Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

Similar documents
Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

FPGA implementation of LSB Steganography method

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

The Scientist and Engineer's Guide to Digital Signal Processing By Steven W. Smith, Ph.D.

Resampling and the Detection of LSB Matching in Colour Bitmaps

An Enhanced Least Significant Bit Steganography Technique

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

An Implementation of LSB Steganography Using DWT Technique

A Study on Steganography to Hide Secret Message inside an Image

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

A Proposed Technique For Hiding Data Into Video Files

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

Information Hiding: Steganography & Steganalysis

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR REGION SELECTION

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques

Steganography using LSB bit Substitution for data hiding

Colored Digital Image Watermarking using the Wavelet Technique

<Simple LSB Steganography and LSB Steganalysis of BMP Images>

A New Image Steganography Depending On Reference & LSB

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

Compression and Image Formats

Application of Histogram Examination for Image Steganography

An Integrated Image Steganography System. with Improved Image Quality

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

Concealing Data for Secure Transmission and Storage

Digital Image Processing

Ch. 3: Image Compression Multimedia Systems

An Overview of Image Steganography Techniques

Different Steganography Methods and Performance Analysis

REVERSIBLE data hiding, or lossless data hiding, hides

Digital Image Processing 3/e

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

Feature Reduction and Payload Location with WAM Steganalysis

Detection of Steganography using Metadata in Jpeg Files

Secret Communication on Facebook Using Image Steganography: Experimental Study

STEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE

Convolutional Neural Network-based Steganalysis on Spatial Domain

International Journal of Computer Techniques - Volume 3 Issue 5, Sep - Oct 2016

Improved Detection of LSB Steganography in Grayscale Images

Image Forgery. Forgery Detection Using Wavelets

STEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION

A Secure Robust Gray Scale Image Steganography Using Image Segmentation

Introduction to Wavelet Transform. Chapter 7 Instructor: Hossein Pourghassem

An Improvement for Hiding Data in Audio Using Echo Modulation

Transform Domain Technique in Image Steganography for Hiding Secret Information

Prof. Feng Liu. Fall /04/2018

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Image Quality Estimation of Tree Based DWT Digital Watermarks

IMAGE PROCESSING: AREA OPERATIONS (FILTERING)

Sterilization of Stego-images through Histogram Normalization

Dynamic Collage Steganography on Images

CS4495/6495 Introduction to Computer Vision. 2C-L3 Aliasing

Keywords Secret data, Host data, DWT, LSB substitution.

STEGANOGRAPHY. Sergey Grabkovsky

Digital Watermarking Using Homogeneity in Image

Integer Wavelet Bit-Plane Complexity Segmentation Image Steganography

GNE College, Ludhiana, Punjab, India

Block Wise Data Hiding with Auxilliary Matrix

PRIOR IMAGE JPEG-COMPRESSION DETECTION

AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE

Design and Testing of DWT based Image Fusion System using MATLAB Simulink

Implementation Of Steganography For Business Documents Security Using Discrete Wavelet Transform Method

Image Compression Supported By Encryption Using Unitary Transform

Analysis of Secure Text Embedding using Steganography

A Study on Image Steganography Approaches in Digital Images

A PROPOSED ALGORITHM FOR DIGITAL WATERMARKING

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

A Modified Image Coder using HVS Characteristics

Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

FPGA implementation of DWT for Audio Watermarking Application

A New Steganographic Method for Palette-Based Images

LSB Encoding. Technical Paper by Mark David Gan

RGB Intensity Based Variable-Bits Image Steganography

SECTION I - CHAPTER 2 DIGITAL IMAGING PROCESSING CONCEPTS

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION

Templates and Image Pyramids

The Influence of Image Enhancement Filters on a Watermark Detection Rate Authors

Fourier and Wavelets

Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad

AN ERROR LIMITED AREA EFFICIENT TRUNCATED MULTIPLIER FOR IMAGE COMPRESSION

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform

An Efficient Data Security System Using Reserve Room Approach on Digital Images for Secret Sharing

Templates and Image Pyramids

Digital Image Processing. Image Enhancement: Filtering in the Frequency Domain

Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique

EE482: Digital Signal Processing Applications

Assistant Lecturer Sama S. Samaan

A Novel Approach for Image Steganography Using Dynamic Substitution and Secret Key

ELTYEB E. ABED ELGABAR

Audio Signal Compression using DCT and LPC Techniques

Secure Spread Spectrum Data Embedding and Extraction

Implementation of Effective, Robust and BPCS Data Embedding using LSB innovative Steganography Method

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

Transcription:

Steganography & Steganalysis of Images Mr C Rafferty Msc Comms Sys Theory 2005

Definitions Steganography is hiding a message in an image so the manner that the very existence of the message is unknown. The goal of Steganography is to avoid drawing suspicion to the transmission of a hidden message. If suspicion is raised, then this goal is defeated. Steganalysis is the art of discovering and rendering useless such covert messages.

Least significant Bit (LSB) LSB insertion is a common simple approach to embedding information in a image But it is vulnerable to even slight image manipulation. Converting image from a format like GIF or BMP to JPEG and back could destroy the information hidden in LSBs. Here s how it works

LSB Taking advantage of the way the human eye perceives images, this technique involves replacing the N leastsignificant bits of each pixel of a container image with the data of a hidden message. Example: Consider 1 pixel of an 8 bit grayscale Image Eg. graylevel intensity 156 = 1001 1100 Hide data at say N=2 1001 1111 New value 1001 1111 = 159

LSB The famous Lena image.(8 bit grayscale) We see little difference Lena with 3 bits replaced using LSB

Best viewed Plotting Histogram of Pixel Values We can see Original Image have smooth curve Most Images have a smooth distribution The Image with Data (Stego-Image) produces this zig-zag curve This zig-zag curve is common in LSB hiding.

Note as N Increases, Hiding Capacity Increases but Image degrades. Notice this zig-zag feature appearing after N bits replaced with image Most Images used have Smooth Histogram Easy for Steganalysist to Suspect Image may have Hidden data

LSB Conclusions So we see that LSB technique is an easy simple method for hiding data But stego-images can draw suspicion or be easily detected from statistical analysis. (Histogram analysis, as shown) Stego-Image can become distorted as N Increases So, Must defeat this Statistical Analysis Attack!!

Project Outline LSB hides data in the Spatial domain Lets look at hiding in the Frequency Domains Hiding Data using Discrete Cosine Transform DCT Fast Fourier Transform - FFT Wavelet Tranform WT Gabor Transform

Project Outline Today look at Hiding Data using 3. Discrete Cosine Transform DCT 4. Wavelets Transform - WT

DCT The DCT transforms a signal or image from the spatial domain to the frequency domain. It separates the image into parts (or spectral sub-bands) of differing importance (with respect to the image's visual quality). It can separate the Image into High, Middle and Low Frequency components.

DCT Algorithm Take DCT of Image Take DCT of hidden Message Set T, the Significant Threshold value, below which transform coefficients will de deemed Insignificant Find these T Values and Replace these by a Function of the hidden message Take the Inverse DCT of this New Image Output Stego Image

Hidden message. This is a simple hidden message in text format. Converted to ASCII Numbers, 101 98 etc DCT -1.788 23.099 5.890 etc DCT diosd-0.0 0.0004 0.0008 0.0007-0.0002 0.0004 7.0005 0.0003-0.0003-0.0006-0.0004-0.0006-7.0004 0.0001 0.0004 0.0003 30.0001-99.0004-0.0000 0.0000-0.0004 20.0005 21.0006-0.0001 0.0000 0.0002 10.0004-0.0006-0.0006 0.0003 0.0002-0.0006 0.0002 0.0005-0.0001 Inverse DCT Select values below T, Significant Threshold Replace (using an operator) each discaded insignificant Transform coefficient with coefficient from message Stego Image Returned

DCT Results to date The human eye is able to catch modifications to the lower frequencies since most of the image's frequency content is located in this area. Modifying high frequencies can cause a multitude of local distortions along the image's sharp edges To minimize distortion, then, the data should be inserted in the middle frequencies. Middle Frequencies are deemed insignificant transform coefficients as thus set Theshold Value in this space

DCT Algorithm Results Histograms taken setting T below low frequencies But sharp spike at 255 pixel value (not good Result) Steganalysist Alarm Bells

Thus DCT Algorithm Defeats Histogram Analsis DCT Algorithm Results Histograms taken setting T below Middle frequencies We can see it closely matches the original Image We can see already we have elimated the zig-zag effect from LSB Insertion

Extracting Data The reciever will need the Following 2. Stego-image (downloaded from web) 3. Stego Key T, the Threshold Significant Value, to look for the coefficients below these values Original Image Then extract by subtracting the coefficients below T from Original coefficients and Inverse DCT

Extracting Data To date, DCT Algorithm can sucessfully extract a small Text Message Future work will be increasing the Payload (amount hidden data) Thus seeing how much hiding bandwidth can be used on different Images. Plot : Image Degradation Vs Payload Plot : Successfully Extraction Vs Payload

Wavelet Experimentation: The Wavelet Transform The Haar wavelet basis was chosen. The basic process involves a lowpass filter (l[n]) and a highpass filter (h[n]) The image is processed in 4 ways (producing 4 separate images as output). Its rows are convolved with l or h, as are its columns. The 4 image outputs have l rows and l columns, h rows and l columns, l rows and h columns, and h rows and h columns.

Wavelet Experimentation: The Wavelet Transform These images are then downsampled by 2, meaning that every other row and every other column is eliminated. The 4 images are then combined into one having the same dimensions as the original source image Low Pass Rows Low Pass Cols Low Pass Rows High Pass Cols High Pass Rows Low Pass Cols High Pass Rows High Pass Cols

Wavelet Experimentation: The Wavelet Transform The inverse wavelet transform must break down the four-part image and up sample by 2, inserting a row of zeros after every row and a column of zeros after every column. Next, the 4 images have their rows and columns convolved with the same filters (lowpass or highpass) as before. And lastly, the 4 component images are summed to regain the original image.

Wavelet Experimentation: The Wavelet Transform Data Hiding Like the DCT experiment the hidden data (payload) was a simple text message Encoding the information in only one of the four quadrants created by the Wavelet Transform This was done in the lower right quadrant of the WT (high pass across rows and columns) because it was less visible than any of the other three quadrants.

Low Pass Rows Low Pass Cols Low Pass Rows High Pass Cols High Pass Rows Low Pass Cols High Pass Rows High Pass Cols

Hidden message. This is a simple hidden message in text format. Converted to ASCII Numbers and added to the coefficients along the Rows Low Pass Rows Low Pass Cols Low Pass Rows High Pass Cols 101 121 103 108 106 105 98 etc High Pass Rows Low Pass Cols High Pass Rows High Pass Cols Hide Data along the Rows here

Hidden message. This is a simple hidden message in text format. Converted to ASCII Numbers and added to the coefficients along the Rows Low Pass Rows Low Pass Cols Low Pass Rows High Pass Cols 101 121 103 108 106 105 98 etc Inverse Wavelet Transform High Pass Rows Low Pass Cols High Pass Rows High Pass Cols Hide Data along the Rows here

Results: Using this my algorithm we can see the synthesised image differs slightly from original But wavelets method for Hiding is very good, near perfect synthesised with Data This method cannot be used tough as synthesised image is too distorted, and would draw suspicion. Future work, to get perfect synthesised image.

Future Work Again Increasing Payload Vs Image Degradation Successfully Data Extraction Vs Payload Inserting payload in a different manor ( transform) Adding noise to Images (steganalysis) to attack the hidden message JPEG compression, Translation Rotation Use of Wavelet Toolbox Haar Db2 (Daubechies) All At Different Levels (up to 5)

Thank You! Questions?

As shown, there is slight difference between original and Synthesised images. My wavelets algorithm needs to be improved