPres

Steganalysis ToolsJPEGSnoop

Page 17: SteganalysisPres

Steganalysis Tools (Cont.)

MATLAB

Page 18: SteganalysisPres
Page 19: SteganalysisPres

Histograms

Page 20: SteganalysisPres

Results

Page 21: SteganalysisPres

ConclusionAside from Jessica, no one really has tried using the variation

technique

Analysis with variation technique shows interesting results for F5 and Outguess

Differences in result values could be attributed to different hiding methods used by F5 and Outguess

Page 22: SteganalysisPres