26
Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm : (1) algorithm is split in 8x8 pixel squares (2) each square is transformed via DCT to 64 frequency components (3) each DCT coefficient is quantized against a reference table – many bits get removed more bits are used for low-freq. and fewer for high-freq. components ( human eye is more sensitive to low-freq. info) (4) many coefficients are (now) close in value => run/variable length coding can be used

Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Embed Size (px)

Citation preview

Page 1: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Image Steganography (cont.)

2.2) Image Steganography:Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm:

(1) algorithm is split in 8x8 pixel squares(2) each square is transformed via DCT to

64 frequency components(3) each DCT coefficient is quantized against

a reference table – many bits get removed more bits are used for low-freq. and fewer

for high-freq. components(human eye is more sensitive to low-freq. info)

(4) many coefficients are (now) close in value => run/variable length coding can be used

Page 2: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Image Steganography (cont.)

http://www.eetimes.com/document.asp?doc_id=1275437

Page 3: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Image Steganography (cont.)

http://medical-dictionary.thefreedictionary.com/Function+(disambiguation)

Page 4: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

2.2) Image Steganography:Use of Discrete Cosine Transform (DCT) - cont.

Possible Approaches to Hiding Data in DCT

(A) hide secret data in LSBs of DCT coefficients(B) hide secret data in LSBs of selected or non-

significant DCT coefficients (frequencies)

(B) hide one bit of data in each 8x8 block of DCT:0 => all coefficients even1 => all coefficients odd

Image Steganography (cont.)

Page 5: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Image Steganography (cont.)

http://www.abbascheddad.net/Survey.pdf

Page 6: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Image Steganography (cont.)

Example: Comparison of Different Tools for Image Steganography

space frequency encryption random.

http://www.abbascheddad.net/Survey.pdf

Page 7: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Image Steganography (cont.)

Example: Comparison of Different Tools for Image Steganography

http://www.tr.ietejournals.org/viewimage.asp?img=IETETechRev_2013_30_4_344_116724_t13.jpg

Page 8: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Image Steganography (cont.)

Example: Comparison of Spatial vs. DCT BasedSteganography

http://www.abbascheddad.net/Survey.pdf

Page 9: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Image Steganography (cont.)

• Magic Triangle of Data Hiding Techniques – outlines different goals / trade-off of digital steganography capacity: how much bits can be hidden in a cover image imperceptibility: how easy it is to spot hidden data

robustness: hidden message in stego-object unaffected by rotation compression cropping additive noise

CAPACITY

ROBUSTNESSIMPERCEPTIBILITY

(security)

Page 10: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Image Steganography (cont.)

CAPACITY

ROBUSTNESSIMPERCEPTIBILITY

SECURITYEXTRACTION COMPLEXITY

EMBEDDING COMPLEXITY

• Additional Requirements on Data Hiding Techniq. secrecy: difficulty to extract/remove hidden information extraction complexity: computational effort to extract

hidden information embedding complexity: computational effort to embed

hidden information

Page 11: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Image Steganography (cont.)

Requirements

• Comprehensive Look at Requirements ofDigital Image Steganography

Low High

capacityrobustness

invisibilitysecrecy

embedding complexityextraction complexity

Page 12: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

3.1) Audio Steganography:Least Significant Bit (LSB) Coding LSB of each audio sample is replaced with a secret bit

Audio Steganography

Page 13: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Audio Steganography (cont.)

3.2) Audio Steganography:Spread Spectrum secret bit is spread across cover audio in form of noise

http://www.sersc.org/journals/IJDTA/vol2_no2/1.pdf

Page 14: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Datagram Steganography

4.1) IP Datagram Steganography:Using Identification Field in IP Packet IP Identification Field = 16 bits long - used to uniquely

identify an IP packet - useful in case of fragmentation

Could Source & Destination Address be used to hide data?! How about Options field?

Page 15: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Datagram Steganography (cont.)

4.2) Datagram Steganography:Using Sequence Number in TCP Packets TCP Sequence Number = 32 bits - keeps track of

byte order in payload - useful in payload reassembly

Page 16: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Watermarking

• Watermarking - Process Components Watermark (W) each owner has a unique watermark

Marking Algorithm incorporates the watermark into the image

Verification Algorithm determines the integrity/ownership of the image

Page 17: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Watermarking (cont.)

Example: Watermarking in Space Domain

http://scien.stanford.edu/pages/labsite/2001/ee368/projects2001/dropbox/project06/

marking algorithm

verification algorithm

Page 18: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Watermarking (cont.)

• Watermarking - Categories

Private vs. Public Private – a secret key was used in watermarking process

=> only authorized users can recover it(can be used by owner to demonstrate ownershiponce he discovers illicit use)

Public – anyone can read the watermark(can be used to actually discover all illicit uses –e.g., by providing the watermark key to searchcrawlers)

Page 19: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Watermarking (cont.)

http://cgi.csc.liv.ac.uk/~leszek/COMP526/week4/comp526-3.pdf

• Watermarking vs. Steganography

key

key

Page 20: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

• Watermarking - Common Applications verify the owner of a digital object - copyright protection placing a (unique) watermark = placing a (unique) signature

Watermarking (cont.)

capacityrobustness

invisibilitysecrecy

embedding complexityextraction complexity

Requirements

Low High

Page 21: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

• Watermarking - Common Applications identify illegal ‘theatrical release’ copies of a movie:

watermark prior to release copy control in DVD player

Watermarking (cont.)

Requirements

Low High

capacityrobustness

invisibilitysecrecy

embedding complexityextraction complexity

Page 22: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Watermarking (cont.)

• Watermarking - Other Applications forensics and piracy deterrence

http://www.digitalwatermarkingalliance.org/app_forensics.asp

Page 23: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Watermarking (cont.)

• Watermarking - Other Applications content filtering

http://www.digitalwatermarkingalliance.org/app_forensics.asp

capacityrobustness

invisibilitysecrecy

embedding complexityextraction complexity

Page 24: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Digital Fingerprinting

• Digital Fingerprinting process of embedding unique information for each user-

-copy of a digital object in order to be able to identify entities involved in illegal distribution of the digital object if object with Alice’s ID is found on Bob’s computer =>

copy is illegal AND likely provided by Alice

Page 25: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Digital Fingerprinting (cont.)

requirements of digital fingerprinting

capacityrobustness

invisibilitysecurity

embedding complexityextraction complexity

Requirements

Low High

Page 26: Image Steganography (cont.) - York · PDF fileImage Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression

Excellent Book:

Digital Watermarking and SteganographyBy Ingemar Cox, Matthew Miller, Jeffrey Bloom, Jessica Fridrich, Ton Kalker