Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

Similar documents
Basic concepts of Digital Watermarking. Prof. Mehul S Raval

An Enhanced Least Significant Bit Steganography Technique

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

Information Hiding: Steganography & Steganalysis

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Integer Wavelet Bit-Plane Complexity Segmentation Image Steganography

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

Colored Digital Image Watermarking using the Wavelet Technique

Analysis of Secure Text Embedding using Steganography

LSB Encoding. Technical Paper by Mark David Gan

An Integrated Image Steganography System. with Improved Image Quality

A Study on Steganography to Hide Secret Message inside an Image

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

Digital Media. Lecture 4: Bitmapped images: Compression & Convolution Georgia Gwinnett College School of Science and Technology Dr.

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

Compression and Image Formats

Ch. 3: Image Compression Multimedia Systems

Image Compression and Decompression Technique Based on Block Truncation Coding (BTC) And Perform Data Hiding Mechanism in Decompressed Image

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

Assistant Lecturer Sama S. Samaan

An Implementation of LSB Steganography Using DWT Technique

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation

Survey on Modified BPCS Steganography based on sequence of cipher bits

Implementation of Effective, Robust and BPCS Data Embedding using LSB innovative Steganography Method

Chapter 9 Image Compression Standards

Uncompressed Image Steganography using BPCS: Survey and Analysis

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

2.1. General Purpose Run Length Encoding Relative Encoding Tokanization or Pattern Substitution

FPGA implementation of LSB Steganography method

HYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM

ECC419 IMAGE PROCESSING

Steganography using LSB bit Substitution for data hiding

Hiding And Encrypting Binary Images Using A Different Approach

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

A Study on Image Steganography Approaches in Digital Images

A Proposed Technique For Hiding Data Into Video Files

AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE

Different Steganography Methods and Performance Analysis

AN OPTIMIZED APPROACH FOR FAKE CURRENCY DETECTION USING DISCRETE WAVELET TRANSFORM

A New Image Steganography Depending On Reference & LSB

The Scientist and Engineer's Guide to Digital Signal Processing By Steven W. Smith, Ph.D.

Keywords Secret data, Host data, DWT, LSB substitution.

Medical Image Encryption and Compression Using Masking Algorithm Technique

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor

Concealing Data for Secure Transmission and Storage

Dynamic Collage Steganography on Images

Lossy and Lossless Compression using Various Algorithms

Performance Improving LSB Audio Steganography Technique

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

The Strengths and Weaknesses of Different Image Compression Methods. Samuel Teare and Brady Jacobson

Principle and applications of BPCS-Steganography

A Secure Robust Gray Scale Image Steganography Using Image Segmentation

A PROPOSED ALGORITHM FOR DIGITAL WATERMARKING

Image Compression Supported By Encryption Using Unitary Transform

Image Processing Computer Graphics I Lecture 20. Display Color Models Filters Dithering Image Compression

2. REVIEW OF LITERATURE

An Improvement for Hiding Data in Audio Using Echo Modulation

Lossless Image Watermarking for HDR Images Using Tone Mapping

New High Capacity Secure Steganography Technique

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

IJESRT: 7(10), October, 2018 ISSN:

A New Steganographic Method for Palette-Based Images

Digital Image Sharing using Encryption Processes

Transform Domain Technique in Image Steganography for Hiding Secret Information

Sterilization of Stego-images through Histogram Normalization

from: Point Operations (Single Operands)

Improved Detection of LSB Steganography in Grayscale Images

HSI Color Space Conversion Steganography using Elliptic Curve

<Simple LSB Steganography and LSB Steganalysis of BMP Images>

An Overview of Image Steganography Techniques

Detection of Steganography using Metadata in Jpeg Files

Background Dirty Paper Coding Codeword Binning Code construction Remaining problems. Information Hiding. Phil Regalia

Digital Image Processing Introduction

PRIOR IMAGE JPEG-COMPRESSION DETECTION

Bitmap Steganography:

Image Steganography using Sudoku Puzzle for Secured Data Transmission

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2

Resampling and the Detection of LSB Matching in Colour Bitmaps

Image Steganography based on a Parameterized Canny Edge Detection Algorithm

DESIGNING EFFICIENT STEGANOGRAPHIC ALGORITHM FOR HIDING MESSAGE WITHIN THE GRAYSCALE COVER IMAGE

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

ELTYEB E. ABED ELGABAR

Digital Image Processing. Lecture # 3 Image Enhancement

Computer Graphics. Si Lu. Fall er_graphics.htm 10/02/2015

MORE ADVANCED STEGANOGRAPHY USING BPCS

Fundamentals of Multimedia

Local prediction based reversible watermarking framework for digital videos

Investigation of Various Image Steganography Techniques in Spatial Domain

Chapter 8. Representing Multimedia Digitally

Implementation Of Steganography For Business Documents Security Using Discrete Wavelet Transform Method

A Novel Approach for Hiding Huge Data in Image

Application of Histogram Examination for Image Steganography

CSE 3482 Introduction to Computer Security.

Image Compression and its implementation in real life

Transcription:

Introduction to More Advanced Steganography John Ortiz Crucial Security Inc. San Antonio John.Ortiz@Harris.com 210 977-6615 11/17/2011 Advanced Steganography 1

Can YOU See the Difference? Which one of these pictures has a secret message? One of them contains 74108 bytes of secret data. The original is 574,421 bytes (new size 450,072) That s 16.47% data hiding capacity 11/17/2011 Advanced Steganography 2

A Closer Look Picture #1 11/17/2011 Advanced Steganography 3

A Closer Look Picture #2 11/17/2011 Advanced Steganography 4

Who s Hiding in There? 11/17/2011 Advanced Steganography 5

Agenda Attention Getter A little bit about me Overview Hiding in the Least Significant Bit Advanced Techniques for Geeks Bit Plane Complexity Segmentation (BPCS) Hiding in Compressed Jpeg Images Questions/Comments/Complaints 11/17/2011 Advanced Steganography 6

I m a GeeK About Me the 20 min Version 11/17/2011 Advanced Steganography 7

Enough About Me Overview 11/17/2011 Advanced Steganography 8

Overview Information Hiding is a branch of computer science that deals with concealing the existence of a message It is related to cryptography whose intent is to render messages unreadable, except by the intended recipients It employs technologies from numerous science disciplines: Digital Signal Processing (Images, Audio, Video) Cryptography Information Theory\Coding Theory Data Compression Discrete Math Data Networks Human Visual/Auditory perception 11/17/2011 Advanced Steganography 9

Overview There are four primary sub-disciplines of Information Hiding Steganography Watermarking Covert Channels Anonymity 11/17/2011 Advanced Steganography 10

Goals of Steganography Steganography s primary goal is to hide data within some other data such that the hidden data cannot be detected even if it is being sought 11/17/2011 Advanced Steganography 11

Goals of Steganography Security Perception, automated detection, levels of failure Capacity Maximize amount of hidden data Tradeoff with security/robustness Robustness Resilience to stego file alterations 11/17/2011 Advanced Steganography 12

Less Advanced Steganography Basic Hiding 11/17/2011 Advanced Steganography 13

We re Gonna Hide This: 11/17/2011 Advanced Steganography 14

In This: 11/17/2011 Advanced Steganography 15

Then That In This: 11/17/2011 Advanced Steganography 16

Least Significant Bits Substitution: Replace information in the cover with the stego-message Most common: replace the Least Significant Bit (LSB) Each pixel in the next image is composed of 24 bits 8 bits for RED, 8 for GREEN, and 8 for BLUE (RGB) Lower four bits of each color, hold the upper 4 bits of the hidden picture s colors in each corresponding pixel Other images with more solid backgrounds would NOT provide the same level of imperceptibility To maximize capacity while maintaining imperceptibility, the cover image is a consideration 11/17/2011 Advanced Steganography 17

Can YOU See a Difference? The Dalmatian is hiding in 4 bits of the Mandrill 11/17/2011 Advanced Steganography 18

You CAN See a Difference! More uniform colors in the cover is NOT effective 11/17/2011 Advanced Steganography 19

Limitations 4 5 6 7 11/17/2011 Advanced Steganography 20

Limitations 4 5 6 7 11/17/2011 Advanced Steganography 21

No Hidden Image Bit Planes 11/17/2011 Advanced Steganography 22

Bit Planes 11/17/2011 Advanced Steganography 23

Least Significant Bits This particular technique substitutes image bits of one picture into another Both pictures must be the same size More typical is to substitute bits from the message one by one Then, the message can be anything Easily detectible Examine the histograms for anomalies We can slice the image into bit planes 11/17/2011 Advanced Steganography 24

Least Significant Bits - Histograms 11/17/2011 Advanced Steganography 25

More Advanced Steganography Bit-Plane Complexity Segmentation (BPCS) 11/17/2011 Advanced Steganography 26

Bit Plane Complexity Segmentation More advanced Substitution Technique Little less capacity Harder to detect Harder to extract Message is spread across several bit planes Possibly even the Most Significant Bit (MSB) plane I am going to skip some implementation details 11/17/2011 Advanced Steganography 27

Bit Plane Complexity Segmentation Hides in areas of image that are complex The mandrill has a large number of complex areas The dalmatian has much fewer complex areas The Least Significant bit plane is complex for both MSB LSB MSB LSB 11/17/2011 Advanced Steganography 28

Bit Plane Complexity Segmentation A complexity measure is taken for each 8 x 8 matrix No standard complexity measure The one used in the initial paper is a black and white border length complexity measurement If the border length is long, the image is complex This technique can fail The total length of the border is the sum of the number of black/white changes along the rows and columns Remember, we are using the measure on bit planes, so every pixel is either a one or zero Ex. A black pixel, surrounded by all white, has a border length of 4 11/17/2011 Advanced Steganography 29

Bit Plane Complexity Segmentation Left: A simple block with low complexity Right: A complex block k M α th is the threshold Border length over total Determined to be around 0.3 Must be less than 0.5 (we ll see why shortly) 11/17/2011 Advanced Steganography 30

Bit Plane Complexity Segmentation If a region is complex enough, the image data is replaced by the message data The message data is first transformed into an 8x8 bit array, and that array is stored in place of the original data Does anyone see a problem during extraction? 11/17/2011 Advanced Steganography 31

Bit Plane Complexity Segmentation What if the message data itself is not complex? During extraction, the region will no longer exceed the complexity threshold No data will be extracted Must conjugate the resource data The 8x8 matrix is exclusive-or d with a checkerboard pattern 11/17/2011 Advanced Steganography 32

Bit Plane Complexity Segmentation Conjugation shown graphically 11/17/2011 Advanced Steganography 33

Bit Plane Complexity Segmentation The complexity of P* is ( 1 α P ) As long as α th is less than 0.5, if P is not complex enough, P* will be Note: (P*)* = P ( a xor b) xor a == b This ensures that whenever information is embedded, the complexity will be greater than the threshold Now the problem is determining which regions are original data and which ones are conjugate data 11/17/2011 Advanced Steganography 34

Solution! Bit Plane Complexity Segmentation Reserve one bit of each region to indicate conjugation Make the lower left bit of the 8x8 matrix a zero If conjugation occurs, it will become a one This does use 1/64 of your embedding capacity Other solutions proposed, this is the simplest 11/17/2011 Advanced Steganography 35

Suggested Threshold of 0.3 Thresh=0.3, cap = 134KB/258KB 11/17/2011 Advanced Steganography 36

Unmodified 11/17/2011 Advanced Steganography 37

Thresh=0.3, cap = 134KB/258KB 11/17/2011 Advanced Steganography 38

Bit Plane Complexity Segmentation 11/17/2011 Advanced Steganography 39

Lower Complexity Threshold Thresh=0.2, cap = 163KB/258KB Thresh=0.1, cap = 193KB/258KB 11/17/2011 Advanced Steganography 40

Lower Complexity Threshold 11/17/2011 Advanced Steganography 41

Less Complex Image Thresh=0.3, cap = 106KB/258KB 11/17/2011 Advanced Steganography 42

Color BPCS Thresh=0.4, cap = 405KB/769KB Thresh=0.3, cap = 557KB/769KB 11/17/2011 Advanced Steganography 43

Bit Plane Complexity Segmentation The cover image matters!!! Other authors proposed better complexity measures Less perceptible BUT, less capacity 11/17/2011 Advanced Steganography 44

More Advanced Steganography Transform Domain 11/17/2011 Advanced Steganography 45

Transform Domain Transform domain methods hide data in significant portions of the cover as opposed to least significant Generally more robust to manipulation affine transforms scaling, rotating, shearing, translating, flipping lossy compression analog to digital and digital to analog conversions 11/17/2011 Advanced Steganography 46

Jpeg Process 8 X 8 Image Block (0,0) Quantization Table 16 11 10 16 24 40 51 61 12 12 14 19 26 58 60 55 14 13 16 24 40 57 69 56 14 17 22 29 51 87 80 62 18 22 37 56 68 109 103 77 24 35 55 64 81 104 113 92 49 64 78 87 103 121 120 101 72 92 95 98 112 100 103 99 Color Plane Conversion DCT Quantizer Entropy Encoder (Huffman) Run-Length Encoding 11/17/2011 Advanced Steganography 47

JPEG Process Converts color RGB to YC r C b Y is the luminance component C r & C b are the chrominance components Grayscale images only have the Y component The image is divided into 8 x 8 blocks A 2-dimensional Discrete Cosine Transform (DCT) is performed on each 11/17/2011 Advanced Steganography 48

JPEG Process Results is quantized according to desired quality The quantization is the primary lossy part A combination of Run-Length Encoding (RLE) and Huffman coding is applied to finish the compression This process is lossless To get the image back, the process is reversed The restored image is similar in appearance, but mathematically different from the original If high quality is used, there is little, if any, perceptible difference 11/17/2011 Advanced Steganography 49

DCT Hiding Technique High Capacity Data Hiding in JPEG Compressed Images Chang, C.C. and Tseng, Hsien-Wen An adaptive Discrete Cosine Transform, Least Significant Bit technique Hides in lower and middle frequency components Adapts to different characteristics of each block Performs capacity estimation >> Greater than 1 bit per 8x8 block 11/17/2011 Advanced Steganography 50

DCT Hiding Technique Capacity Estimation Determine max number of bits that can be modified while remaining imperceptible Uses a capacity table based upon the quantization table user sets an α (alpha) factor higher α, higher bit rate, but increased distortion lower frequency components hold fewer bits higher frequency can hold more bits, but there are fewer 11/17/2011 Advanced Steganography 51

DCT Hiding Technique Each table is 8x8, we ll use x,y to denote a specific element C Q (x,y) = lg(α * Q(x,y) ) Capacity based on Quantization table M (x,y) = lg ( D(x,y) ) Capacity based on DCT coefficients Use the lower of these two 11/17/2011 Advanced Steganography 52

DCT Hiding Technique Block Classification determine which blocks are better candidates for hiding If a background has a strong texture, the Human Visual System (HVS) is less sensitive to distortions Blocks divided into two classes: uniform blocks non-uniform blocks Non-uniform blocks use a larger α value (1.2 * α) D x is the x th AC coefficient 63 If G is below a threshold, the block G ( is uniform x 1 D x 2 ) 11/17/2011 Advanced Steganography 53

Embedding Algorithm: Set the α value Choose the block to be embedded Determine classification of block: uniform, non-uniform Determine number of bits to hide in each quantized DCT coefficient Embed the data Apply the normal JPEG entropy coding 11/17/2011 Advanced Steganography 54

High Capacity Example #1 (quality=95%) Mandrill512.bmp_q95_a8_u8.jpg ---> 71745/ 71745 22.24% of stego 11/17/2011 Advanced Steganography 55

High Capacity Example #2 (quality=95%) Domino512.bmp_q95_a8_u8.jpg ---> 38827 / 38827 22.07% of stego 11/17/2011 Advanced Steganography 56

High Capacity Example #3 (quality=99%) S2_Rocky.jpg_q99_a8_u8.jpg ---> 107643 / 107643 21.06% of stego 11/17/2011 Advanced Steganography 57

High Capacity Example #4 (quality=50%) S2_Rocky.jpg_q50_a8_u8.jpg ---> 6612/ 6612 17.66% of stego 11/17/2011 Advanced Steganography 58

High Capacity Example #5 (quality=50%) S2_Rocky_A.jpg_q50_a8_u8.jpg ---> 1575/ 6612 18.81% of stego 11/17/2011 Advanced Steganography 59

Histograms Are Not Effective for Jpeg 60

Fix Your Hair and Take a Breath Now What Questions Do You Have? For more information or the actual software contact me @ John.Ortiz@Harris.com PLEASE COMPLETE PRESENTATION EVALUATIONS 11/17/2011 Advanced Steganography 61