SlideShare a Scribd company logo
1 of 24
Page 1
Page 1
Steganography
Paul Krzyzanowski
pxk@cs.rutgers.edu
ds@pk.org
Distributed Systems
Except as otherwise noted, the content of this presentation is licensed under the Creative Commons
Attribution 2.5 License.
Page 2
cryptography
κρυπό ς
hidden
γραφία
writing
A secret manner of writing, … Generally, the art of
writing or solving ciphers.
— Oxford English Dictionary
Page 3
cryptology
κρυπός
hidden
λογια
speaking
1967 D. Kahn, Codebreakers p. xvi, Cryptology is the
science that embraces cryptography and cryptanalysis,
but the term ‘cryptology’ sometimes loosely designates
the entire dual field of both rendering signals secure
and extracting information from them.
— Oxford English Dictionary
Page 4
steganography
στεγανός
covered
γραφία
writing
The art of secret (hidden) writing
Page 5
Steganography
Art and science of communicating in a way that
hides the existence of a message
signal or pattern imposed on content
– persistent under transmission
– not encryption
• original image/file is intact
– not fingerprinting
• fingerprinting leaves separate file describing contents
Page 6
Classic techniques
• Invisible ink (1st century AD - WW II)
• Tatoo message on head
• Overwrite select characters in printed type in
pencil
– look for the gloss
• Pin punctures in type
• Microdots (WW II)
• Newspaper clippings, knitting instructions,
XOXO signatures, report cards, …
Page 7
Motivation
• Steganography received little attention in computing
• Renewed interest because of industry desire to
protect copyrighted digital work
– audio
– images
– video
– Text
• Detect counterfeiter, unauthorized presentation,
embed key, embed author ID
• Steganography ≠ Copy protection
Page 8
Null Cipher
• Hide message among irrelevant data
• Confuse the cryptoanalyst
Page 9
Null Cipher
• Hide message among irrelevant data
• Confuse the cryptoanalyst
Big rumble in New Guinea.
The war on
celebrity acts should end soon.
Over four
big ecstatic elephants replicated.
Page 10
Null Cipher
• Hide message among irrelevant data
• Confuse the cryptoanalyst
Big rumble in New Guinea.
The war on
celebrity acts should end soon.
Over four
big ecstatic elephants replicated.
Bring two cases of beer.
Page 11
BBC News 27 April 2006
Judge creates own Da Vinci code
The judge who presided over the failed Da Vinci Code plagiarism case at
London's High Court hid his own secret code in his written judgement.
Seemingly random italicised letters were included in the 71-page
judgement given by Mr Justice Peter Smith, which apparently spell out a
message.
Mr Justice Smith said he would confirm the code if someone broke it.
"I can't discuss the judgement, but I don't see why a judgement should
not be a matter of fun," he said.
Italicised letters in the first few pages spell out "Smithy Code", while the
following pages also contain marked out letters.
http://news.bbc.co.uk/go/pr/fr/-/1/hi/entertainment/4949488.stm
Page 12
Chaffing & Winnowing
• Separate good messages from the bad ones
• Stream of unencoded messages with signatures
– Some signatures are bogus
– Need key to test
M0
M3 M1
M2 M0
M3 M1
M2
Alice Bob
M0
M3 M1
M2
Irene
? ? ? ?
× × ×
OK
Page 13
Image watermarking
• Spatial domain watermarking
– bit flipping
– color separation
• Frequency domain watermarking
– embed signal in select frequency bands (e.g. high
frequency areas)
– apply FFT/DCT transform first
– e.g. Digimarc
– watermark should alter the least perceptible bits
• these are the same bits targeted by lossy image
compression software
Page 14
UV Watermarking
Page 15
Machine ID codes in laser printers
See http://www.eff.org/Privacy/printers/
Page 16
Machine ID codes in laser printers
Page 17
Machine ID codes in laser printers
Page 18
Machine ID codes in laser printers
Page 19
Text
• Text lines shifted up/down (40 lines text 
240 codes)
• word space coding
• character encoding - minor changes to shapes
of characters
Page 20
Text
• Text lines shifted up/down (40 lines text 
240 codes)
• word space coding
• character encoding - minor changes to shapes
of characters
• works only on “images” of text e.g., PDF, postscript
Page 21
Audio
Perceptual coding
– inject signal into areas that will not be detected by humans
– may be obliterated by compression
Hardware with copy-protection
– not true watermarking - metadata present on media
– DAT
– minidisc
– presence of copy protection mechanisms often failed to give
the media wide-spread acceptance
Page 22
Video
• Coding still frames - spatial or frequency
• data encoded during refresh
– closed captioning
• visible watermarking
– used by most networks (logo at bottom-right)
Page 23
Watermarking vs. Steganography
Goal of steganography
– Intruder cannot detect a message
– Primarily 1:1 communication
Goal of watermarking
– Intruder cannot remove or replace the message
– Primarily 1:many communication
Page 24
Page 24
The end.

More Related Content

Similar to 18-steganography.ppt

SteganographySecond
SteganographySecondSteganographySecond
SteganographySecondKiakaha17
 
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8Matthew McCullough
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief Historyprasenjeetd
 
CNIT 141: 10. Digital Signatures
CNIT 141: 10. Digital SignaturesCNIT 141: 10. Digital Signatures
CNIT 141: 10. Digital SignaturesSam Bowne
 
OpenCard hack (projekt chameleon)
OpenCard hack (projekt chameleon)OpenCard hack (projekt chameleon)
OpenCard hack (projekt chameleon)Tech4 Helper
 
Electronic Document & Electronic Signatures
Electronic Document & Electronic SignaturesElectronic Document & Electronic Signatures
Electronic Document & Electronic SignaturesMichele Martoni
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Chandni Verma
 
Rothke Info Security Canada 2007 Final
Rothke   Info Security Canada 2007 FinalRothke   Info Security Canada 2007 Final
Rothke Info Security Canada 2007 FinalBen Rothke
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?Pratik Poddar
 
Cryptography
CryptographyCryptography
Cryptographymilanmath
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposalguest6caaab
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?hackdemocracy
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1Alfred Ouyang
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Crew
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryptionRebecca Jones
 

Similar to 18-steganography.ppt (20)

SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
 
Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8Advanced Encryption on the JVM v0.2.8
Advanced Encryption on the JVM v0.2.8
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
CNIT 141: 10. Digital Signatures
CNIT 141: 10. Digital SignaturesCNIT 141: 10. Digital Signatures
CNIT 141: 10. Digital Signatures
 
8-encryption.ppt
8-encryption.ppt8-encryption.ppt
8-encryption.ppt
 
OpenCard hack (projekt chameleon)
OpenCard hack (projekt chameleon)OpenCard hack (projekt chameleon)
OpenCard hack (projekt chameleon)
 
Electronic Document & Electronic Signatures
Electronic Document & Electronic SignaturesElectronic Document & Electronic Signatures
Electronic Document & Electronic Signatures
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Rothke Info Security Canada 2007 Final
Rothke   Info Security Canada 2007 FinalRothke   Info Security Canada 2007 Final
Rothke Info Security Canada 2007 Final
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Cryptography
CryptographyCryptography
Cryptography
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Cryptography
CryptographyCryptography
Cryptography
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get Physical
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryption
 

Recently uploaded

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 

Recently uploaded (20)

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 

18-steganography.ppt

  • 1. Page 1 Page 1 Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License.
  • 2. Page 2 cryptography κρυπό ς hidden γραφία writing A secret manner of writing, … Generally, the art of writing or solving ciphers. — Oxford English Dictionary
  • 3. Page 3 cryptology κρυπός hidden λογια speaking 1967 D. Kahn, Codebreakers p. xvi, Cryptology is the science that embraces cryptography and cryptanalysis, but the term ‘cryptology’ sometimes loosely designates the entire dual field of both rendering signals secure and extracting information from them. — Oxford English Dictionary
  • 5. Page 5 Steganography Art and science of communicating in a way that hides the existence of a message signal or pattern imposed on content – persistent under transmission – not encryption • original image/file is intact – not fingerprinting • fingerprinting leaves separate file describing contents
  • 6. Page 6 Classic techniques • Invisible ink (1st century AD - WW II) • Tatoo message on head • Overwrite select characters in printed type in pencil – look for the gloss • Pin punctures in type • Microdots (WW II) • Newspaper clippings, knitting instructions, XOXO signatures, report cards, …
  • 7. Page 7 Motivation • Steganography received little attention in computing • Renewed interest because of industry desire to protect copyrighted digital work – audio – images – video – Text • Detect counterfeiter, unauthorized presentation, embed key, embed author ID • Steganography ≠ Copy protection
  • 8. Page 8 Null Cipher • Hide message among irrelevant data • Confuse the cryptoanalyst
  • 9. Page 9 Null Cipher • Hide message among irrelevant data • Confuse the cryptoanalyst Big rumble in New Guinea. The war on celebrity acts should end soon. Over four big ecstatic elephants replicated.
  • 10. Page 10 Null Cipher • Hide message among irrelevant data • Confuse the cryptoanalyst Big rumble in New Guinea. The war on celebrity acts should end soon. Over four big ecstatic elephants replicated. Bring two cases of beer.
  • 11. Page 11 BBC News 27 April 2006 Judge creates own Da Vinci code The judge who presided over the failed Da Vinci Code plagiarism case at London's High Court hid his own secret code in his written judgement. Seemingly random italicised letters were included in the 71-page judgement given by Mr Justice Peter Smith, which apparently spell out a message. Mr Justice Smith said he would confirm the code if someone broke it. "I can't discuss the judgement, but I don't see why a judgement should not be a matter of fun," he said. Italicised letters in the first few pages spell out "Smithy Code", while the following pages also contain marked out letters. http://news.bbc.co.uk/go/pr/fr/-/1/hi/entertainment/4949488.stm
  • 12. Page 12 Chaffing & Winnowing • Separate good messages from the bad ones • Stream of unencoded messages with signatures – Some signatures are bogus – Need key to test M0 M3 M1 M2 M0 M3 M1 M2 Alice Bob M0 M3 M1 M2 Irene ? ? ? ? × × × OK
  • 13. Page 13 Image watermarking • Spatial domain watermarking – bit flipping – color separation • Frequency domain watermarking – embed signal in select frequency bands (e.g. high frequency areas) – apply FFT/DCT transform first – e.g. Digimarc – watermark should alter the least perceptible bits • these are the same bits targeted by lossy image compression software
  • 15. Page 15 Machine ID codes in laser printers See http://www.eff.org/Privacy/printers/
  • 16. Page 16 Machine ID codes in laser printers
  • 17. Page 17 Machine ID codes in laser printers
  • 18. Page 18 Machine ID codes in laser printers
  • 19. Page 19 Text • Text lines shifted up/down (40 lines text  240 codes) • word space coding • character encoding - minor changes to shapes of characters
  • 20. Page 20 Text • Text lines shifted up/down (40 lines text  240 codes) • word space coding • character encoding - minor changes to shapes of characters • works only on “images” of text e.g., PDF, postscript
  • 21. Page 21 Audio Perceptual coding – inject signal into areas that will not be detected by humans – may be obliterated by compression Hardware with copy-protection – not true watermarking - metadata present on media – DAT – minidisc – presence of copy protection mechanisms often failed to give the media wide-spread acceptance
  • 22. Page 22 Video • Coding still frames - spatial or frequency • data encoded during refresh – closed captioning • visible watermarking – used by most networks (logo at bottom-right)
  • 23. Page 23 Watermarking vs. Steganography Goal of steganography – Intruder cannot detect a message – Primarily 1:1 communication Goal of watermarking – Intruder cannot remove or replace the message – Primarily 1:many communication