Top Banner
1 CS349 Cryptography Department of Computer Science Wellesley College Steganographic techniques A brief survey Stego Techniques 2-2 Steganographic taxonomies o Stenanographic systems can be grouped by the type of covers used (graphics, sound, text, executables) or by the techniques used to modify the covers o substitution, o transform domain techniques, o spread spectrum techniques, o statistical method, o distortion techniques o cover generation methods
12

Steganographic techniques - Wellesley CScs.wellesley.edu/~crypto/lectures/tr10.pdf · 1 CS349 Cryptography Department of Computer Science Wellesley College Steganographic techniques

Apr 26, 2018

Download

Documents

lytu
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Steganographic techniques - Wellesley CScs.wellesley.edu/~crypto/lectures/tr10.pdf · 1 CS349 Cryptography Department of Computer Science Wellesley College Steganographic techniques

1

CS349 Cryptography

Department of Computer ScienceWellesley College

Steganographic techniques

A brief survey

Stego Techniques 2-2

Steganographic taxonomies

o Stenanographic systems can be grouped by thetype of covers used (graphics, sound, text,executables) or by the techniques used tomodify the covers

o substitution,o transform domain techniques,o spread spectrum techniques,o statistical method,o distortion techniqueso cover generation methods

Page 2: Steganographic techniques - Wellesley CScs.wellesley.edu/~crypto/lectures/tr10.pdf · 1 CS349 Cryptography Department of Computer Science Wellesley College Steganographic techniques

2

Stego Techniques 2-3

Using grammar for mimicry*It's time for another gamebetween the Whappers and theBlogs in scenic downtownBlovonia . I've just got to saythat the Blog fans have come tosupport their team and rant andrave . Play Ball ! Top of theinning. Yup. What a game so fartoday . The pitcher spits. FrankGavi adjusts the cup and entersthe batter's box . Yeah. It's arattler . He swings for thestands, but no contact . Here'sthe pitch It's a bouncingknuckleball . . .

*http://www.wayner.org/texts/mimic/

Stego Techniques 2-4

Computer graphicso A digitized photograph is

represented by a matrixof numbers that stand forthe intensity of lightemanating from aparticular place at aparticular time.

o The array of charged-coupled devices thatconvert photons to bitsare not perfect.

Page 3: Steganographic techniques - Wellesley CScs.wellesley.edu/~crypto/lectures/tr10.pdf · 1 CS349 Cryptography Department of Computer Science Wellesley College Steganographic techniques

3

Stego Techniques 2-5

Soundo Digitized sounds are lists

of numbers representingpressure hitting amicrophone at a sequenceof time slices.

o Like digitized graphics,these numbers areimprecise and there is lotsof room to hideinformation in the noise.

Stego Techniques 2-6

Hidden volumeso At top scale, a Kodak

photo-CD images is 3072by 2048 pixels.

o Eight bits are used toencode each of theamount of red, blue, andgreen (or the amount cyan,magenta, and yellow).

o Borrowing the LSB ofeach color of each pixelyields about 1.8megabytes of storage.

Page 4: Steganographic techniques - Wellesley CScs.wellesley.edu/~crypto/lectures/tr10.pdf · 1 CS349 Cryptography Department of Computer Science Wellesley College Steganographic techniques

4

Stego Techniques 2-7

Where to hideo The least significant bits seem close to random, but often

contain hidden patterns.o Destroying these subtle statistical correlations may well

give the show away.

Peter Wayner’s deskDisappearing Cryptography.

Least significant bits of same

Stego Techniques 2-8

Another problemo Compressions artists often beat stenanographers to the

punch.o JPEG can often get by with one or two bits per pixel and

save a factor of ten in file size.

Peter Wayner’s desk again Most significant bits of same

Page 5: Steganographic techniques - Wellesley CScs.wellesley.edu/~crypto/lectures/tr10.pdf · 1 CS349 Cryptography Department of Computer Science Wellesley College Steganographic techniques

5

Stego Techniques 2-9

Hiding in a GIF fileo GIF compression

maintains a table of up to256 colors that bestrepresent the image.

o The color of each pixel isdescribed by indexing intothis color table.

o Changing the leastsignificant bit maysignificantly change theimage.

Stego Techniques 2-10

A possible solutiono Hide and Seek 4.1

converts the color tablefrom 256 colors to 128,then duplicates each ofthese colors so thatadjacent entries in thecolor table are duplicatesof each other.

o Unfortunately, thistechnique leaves a largered flag for anyonescanning GIFs for hiddeninformation.

Page 6: Steganographic techniques - Wellesley CScs.wellesley.edu/~crypto/lectures/tr10.pdf · 1 CS349 Cryptography Department of Computer Science Wellesley College Steganographic techniques

6

Stego Techniques 2-11

Another solutiono EzStego sorts the color

palette so that the colorsflow smoothly into eachother.

o The hope is that changingthe least significant bitdoesn’t drastically changethe color.

Stego Techniques 2-12

The Traveling Salesperson Problemo Ordering colors in one

dimension is easy.Ordering a threedimensional color space isnot.

o EzStego treats the colorsas cities in RGB space andand tries to find theshortest path through allof the stops.

Page 7: Steganographic techniques - Wellesley CScs.wellesley.edu/~crypto/lectures/tr10.pdf · 1 CS349 Cryptography Department of Computer Science Wellesley College Steganographic techniques

7

Stego Techniques 2-13

A heuristic for TSPBegin with a list of two

cities, {c1 c2}. Set C = c1.1. Find city, d, that is

farthest from C.2. Scan the list to find i

such thatd(d, ci) + d(d, ci+1) isminimized.

3. Insert d between i and i+1and set C = d.

Stego Techniques 2-14

EzStego covers its tracks

1. Sort the palette so closest colors fall next toeach other.

2. Encode the encrypted message by twiddling theleast significant bit.

3. Unsort the palette by renumbering all of thecolors with their original values.

4. Ship the image.5. Receiver resorts palette using same algorithm

and extracts bits by using the sorted palette.

Page 8: Steganographic techniques - Wellesley CScs.wellesley.edu/~crypto/lectures/tr10.pdf · 1 CS349 Cryptography Department of Computer Science Wellesley College Steganographic techniques

8

Stego Techniques 2-15

GIFShuffleo A palette containing N colors can be permuted in N!

different ways. Each permutation may encode log2(N!) bitsof information.

Original palette Sorted palette Permuted palette

Stego Techniques 2-16

Transform domain techniques

o LSB modification techniques are highlyvulnerable to even small cover modifications.

o Transform domain methods hide messages insignificant areas of the cover image making themmore robust modification than LSB methods.

o JPEGs are perfect candidates for hidinginformation using such methods.

Page 9: Steganographic techniques - Wellesley CScs.wellesley.edu/~crypto/lectures/tr10.pdf · 1 CS349 Cryptography Department of Computer Science Wellesley College Steganographic techniques

9

Stego Techniques 2-17

Fourier serieso Fourier series are expansions of periodic functions f(x) in

terms of an infinite sum of sines and cosines of the form

o Successive partial sums produce increasingly accurateapproximations to the f(x).

Stego Techniques 2-18

Cosines sufficeo Cosine functions similar to those shown below are used to

model sound waves in MP3 music compression.

Page 10: Steganographic techniques - Wellesley CScs.wellesley.edu/~crypto/lectures/tr10.pdf · 1 CS349 Cryptography Department of Computer Science Wellesley College Steganographic techniques

10

Stego Techniques 2-19

Gimme a Wo The Wellesley W was

recreated using the fourcosine functions shown onthe previous slide:1.0 cos(x) + 0.5 cos(2x) -0.8 cos (3x) + 0.3 cos(4x).

o MP3 compression usesDiscrete cosinetransforms to find cosinecoefficients givensequences of soundsamples.

Stego Techniques 2-20

A two-dimensional discrete analogueo The discrete cosine transform of a two-dimensional N x N

array, s, of real numbers is given by

o The inverse cosine transform is given by

where C(u) equals 2-1/2 if u is 0 and 1 otherwise.

S(u, v) =2N

C(u)C(v) s(x, y)cos(pu(2x +1)2Ny = 0

N -1

Âx =0

N-1

 )cos(p (2y +1)2N

)

s(x,y) =2N

C(u)C(v) S(u, v)cos(pu(2x +1)2Nv =0

N -1

Âu= 0

N -1

 )cos(p (2y +1)2N

)

Page 11: Steganographic techniques - Wellesley CScs.wellesley.edu/~crypto/lectures/tr10.pdf · 1 CS349 Cryptography Department of Computer Science Wellesley College Steganographic techniques

11

Stego Techniques 2-21

JPEG compression

Convert image into YCbCr colorspace and break up each colorplane into 8x8 blocks.

All blocks are DCT transformed.

Divide DCT coefficientsby predefined quantizationvalues to modulate influenceof spectral components on image.

Compress the quantizedDCT coefficients usingentropy coder.

Stego Techniques 2-22

Quantization factorso DCT coefficients corresponding to highest frequency

cosines are likely to be dominated by noise.o Values in the quantization table are calculated to reduce the

influence of these “noisy” coefficients.

Page 12: Steganographic techniques - Wellesley CScs.wellesley.edu/~crypto/lectures/tr10.pdf · 1 CS349 Cryptography Department of Computer Science Wellesley College Steganographic techniques

12

Stego Techniques 2-23

Encoding in the frequency domain1. Select two DCT coefficients,

Bi (u1, v1) and Bi(u2, v2) whosecorresponding cosinesfunctions are in the mid-frequency with equalquantization coeffs.

2. Split the cover into 8x8pixel blocks; each blockencodes one bit.

3. Select a pseudorandom blockbi to encode the ith messagebit.

4. Block encodes a 1 if Bi (u1, v1)> Bi(u2, v2) , otherwise a 0.