SlideShare a Scribd company logo
1 of 74
Video Steganography
James Ridgway
Steganosaurus
…a video steganography project…
http://www.steganosaur.us
Overview
• Introduction
• History and literature
• Steganographic techniques
• Audio steganography
• Image steganography
• Video coding
• Video steganography
Copyright James Ridgway 2013
Introduction
Copyright James Ridgway 2013
Steganography
The art and science of writing covert messages such that
the presence of the message is only known to the sender
and recipient.
Derived from Greek words:
• Steganos
Meaning: “covered or protected”
• Graphia
Definition: “writing”
First appears in the literature in Steganographia by
Johannes Trithemius, published 1606.
Copyright James Ridgway 2013
Steganography vs. Cryptography
Cryptography is the practice and study of secure
communication.
Steganography is the art and science of covert
communication.
There are some transferrable concepts such as
Kerckhoffs' principle.
Copyright James Ridgway 2013
Origin
• Message tattooed on the scalp
persuading Aristagoras to revolt against
the Persian King.
• Demeratus used a wax tablet to warn
Sparta of the invasion of Greece by the
Persians.
• Aeneas the Tactician
– Women's earings
– Pigeons
Herodotus. The Histories. Penguin Books, 1996.
D. Whitehead. How to survive under siege. Clarendon ancient history series. Clarendon Press, 1990.
Herodotus
484 – 425 BC
Master: Histiaeus.
Copyright James Ridgway 2013
Linguistic Steganography
• Giovanni Boccaccio
– 14th Century
– 1500 letters embedded in his poem, Amorosa
Visione.
• Francis Bacon
– Normal or italic font.
• Brewster, 1857
– Photographic technique.
Copyright James Ridgway 2013
Linguistic Steganography
World War II telegram sent by a German spy:
Copyright James Ridgway 2013
Apparently neutral's protest is thoroughly discounted and
ignored. Isman hard hit. Blockade issue affects pretext for
embargo on by-products, ejecting suets and vegetable oils.
Apparently neutral's protest is thoroughly discounted and
ignored. Isman hard hit. Blockade issue affects pretext for
embargo on by-products, ejecting suets and vegetable oils.
Linguistic Steganography
World War II telegram sent by a German spy:
Pershing sails from NY June 1
This is an example of a null cipher.
Copyright James Ridgway 2013
Linguistic Steganography
• Invisible ink
– Milk, vinegar, diluted honey, sugar solution.
• Hiding information in document images (J.
Brassil et al.)
– Shift lines of text up or down by 1/300th of an
inch.
Copyright James Ridgway 2013
Watermarking
• Information about the buyer and seller is
embedded in the file.
• Watermarks can be easy to detect, but they
should be difficult to remove.
• Traceability and public knowledge acts as a
piracy deterrent.
Copyright James Ridgway 2013
Printer Steganography
• Brother
• Canon
• Dell
• Epson
• HP
• IBM
• Konica Minolta
• Kyocera
• Lanier
• Lexmark
• Ricoh
• Toshiba
• Xerox
These brands have been
known to include watermarks
of the printer serial number
and timestamps.
Embedding technique takes
the form of small printed
dots.
Copyright James Ridgway 2013
Steganalysis
The process of detecting the presence of a
message that has been hidden using
steganography.
Approaches:
• Targeted Steganalysis
• Blind Steganalysis
Copyright James Ridgway 2013
Prisoners’ Problem
Copyright James Ridgway 2013
G. J. Simmons. The Prisoners' Problem and the Subliminal Channel. In CRYPTO, pages 51-67, 1983.
Alice Bob
Warden
Wardens
• Passive Warden
Observation only
• Active Warden
Determine the presence of the message and
prevent the exchange
• Malicious Warden
Attempt to catch the prisoners communicating.
Sometimes involves impersonating parties and
fabricating entire messages.
Copyright James Ridgway 2013
Wardens
During World War II the U.S Post Office censored
telegrams to prevent the exchange of hidden
messages.
Post Office changed “father is dead” to “father is
deceased”
Recipient replied: “is father dead or deceased?”
This is an example of an active warden.
Copyright James Ridgway 2013
Steganographic Techniques
Copyright James Ridgway 2013
Steganographic Techniques
• Injection
• Substitution
• Generation
• Transform Domain
• Streaming and Real Time
Copyright James Ridgway 2013
Injection
• Inject data into redundant parts of a file.
• Files suitable for injection techniques:
– EXE files
– WAV files
• Injection is generally deemed to be less secure
than substitution or generation techniques.
Copyright James Ridgway 2013
Substitution
• Modifies pre-existing data of the container
file.
• The file size of the container object is
preserved.
• Limits the steganographic capacity of the
container file.
Copyright James Ridgway 2013
11010110
01110100 01100101 01110011 01110100
Least Significant Bit (LSB) Manipulation
Copyright James Ridgway 2013
Least Significant Bit (LSB) Manipulation
Copyright James Ridgway 2013
11010110
01110100 01100101 01110011 01110100
Least Significant Bit (LSB) Manipulation
11010110
01110100 01100101 01110011 01110100
Copyright James Ridgway 2013
11010110
01110100 01100101 01110011 01110100
01110101
Least Significant Bit (LSB) Manipulation
11010110
01110100 01100101 01110011 01110100
01110101
Copyright James Ridgway 2013
11010110
01110100 01100101 01110011 01110100
01110101 01100101
Least Significant Bit (LSB) Manipulation
11010110
01110100 01100101 01110011 01110100
01110101 01100101
Copyright James Ridgway 2013
11010110
01110100 01100101 01110011 01110100
01110101 01100101 01110010
Least Significant Bit (LSB) Manipulation
11010110
01110100 01100101 01110011 01110100
01110101 01100101 01110010
Copyright James Ridgway 2013
11010110
01110100 01100101 01110011 01110100
01110101 01100101 01110010 01110101
Generation
• Generates a container file based on the covert
data.
• There is no original container file.
• Considerations:
– Relevance to those communicating
– Complex and time consuming to develop
Copyright James Ridgway 2013
Transform Domain
• Discrete Cosine Transform (DCT)
– JPEG
• Discrete Wavelet Transform (DWT)
– JPEG 2000
• Discrete Fourier Transform (DFT)
Copyright James Ridgway 2013
Audio Steganography
Copyright James Ridgway 2013
Audio Steganography
• Data is hidden by
modifying sample data.
• Uncompressed audio
formats
– WAV (Waveform Audio
File Format)
– BWF (Broadcast Wave
Format)
– MBWF (Multichannel
Broadcast Wave Format)
• Compressed audio
formats
– Lossy
• MP3
• Advanced Audio Coding
(AAC)
– Lossless
• Free Lossless Audio Codec
(FLAC)
• Direct Stream Transfer
(DST)
Copyright James Ridgway 2013
Audio Steganography
Position Description Example Value
01-04 Indicate that the file is a RIFF file “RIFF”
05-08 Size of the entire file. Integer
09-12 File Type “WAVE”
13-16 Format chunk marker, includes trailing null character “fmt “
17-20 Size of format chunk 16
21-22 Type of format 1
23-24 Number of channels 2
25-28 Sample rate 44100
29-32 Byte rate = (SampleRate * NoChannels * BitsPerSample) / 8 176400
33-34 Block alignment = (NoChannels * BitsPerSample) / 8 4
35-36 Bits per sample 16
37-40 Data section indicator “data”
41-44 Size of the data section Integer
Copyright James Ridgway 2013
WAV Audio Steganography Examples
Copyright James Ridgway 2013
Original Every byte
A B C
WAV Audio Steganography
Java implementation:
1. Requirements: java.io.*
2. Read bits per sample from the header
3. Convert to bytes
4. Move to the beginning of the data portion
5. Embed in the LSB of every sample (size of
sample is known from step 3).
Copyright James Ridgway 2013
WAV Audio Steganography
Copyright James Ridgway 2013
Image Steganography
Copyright James Ridgway 2013
JPEG
• Transformation from RGB into Y’CBCR.
• Downsampling
• Block splitting
• Discrete cosine transform
• Quantisation
• Entropy Coding
Copyright James Ridgway 2013
RGB to Y’CBCR
• Y’
– Luma component
• CBCR
– Croma components
– Scalar difference from Y’
• Receptors of the human
eyes:
– Can see more fine detail
in brighter images
(higher Y’)
– Less sensitive to:
• Hue (CB)
• Saturation (CR)
Copyright James Ridgway 2013
RGB to Y’CBCR
Copyright James Ridgway 2013
Downsampling/Chroma Subsampling
• 4:4:4
No downsampling, full resolution
• 4:2:2
1/2 horizontal, full vertical resolution
• 4:2:0
½ horizontal, ½ vertical resolution
Copyright James Ridgway 2013
+ =
+ =
+ =
Y’(CR, CB) Y’CrCb
Block Splitting
• Splitting process is based on downsampling ratio:
– 4:4:4
16x8
– 4:2:2
16x8
– 4:2:0
16x16
• (Y, CB, CR) values are shift from [0, 255] to [-128,
127] and then transformed to the frequency
domain.
Copyright James Ridgway 2013
Discrete Cosine Transform
The 2-dimensional DCT, F (m, n), of an M x N pixel
image is defined as follows:
where:
And f(x, y) is the intensity of the pixel at the xth row
and yth.
Copyright James Ridgway 2013
Quantization and Entropy Coding
• Human eye is not very
sensitive to changes in
high frequency
brightness.
• Quantization process:
– Divide DCT coefficients
by a constant
– Round the DCT
coefficients (lossy!)
• Entropy coding is a
lossless form of data
compression.
• Encoding occurs in a
zigzag
Copyright James Ridgway 2013
http://en.wikipedia.org/wiki/File:JPEG_ZigZag.svg
Image Steganography
• Lossy compression techniques
– Embed data in the quantised DCT coefficients of
JPEG images.
• Lossless compression techniques
– PNG palette based (24-bit RGB, 32-bit ARGB).
– GIF fixed 256 colour palette
Copyright James Ridgway 2013
PNG Image Steganography
• Modify the LSB each pixel of a PNG
– 3-bytes for 24-bit palette (RGB)
– 4-bytes for 32-bit palette (ARGB)
Copyright James Ridgway 2013
Original ModifiedOriginal
A B C
PNG Image Steganography
Copyright James Ridgway 2013
PNG Image Steganography
• Built in Java (Encoding Process):
1. Read image into a BufferedImage.
2. Raster BufferedImage.
3. Cast DataBuffer from the raster image to a
DataBufferByte
4. Get the data (byte) array from
DataBufferByte.
5. Manipulate the byte array
6. Use ImageIO to write the modified byte array
of colour values to a PNG file.
Copyright James Ridgway 2013
Image Steganalysis
Original Modified
Copyright James Ridgway 2013
Image Steganalysis
Original Modified (Encrypted)
Copyright James Ridgway 2013
Video Coding
Copyright James Ridgway 2013
Container Format
Container File
Copyright James Ridgway 2013
Audio Stream
Video Stream
Data Stream
Frames
Copyright James Ridgway 2013
Frame: 1
Frames
Copyright James Ridgway 2013
Frame: 25
Frames
Copyright James Ridgway 2013
Frame: 1
Frames
Copyright James Ridgway 2013
Frame: 25
Frames
Copyright James Ridgway 2013
Frame Types
• Intra Frame
Encoded using the same principles of lossy
JPEG compression.
• Predicted Frame
Coded with reference to a previous frame.
• Bidirectional Frame
Predicted from past and future reference
frames.
Copyright James Ridgway 2013
Frame Types
Copyright James Ridgway 2013
Time
Group of Pictures
I-frame
P-frame
B-frame
Video Steganography
Copyright James Ridgway 2013
Streaming and Real Time
• A. J. Mozo and M. E. Obien and C. J. Rigor and D. F. Rayel and
K. Chua and G. Tangonan. (2009). Video Steganography using
Flash Video (FLV).
Copyright James Ridgway 2013
A A V A V V A V A V A V V A
A A A A A A A V V V V V V V
A V A V A V A V A V A V A V
MPEG and DCT
• I-frames are coded similarly to JPEG images,
therefore have DCT coefficients.
• Can use LSB manipulation to hide information
in the DCT coefficients.
– T. Shanableh. (2012). Matrix encoding for data hiding using multilayer
video coding and transcoding solutions.
Copyright James Ridgway 2013
LSB techniques
• S. Singh and G. Agarwal. (2010). Hiding image
to video: A new approach of LSB replacement.
– Discuss hiding an image in video by modifying the
LSB of each pixel.
– Implemented in Matlab 7a.
– No mention of video format/codecs used
Copyright James Ridgway 2013
TPVD
• A. P. Sherly and P. P. A. Amritha (2010).
Compressed Video Steganography using TPVD.
– Tri-way pixel-value differencing
– Data is hidden in the I-frame.
– Uses motion vectors to determine maximum
scene change.
Copyright James Ridgway 2013
Macro Block Techniques
• S.K. Kapotas, E.E. Patras Varsaki, A.N. Skodras
(2007). Data Hiding in H. 264 Encoded Video
Sequences
– Discussion of a technique for hiding information in the
type of macro block used.
• 16x16 = 00
• 8 x 16 = 01
• 8x16 = 10
• 8x8 = 11
• 8x4
• 4x8
• 4x4
Copyright James Ridgway 2013
Steganosaurus
Copyright James Ridgway 2013
Software Solution
• Command line tool
– Written in C
– Uses FFmpeg
• Java GUI
– Interfaces with the command line tool
– Uses Xuggler
• Capable of embedding in MPEG4/H.264 using
motion vector techniques.
Copyright James Ridgway 2013
In the beginning…
1. Attempted to write our solution entirely in
Java using Xuggler.
2. Investigated Java Media Framework (JMF).
3. Could have used Java Native Interface (JNI).
4. Attempted to use FFmpeg and modify a
video file by linking to the libraries (avcodec,
avformat, …)
Copyright James Ridgway 2013
Findings
• Modify FFmpeg source code and incorporate
this in our solution.
• Modify the motion vectors (but after the
quantization process).
• Avoid macro blocks based on macro block
type.
Copyright James Ridgway 2013
Techniques Implemented
All techniques use 256-bit FIPS-197 compliant
CBC AES encryption:
1. Encode in the X-component of the first
macroblock motion vector.
2. Encode in the Y-component of the first
macroblock motion vector.
Copyright James Ridgway 2013
AES Cryptography
• Derived from Rijndael.
Developed by Belgian
cryptographers:
– Joan Daemen
– Vincent Rijmen
• AES later defined in FIPS-
197
http://csrc.nist.gov/publications/fips/fips1
97/fips-197.pdf
• Key Expansion/Key
Schedule
• Initial Round
– AddRoundKey
• Rounds
– SubBytes
– ShiftRows
– MixColumns
– AddRoundKey
• Final Round
– SubBytes
– ShiftRows
– AddRoundKey
Copyright James Ridgway 2013
http://en.wikipedia.org/wiki/File:AES-SubBytes.svg
Cryptography Block Modes
Copyright James Ridgway 2013
Cryptography Block Modes
Copyright James Ridgway 2013
http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation
Original ECB CBC
Steganalysis Tools
1. Visual comparison of frames.
2. Comparison of motion vectors of frames.
3. Video stream frame type overview
Copyright James Ridgway 2013
Demonstration
Copyright James Ridgway 2013
Video Steganography
James Ridgway
JMRidgway1@sheffield.ac.uk
Steganosaurus
…a video steganography project…
http://www.steganosaur.us

More Related Content

What's hot

Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Audio steganography
Audio steganography Audio steganography
Audio steganography Sharath Reddy
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysisSaloniGoyal45
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On SteganographyTeachMission
 
Steganography final report
Steganography final reportSteganography final report
Steganography final reportABHIJEET KHIRE
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
Image Steganography
Image SteganographyImage Steganography
Image SteganographyAnkit Gupta
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Steganography
SteganographySteganography
Steganographysandeipz
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingGovind Raj
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 

What's hot (20)

Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Steganography and steganalysis
Steganography and steganalysisSteganography and steganalysis
Steganography and steganalysis
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography final report
Steganography final reportSteganography final report
Steganography final report
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
steganography
steganographysteganography
steganography
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 

Viewers also liked

Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganographyMahmut Yildiz
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISShivam Porwal
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 
Final stagenography
Final stagenographyFinal stagenography
Final stagenographyricharia
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentationkartikeya upadhyay
 
Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.Alberto Villegas
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_reportSaurabh Nambiar
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project reportRishab Gupta
 
Writing at 240 words per minute - The Open Steno Project
Writing at 240 words per minute - The Open Steno ProjectWriting at 240 words per minute - The Open Steno Project
Writing at 240 words per minute - The Open Steno ProjectEllis Pratt
 

Viewers also liked (13)

Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Audio steganography - LSB
Audio steganography - LSBAudio steganography - LSB
Audio steganography - LSB
 
96683234 project-report-steganography
96683234 project-report-steganography96683234 project-report-steganography
96683234 project-report-steganography
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Steganography
SteganographySteganography
Steganography
 
Final stagenography
Final stagenographyFinal stagenography
Final stagenography
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_report
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Crypto - A Fascinating History by Atul Kahate
Crypto - A Fascinating History by Atul KahateCrypto - A Fascinating History by Atul Kahate
Crypto - A Fascinating History by Atul Kahate
 
Writing at 240 words per minute - The Open Steno Project
Writing at 240 words per minute - The Open Steno ProjectWriting at 240 words per minute - The Open Steno Project
Writing at 240 words per minute - The Open Steno Project
 

Similar to Video Steganography

Digital Fingerprinting
Digital FingerprintingDigital Fingerprinting
Digital Fingerprintingsanthu652
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarkingMazin Alwaaly
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecondKiakaha17
 
SteganographyonImage.ppt
SteganographyonImage.pptSteganographyonImage.ppt
SteganographyonImage.pptSantu Chall
 
DigitalWatermarking.ppt
DigitalWatermarking.pptDigitalWatermarking.ppt
DigitalWatermarking.pptVinodSaini85
 
R2D2 Project (EP/L006251/1) - Research Objectives & Outcomes
R2D2 Project (EP/L006251/1) - Research Objectives & OutcomesR2D2 Project (EP/L006251/1) - Research Objectives & Outcomes
R2D2 Project (EP/L006251/1) - Research Objectives & OutcomesAndrea Tassi
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital WatermarkingParag Agarwal
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodIOSRJECE
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarkingSaurabh Kaushik
 

Similar to Video Steganography (20)

Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Steganography
SteganographySteganography
Steganography
 
Presentation
PresentationPresentation
Presentation
 
Digital Fingerprinting
Digital FingerprintingDigital Fingerprinting
Digital Fingerprinting
 
Stegano Forensics
Stegano ForensicsStegano Forensics
Stegano Forensics
 
invisible watermarking
invisible watermarkinginvisible watermarking
invisible watermarking
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
 
SteganographyonImage.ppt
SteganographyonImage.pptSteganographyonImage.ppt
SteganographyonImage.ppt
 
DigitalWatermarking.ppt
DigitalWatermarking.pptDigitalWatermarking.ppt
DigitalWatermarking.ppt
 
R2D2 Project (EP/L006251/1) - Research Objectives & Outcomes
R2D2 Project (EP/L006251/1) - Research Objectives & OutcomesR2D2 Project (EP/L006251/1) - Research Objectives & Outcomes
R2D2 Project (EP/L006251/1) - Research Objectives & Outcomes
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Steganography
SteganographySteganography
Steganography
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
Steganography
SteganographySteganography
Steganography
 
Chapter Two
Chapter TwoChapter Two
Chapter Two
 
Image Security
Image SecurityImage Security
Image Security
 
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) MethodDrubbing an Audio Messages inside a Digital Image Using (ELSB) Method
Drubbing an Audio Messages inside a Digital Image Using (ELSB) Method
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
 

Recently uploaded

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 

Recently uploaded (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 

Video Steganography

  • 1. Video Steganography James Ridgway Steganosaurus …a video steganography project… http://www.steganosaur.us
  • 2. Overview • Introduction • History and literature • Steganographic techniques • Audio steganography • Image steganography • Video coding • Video steganography Copyright James Ridgway 2013
  • 4. Steganography The art and science of writing covert messages such that the presence of the message is only known to the sender and recipient. Derived from Greek words: • Steganos Meaning: “covered or protected” • Graphia Definition: “writing” First appears in the literature in Steganographia by Johannes Trithemius, published 1606. Copyright James Ridgway 2013
  • 5. Steganography vs. Cryptography Cryptography is the practice and study of secure communication. Steganography is the art and science of covert communication. There are some transferrable concepts such as Kerckhoffs' principle. Copyright James Ridgway 2013
  • 6. Origin • Message tattooed on the scalp persuading Aristagoras to revolt against the Persian King. • Demeratus used a wax tablet to warn Sparta of the invasion of Greece by the Persians. • Aeneas the Tactician – Women's earings – Pigeons Herodotus. The Histories. Penguin Books, 1996. D. Whitehead. How to survive under siege. Clarendon ancient history series. Clarendon Press, 1990. Herodotus 484 – 425 BC Master: Histiaeus. Copyright James Ridgway 2013
  • 7. Linguistic Steganography • Giovanni Boccaccio – 14th Century – 1500 letters embedded in his poem, Amorosa Visione. • Francis Bacon – Normal or italic font. • Brewster, 1857 – Photographic technique. Copyright James Ridgway 2013
  • 8. Linguistic Steganography World War II telegram sent by a German spy: Copyright James Ridgway 2013 Apparently neutral's protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils.
  • 9. Apparently neutral's protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils. Linguistic Steganography World War II telegram sent by a German spy: Pershing sails from NY June 1 This is an example of a null cipher. Copyright James Ridgway 2013
  • 10. Linguistic Steganography • Invisible ink – Milk, vinegar, diluted honey, sugar solution. • Hiding information in document images (J. Brassil et al.) – Shift lines of text up or down by 1/300th of an inch. Copyright James Ridgway 2013
  • 11. Watermarking • Information about the buyer and seller is embedded in the file. • Watermarks can be easy to detect, but they should be difficult to remove. • Traceability and public knowledge acts as a piracy deterrent. Copyright James Ridgway 2013
  • 12. Printer Steganography • Brother • Canon • Dell • Epson • HP • IBM • Konica Minolta • Kyocera • Lanier • Lexmark • Ricoh • Toshiba • Xerox These brands have been known to include watermarks of the printer serial number and timestamps. Embedding technique takes the form of small printed dots. Copyright James Ridgway 2013
  • 13. Steganalysis The process of detecting the presence of a message that has been hidden using steganography. Approaches: • Targeted Steganalysis • Blind Steganalysis Copyright James Ridgway 2013
  • 14. Prisoners’ Problem Copyright James Ridgway 2013 G. J. Simmons. The Prisoners' Problem and the Subliminal Channel. In CRYPTO, pages 51-67, 1983. Alice Bob Warden
  • 15. Wardens • Passive Warden Observation only • Active Warden Determine the presence of the message and prevent the exchange • Malicious Warden Attempt to catch the prisoners communicating. Sometimes involves impersonating parties and fabricating entire messages. Copyright James Ridgway 2013
  • 16. Wardens During World War II the U.S Post Office censored telegrams to prevent the exchange of hidden messages. Post Office changed “father is dead” to “father is deceased” Recipient replied: “is father dead or deceased?” This is an example of an active warden. Copyright James Ridgway 2013
  • 18. Steganographic Techniques • Injection • Substitution • Generation • Transform Domain • Streaming and Real Time Copyright James Ridgway 2013
  • 19. Injection • Inject data into redundant parts of a file. • Files suitable for injection techniques: – EXE files – WAV files • Injection is generally deemed to be less secure than substitution or generation techniques. Copyright James Ridgway 2013
  • 20. Substitution • Modifies pre-existing data of the container file. • The file size of the container object is preserved. • Limits the steganographic capacity of the container file. Copyright James Ridgway 2013
  • 21. 11010110 01110100 01100101 01110011 01110100 Least Significant Bit (LSB) Manipulation Copyright James Ridgway 2013
  • 22. Least Significant Bit (LSB) Manipulation Copyright James Ridgway 2013 11010110 01110100 01100101 01110011 01110100
  • 23. Least Significant Bit (LSB) Manipulation 11010110 01110100 01100101 01110011 01110100 Copyright James Ridgway 2013 11010110 01110100 01100101 01110011 01110100 01110101
  • 24. Least Significant Bit (LSB) Manipulation 11010110 01110100 01100101 01110011 01110100 01110101 Copyright James Ridgway 2013 11010110 01110100 01100101 01110011 01110100 01110101 01100101
  • 25. Least Significant Bit (LSB) Manipulation 11010110 01110100 01100101 01110011 01110100 01110101 01100101 Copyright James Ridgway 2013 11010110 01110100 01100101 01110011 01110100 01110101 01100101 01110010
  • 26. Least Significant Bit (LSB) Manipulation 11010110 01110100 01100101 01110011 01110100 01110101 01100101 01110010 Copyright James Ridgway 2013 11010110 01110100 01100101 01110011 01110100 01110101 01100101 01110010 01110101
  • 27. Generation • Generates a container file based on the covert data. • There is no original container file. • Considerations: – Relevance to those communicating – Complex and time consuming to develop Copyright James Ridgway 2013
  • 28. Transform Domain • Discrete Cosine Transform (DCT) – JPEG • Discrete Wavelet Transform (DWT) – JPEG 2000 • Discrete Fourier Transform (DFT) Copyright James Ridgway 2013
  • 30. Audio Steganography • Data is hidden by modifying sample data. • Uncompressed audio formats – WAV (Waveform Audio File Format) – BWF (Broadcast Wave Format) – MBWF (Multichannel Broadcast Wave Format) • Compressed audio formats – Lossy • MP3 • Advanced Audio Coding (AAC) – Lossless • Free Lossless Audio Codec (FLAC) • Direct Stream Transfer (DST) Copyright James Ridgway 2013
  • 31. Audio Steganography Position Description Example Value 01-04 Indicate that the file is a RIFF file “RIFF” 05-08 Size of the entire file. Integer 09-12 File Type “WAVE” 13-16 Format chunk marker, includes trailing null character “fmt “ 17-20 Size of format chunk 16 21-22 Type of format 1 23-24 Number of channels 2 25-28 Sample rate 44100 29-32 Byte rate = (SampleRate * NoChannels * BitsPerSample) / 8 176400 33-34 Block alignment = (NoChannels * BitsPerSample) / 8 4 35-36 Bits per sample 16 37-40 Data section indicator “data” 41-44 Size of the data section Integer Copyright James Ridgway 2013
  • 32. WAV Audio Steganography Examples Copyright James Ridgway 2013 Original Every byte A B C
  • 33. WAV Audio Steganography Java implementation: 1. Requirements: java.io.* 2. Read bits per sample from the header 3. Convert to bytes 4. Move to the beginning of the data portion 5. Embed in the LSB of every sample (size of sample is known from step 3). Copyright James Ridgway 2013
  • 34. WAV Audio Steganography Copyright James Ridgway 2013
  • 36. JPEG • Transformation from RGB into Y’CBCR. • Downsampling • Block splitting • Discrete cosine transform • Quantisation • Entropy Coding Copyright James Ridgway 2013
  • 37. RGB to Y’CBCR • Y’ – Luma component • CBCR – Croma components – Scalar difference from Y’ • Receptors of the human eyes: – Can see more fine detail in brighter images (higher Y’) – Less sensitive to: • Hue (CB) • Saturation (CR) Copyright James Ridgway 2013
  • 38. RGB to Y’CBCR Copyright James Ridgway 2013
  • 39. Downsampling/Chroma Subsampling • 4:4:4 No downsampling, full resolution • 4:2:2 1/2 horizontal, full vertical resolution • 4:2:0 ½ horizontal, ½ vertical resolution Copyright James Ridgway 2013 + = + = + = Y’(CR, CB) Y’CrCb
  • 40. Block Splitting • Splitting process is based on downsampling ratio: – 4:4:4 16x8 – 4:2:2 16x8 – 4:2:0 16x16 • (Y, CB, CR) values are shift from [0, 255] to [-128, 127] and then transformed to the frequency domain. Copyright James Ridgway 2013
  • 41. Discrete Cosine Transform The 2-dimensional DCT, F (m, n), of an M x N pixel image is defined as follows: where: And f(x, y) is the intensity of the pixel at the xth row and yth. Copyright James Ridgway 2013
  • 42. Quantization and Entropy Coding • Human eye is not very sensitive to changes in high frequency brightness. • Quantization process: – Divide DCT coefficients by a constant – Round the DCT coefficients (lossy!) • Entropy coding is a lossless form of data compression. • Encoding occurs in a zigzag Copyright James Ridgway 2013 http://en.wikipedia.org/wiki/File:JPEG_ZigZag.svg
  • 43. Image Steganography • Lossy compression techniques – Embed data in the quantised DCT coefficients of JPEG images. • Lossless compression techniques – PNG palette based (24-bit RGB, 32-bit ARGB). – GIF fixed 256 colour palette Copyright James Ridgway 2013
  • 44. PNG Image Steganography • Modify the LSB each pixel of a PNG – 3-bytes for 24-bit palette (RGB) – 4-bytes for 32-bit palette (ARGB) Copyright James Ridgway 2013 Original ModifiedOriginal A B C
  • 45. PNG Image Steganography Copyright James Ridgway 2013
  • 46. PNG Image Steganography • Built in Java (Encoding Process): 1. Read image into a BufferedImage. 2. Raster BufferedImage. 3. Cast DataBuffer from the raster image to a DataBufferByte 4. Get the data (byte) array from DataBufferByte. 5. Manipulate the byte array 6. Use ImageIO to write the modified byte array of colour values to a PNG file. Copyright James Ridgway 2013
  • 48. Image Steganalysis Original Modified (Encrypted) Copyright James Ridgway 2013
  • 50. Container Format Container File Copyright James Ridgway 2013 Audio Stream Video Stream Data Stream
  • 56. Frame Types • Intra Frame Encoded using the same principles of lossy JPEG compression. • Predicted Frame Coded with reference to a previous frame. • Bidirectional Frame Predicted from past and future reference frames. Copyright James Ridgway 2013
  • 57. Frame Types Copyright James Ridgway 2013 Time Group of Pictures I-frame P-frame B-frame
  • 59. Streaming and Real Time • A. J. Mozo and M. E. Obien and C. J. Rigor and D. F. Rayel and K. Chua and G. Tangonan. (2009). Video Steganography using Flash Video (FLV). Copyright James Ridgway 2013 A A V A V V A V A V A V V A A A A A A A A V V V V V V V A V A V A V A V A V A V A V
  • 60. MPEG and DCT • I-frames are coded similarly to JPEG images, therefore have DCT coefficients. • Can use LSB manipulation to hide information in the DCT coefficients. – T. Shanableh. (2012). Matrix encoding for data hiding using multilayer video coding and transcoding solutions. Copyright James Ridgway 2013
  • 61. LSB techniques • S. Singh and G. Agarwal. (2010). Hiding image to video: A new approach of LSB replacement. – Discuss hiding an image in video by modifying the LSB of each pixel. – Implemented in Matlab 7a. – No mention of video format/codecs used Copyright James Ridgway 2013
  • 62. TPVD • A. P. Sherly and P. P. A. Amritha (2010). Compressed Video Steganography using TPVD. – Tri-way pixel-value differencing – Data is hidden in the I-frame. – Uses motion vectors to determine maximum scene change. Copyright James Ridgway 2013
  • 63. Macro Block Techniques • S.K. Kapotas, E.E. Patras Varsaki, A.N. Skodras (2007). Data Hiding in H. 264 Encoded Video Sequences – Discussion of a technique for hiding information in the type of macro block used. • 16x16 = 00 • 8 x 16 = 01 • 8x16 = 10 • 8x8 = 11 • 8x4 • 4x8 • 4x4 Copyright James Ridgway 2013
  • 65. Software Solution • Command line tool – Written in C – Uses FFmpeg • Java GUI – Interfaces with the command line tool – Uses Xuggler • Capable of embedding in MPEG4/H.264 using motion vector techniques. Copyright James Ridgway 2013
  • 66. In the beginning… 1. Attempted to write our solution entirely in Java using Xuggler. 2. Investigated Java Media Framework (JMF). 3. Could have used Java Native Interface (JNI). 4. Attempted to use FFmpeg and modify a video file by linking to the libraries (avcodec, avformat, …) Copyright James Ridgway 2013
  • 67. Findings • Modify FFmpeg source code and incorporate this in our solution. • Modify the motion vectors (but after the quantization process). • Avoid macro blocks based on macro block type. Copyright James Ridgway 2013
  • 68. Techniques Implemented All techniques use 256-bit FIPS-197 compliant CBC AES encryption: 1. Encode in the X-component of the first macroblock motion vector. 2. Encode in the Y-component of the first macroblock motion vector. Copyright James Ridgway 2013
  • 69. AES Cryptography • Derived from Rijndael. Developed by Belgian cryptographers: – Joan Daemen – Vincent Rijmen • AES later defined in FIPS- 197 http://csrc.nist.gov/publications/fips/fips1 97/fips-197.pdf • Key Expansion/Key Schedule • Initial Round – AddRoundKey • Rounds – SubBytes – ShiftRows – MixColumns – AddRoundKey • Final Round – SubBytes – ShiftRows – AddRoundKey Copyright James Ridgway 2013 http://en.wikipedia.org/wiki/File:AES-SubBytes.svg
  • 71. Cryptography Block Modes Copyright James Ridgway 2013 http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation Original ECB CBC
  • 72. Steganalysis Tools 1. Visual comparison of frames. 2. Comparison of motion vectors of frames. 3. Video stream frame type overview Copyright James Ridgway 2013
  • 74. Video Steganography James Ridgway JMRidgway1@sheffield.ac.uk Steganosaurus …a video steganography project… http://www.steganosaur.us