Chap1

571 views
534 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
571
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Chap1

  1. 1. STEGANOGRAPHY: Data Mining: SOUNDARARAJAN EZEKIEL Department of Computer Science Indiana University of Pennsylvania Indiana, PA 15705
  2. 2. Steganography Cryptography Data Mining Art of hiding information in ways that prevent the detection of hidden message Existence is not know Science of writing in secret code It encodes a message so it cannot be understood Discovering hidden Values in your data Warehouse That is The extraction of hidden predictive information from large database Knowledge discovery method– extraction of implicit and interesting pattern from large data collection
  3. 3. Data Mining-- Introduction <ul><li>It started when we started to store data in computer( businesses) </li></ul><ul><li>Continued improvements– technology that navigate through data in real time </li></ul><ul><li>Examples:- </li></ul><ul><ul><li>Single case: </li></ul></ul><ul><ul><li>Web server collect data for every single cleick </li></ul></ul><ul><ul><li>Logs are too big and contain gibberish </li></ul></ul><ul><ul><li>Lots of data and statistics </li></ul></ul><ul><ul><li>What we collected is not really useful </li></ul></ul><ul><ul><li>Multiple Case:- </li></ul></ul><ul><ul><li>Collection of web servers with large bandwidth </li></ul></ul><ul><ul><li>Think about the size of the data we collect </li></ul></ul>
  4. 4. Data Mining --- Continue <ul><li>It helps to design better and more intelligent business( e-learning environments) because it supported by </li></ul><ul><ul><li>Massive data collection </li></ul></ul><ul><ul><li>Powerful multiprocessor computers </li></ul></ul><ul><ul><li>Good data mining algorithms </li></ul></ul><ul><li>It existed at least 10 years, but it is getting popular recently </li></ul><ul><li>Example:- </li></ul><ul><ul><li>Winter Corporation Report </li></ul></ul><ul><ul><ul><li>Data warehouses with as much as 100 to 200 terabytes of raw data will be operational by next year, performing nearly 2,000 concurrent queries and occupying nearly 1 petabyte (1,000 terabytes) of disk space. In the same time period, transaction-processing databases will handle workloads of nearly 66,000 transactions per second </li></ul></ul></ul>
  5. 5. Evolution of Data mining Prospective, proactive information delivery Pilot Lockheed IBM,SGI Many more… Advanced algorithms, multiprocessor computers, massive database What will be unit price in India next month? Why? Data mining Now Dynamic data delivery in multiple level Pilot Comshare Arbor Cognos Microstrategy On-line analytic processing (OLAP) Multidimensional data base, data warehouses What were unit sales price in India last March? Data warehouse and decision support 90’s Dynamic data delivery Oracle Sybase Informix IBM Microsoft RDBMS(Relational DataBases) SQL( Structured Query Languages) ODBC What were unit sales in India last year January Data Access 80’s Retrospective static data delivery IBM , CDC Computer, tapes, disks What was my total revenue last few years Data collection 60’s characteristics Product providers Tech Question Evolutionary step
  6. 6. The scope of Data mining <ul><li>It is similar to sifting gold from immense amount of dirt--- searching valuable information in a gigabytes data </li></ul><ul><li>Automated prediction of trends and behaviors: Data mining automates the process of finding predictive information in a large database. </li></ul><ul><ul><ul><li>Example: Question related to target marketing </li></ul></ul></ul><ul><ul><ul><ul><li>Data mining can use mailing list data– other previous data to identify the solution </li></ul></ul></ul></ul><ul><ul><ul><li>Another example- Forecasting bankruptcy by identifying segments of a population likely to respond similarly to given events </li></ul></ul></ul>
  7. 7. <ul><li>Automated discovery of previously unknown patterns: It sweep through the database and identify previously hidden patterns in one step </li></ul><ul><ul><li>Example: Unrelated items purchased together in a store. </li></ul></ul><ul><ul><ul><li>Detecting fraudulent credit card transactions etc </li></ul></ul></ul><ul><li>Data base can be larger in both depth and breadth </li></ul><ul><ul><li>High performance data mining need to analyze full depth of a database without pre-selecting subsets </li></ul></ul><ul><ul><li>Larger samples yield lower estimation errors and variances </li></ul></ul>
  8. 8. Research Rank <ul><li>2001 – According to MIT’s Technology Review – Data mining is a top 10 research area </li></ul><ul><li>Recently – According to Gartner Group Advanced Technology Research Note– data mining and AI is top 5 key research area. </li></ul>
  9. 9. Multi-disciplinary field with a broad applicability <ul><li>Has several applications </li></ul><ul><ul><li>Market based analysis </li></ul></ul><ul><ul><li>Customer relationship management </li></ul></ul><ul><ul><li>Fraud detection </li></ul></ul><ul><ul><li>Network intrusion detection </li></ul></ul><ul><ul><li>Non-destructive eavaluation </li></ul></ul><ul><ul><li>Astronomy (look up dataa) </li></ul></ul><ul><ul><li>Remote sensing data </li></ul></ul><ul><ul><ul><li>( look down data) </li></ul></ul></ul><ul><ul><li>Text and mulitmedia mining </li></ul></ul><ul><ul><li>Medical imaging </li></ul></ul><ul><ul><li>Automated target recognition </li></ul></ul><ul><li>Combined ideas from several diffferent fields </li></ul><ul><ul><li>Steganography-- Cryptography </li></ul></ul><ul><li>My point of view of Data mining </li></ul><ul><li>Borrowing the idea from </li></ul><ul><li>Machine Learning </li></ul><ul><li>Artificial Intelligence </li></ul><ul><li>Statistics </li></ul><ul><li>High performance computing </li></ul><ul><li>Signal and Image Processing </li></ul><ul><li>Mathematical Optimization </li></ul><ul><li>Pattern Recognition </li></ul><ul><li>Natural Language processing </li></ul><ul><li>Steganography </li></ul><ul><li>Cryptography </li></ul>
  10. 10. General view of Data mining Raw Data Target Data Preprocessed data Transformed Data Pattern Knowledge Data processing pattern recog. Interpreting results Data Fusion Sampling MRA De-noising Object Identification Feature Extraction Normalization Dimension Reduction Classification Clustering Regression Visualization Validation An Iterative and Interactive Process
  11. 11. Our Research Based On <ul><li>Data Preprocessing </li></ul><ul><ul><li>Multiresolution Analysis </li></ul></ul><ul><ul><li>De-noising ( wavelet based methods) </li></ul></ul><ul><ul><li>Object Classifications </li></ul></ul><ul><ul><li>Feature Extraction </li></ul></ul><ul><li>Pattern Recognition </li></ul><ul><ul><li>Classification </li></ul></ul><ul><ul><li>Clustering </li></ul></ul><ul><li>Visualization and Validation </li></ul><ul><ul><li>Steganography </li></ul></ul><ul><ul><li>Cryptography </li></ul></ul>
  12. 12. Where we are going from here <ul><li>More robust , accurate, scalable algorthim </li></ul><ul><ul><li>For pre-processing and pattern recognition </li></ul></ul><ul><ul><li>Wavelets– and fractals </li></ul></ul><ul><li>Newer data types </li></ul><ul><ul><li>Video and multimedia </li></ul></ul><ul><ul><li>Multi-sensor data </li></ul></ul><ul><li>More complex problems </li></ul><ul><ul><li>Dynamic tracking in video </li></ul></ul><ul><ul><li>Mining text, audio, video, images </li></ul></ul><ul><li>Investigating Steganography in images, analysis of data hiding methods, attacks against hidden information, and counter measures to attacks against digital watermarking ( detection and distortion) </li></ul>
  13. 13. How data mining works? <ul><li>How exactly the data mining able to tell you important things that you did not know or what is going to happen next? </li></ul><ul><li>The method/ techniques that is used to perform these feats in data mining is called modeling </li></ul><ul><ul><li>Modeling is simply the act of building a model in one situation where you know the answer and then applying it to another situation that you don’t </li></ul></ul><ul><ul><li>Example: Sunken treasure ship– Bermuda shore, other ships– path-- keep all these information– build the model– if the model is good– you find the treasure in the ocean </li></ul></ul><ul><ul><li>Example 2: Identify telephone customer– for example you have the information that is the model that 98% customer who makes $60K per year spend more than $80 per month on long distance </li></ul></ul><ul><ul><ul><li>with this model new customer can be selectively targeted </li></ul></ul></ul>
  14. 14. Most commonly used techniques <ul><li>Artificial Neural Networks: Non linear predictive models that learn through training and resemble biological neural networks in structure </li></ul><ul><li>Decision Trees: Tree- shaped structures that represents set of decisions . These decisions generated rules for the classification of a dataset. Specific decision tree include classification and Regression Test(CART)and Chi Square Automated Interaction Detection (CAID) </li></ul><ul><li>Genetic Algorithms: optimization techniques that uses processes genetic combination, mutation, and selection in a design based on the concept of evolution </li></ul><ul><li>Nearest Neighbor Method: </li></ul><ul><li>Rule Induction: </li></ul><ul><li>OUR METHODS WILL BE BASED ON WAVELETS, FRACTALS, STEG, AND CRYPT </li></ul>
  15. 15. Steganography Methods <ul><li>Lets us discuss few methods and its advantage and disadvantage </li></ul><ul><li>1. Least Significant Method </li></ul><ul><ul><li>Idea:- Hide the hidden message in LSB of the pixels </li></ul></ul><ul><ul><li>Example:- </li></ul></ul><ul><ul><li>Advantage:- quick and easy– works well in gray image </li></ul></ul><ul><ul><li>Disadvantage:- insert in 8 bit– changes color– noticeable change– vulnerable to image processing– cropping and compression </li></ul></ul>
  16. 16. <ul><li>Redundant method </li></ul><ul><ul><li>Store more than one time--- withstand cropping </li></ul></ul><ul><li>Spread Spectrum </li></ul><ul><ul><li>Store the hidden message everywhere </li></ul></ul><ul><li>STEGANALYSIS </li></ul><ul><li>Detection Distortion </li></ul>Analyst observe various Various relationship between Cover, message, stego-media Steganography tool Analyst manipulate the stego-media To render the embedded information Useless or remove it altogether Seeing the Unseen
  17. 17. DCT - Discrete Cosine Transformation <ul><ul><li>Encode </li></ul></ul><ul><ul><ul><li>Take image </li></ul></ul></ul><ul><ul><ul><li>Divide into 8x8 blocks </li></ul></ul></ul><ul><ul><ul><li>Apply 2-D DCT--- DCT coefficients </li></ul></ul></ul><ul><ul><ul><li>Apply threshold value </li></ul></ul></ul><ul><ul><ul><li>Store the hidden message in that place </li></ul></ul></ul><ul><ul><ul><li>Take inverse– store as image </li></ul></ul></ul><ul><ul><li>Decode </li></ul></ul><ul><ul><ul><li>Start with modified image </li></ul></ul></ul><ul><ul><ul><li>Apply DCT </li></ul></ul></ul><ul><ul><ul><li>Find coefficient less than T </li></ul></ul></ul><ul><ul><ul><li>Extract bits </li></ul></ul></ul><ul><ul><ul><li>Combine bits and make message </li></ul></ul></ul>219 215 214 216 218 218 217 216 219 216 216 216 215 215 215 215 217 217 218 216 212 212 213 215 215 215 215 215 211 212 214 216 217 216 214 216 215 215 217 218 216 216 215 214 215 215 215 216 215 214 210 210 211 215 215 216 218 215 211 211 213 214 216 216 1720 1.524 7.683 1.234 1.625 0.9234 -0.07047 -1.055 5.667 3.475 -4.181 -1.524 1.152 1.637 1.016 0.3802 0.3711 -1.442 1.067 5.944 0.3943 -0.4591 0.1313 0.7812 3.888 -3.356 -1.97 3.265 0.5632 -0.939 -0.2434 0.2354 1.625 -2.279 0.4735 1.392 1.375 0.6552 -1.143 0.03459 -4.049 -1.223 0.5466 -0.5425 -1.013 -0.2651 0.5696 -0.9296 1.876 1.924 -1.369 -1.132 -0.02802 -0.4646 0.1831 0.9729 0.8995 -0.7233 0.667 0.436 0.1325 -0.03665 -0.3141 -0.4749
  18. 18. Wavelets Transformation Wavelets are basis function in continuous time. a basis is a set of linearly independent functions that can be used to produce all admissible functions f(t) The special feature of wavelet basis is that all functions are constructed from a single mother wavelet w(t). This wavelet is is a small wave ( a pulse). Normally it starts at time t=0 and end at time t=N Compressed = Shifted k time = Combine both we have Haar Wavelet :- 1909 Haar, 1984– theory, 88– daubechies 89- Mallat 2-d, mra, -- 92- bi-orthogonal Haar=
  19. 19. figure Message to be Hidden Carrier Wavelet Transformation Thresholding Compression Stego image Error Image Inverse Transformation Extract the Hidden Message
  20. 20. Information security and data mining <ul><li>Goal of intrusion detection – discover intrusion into a computer or network </li></ul><ul><li>With internet and available tool for attacking networks– security becomes a critical component of network </li></ul><ul><li>Misuse detection: finds intrusion by looking for activity corresponding to known techniques for intrusion </li></ul><ul><li>Anomaly detection: the system defines the expected behavior of the network in advance </li></ul>
  21. 21. What we want <ul><li>The tools to filter and classify information </li></ul><ul><li>Tools to find and retrieve the relevant information when you need it </li></ul><ul><li>Tools that adapt to your pace and needs </li></ul><ul><li>Tools to predict information needs </li></ul><ul><li>Tools to recommend tasks and information sources </li></ul><ul><li>Tools than can be personalized, manually or automatically </li></ul>
  22. 22. The tools should be… <ul><li>Non- intrusive </li></ul><ul><li>Secure </li></ul><ul><li>Integrated </li></ul><ul><li>Adaptable </li></ul><ul><li>Controllable </li></ul><ul><li>Automatic or semi-automatic </li></ul><ul><li>Useful </li></ul><ul><li>For learners </li></ul><ul><li>For educators </li></ul><ul><li>Integrate operational data with customer, suppliers and market -- </li></ul>
  23. 23. Profitable application <ul><li>A wide range of companies have deployed successful application of data mining </li></ul><ul><li>Some applications area include </li></ul><ul><ul><li>A pharmaceutical company can analyze its recent sales force activity and their results to improve target of high-value physician and determine which marketing activities will have the greatest impact in the next few months </li></ul></ul><ul><ul><li>A credit card companies can leverage its vast warehouse of customers transactions data to identify customers most likely to be interested in a new credit product </li></ul></ul><ul><ul><li>A diversified transportation company with a large direct sales forces can apply data mining to identify the best prospect for its services </li></ul></ul><ul><ul><li>A large consumer package goods company can apply data mining to improve its sales process to retailers </li></ul></ul>
  24. 24. Conclusion <ul><li>In this talk, we have discussed data mining related topics </li></ul><ul><li>Our goals </li></ul><ul><ul><li>Research </li></ul></ul><ul><ul><li>Software and algorithms </li></ul></ul><ul><ul><li>Application </li></ul></ul><ul><li>Our main focus is Science Data, though applicable to other data sets as well </li></ul><ul><li>More information – check out website </li></ul><ul><li>http://www.cosc.iup.eud/sezekiel </li></ul><ul><li>Contact: [email_address] </li></ul>

×