STEGANOGRAPHY
STEGANOGRAPHYSteganography is the art and science of writing hiddenmessages in such a way that no one, apart from thesende...
STEGANOGRAPHYHistory:EXAMPLE NOTED BY HERODOTUS :A man called Harpagus wanted to send a message to Cyrus, but allroads wer...
STEGANOGRAPHYHistory:EXAMPLE NOTED BY HERODOTUS :Histiaios, being himself detained, wished to inform Aristagoras thathe sh...
In 1499 Johannes Trithemius, from Würzburg, wrote 3books “Steganographia”.In 1518 Trithemius printed 6 books, 540 pages, o...
Ancient Chinese wrote messages on fine silk, which was thencrunched into a tiny ball and covered in wax. The messenger the...
MODERN DIGITAL SCIENTIFIC STUDY1983 : Simmons stated the ‘prisoners problem’
8Steganography and WatermarkingGENERAL STEGANOGRAPHIC MODELA general model of a steganography system has alreadyemerged.Mo...
TEXT IMAGE AUDIO VIDEO
TEXT
WEB based TEXT
TEXT IMAGE AUDIO VIDEO
IMAGE
IMAGE AUDIO VIDEOTEXT
AUDIO
IMAGE VIDEOTEXT AUDIO
VIDEO
STEGANOGRAPHY1.To have secure secret communication where strong cryptography is impossible.2. In some cases, for example i...
Wavelets are functions that “wave” above and below the x-axis, have1. Varying frequency,2. Limited duration,3 An average v...
What are Wavelets? (cont’d)• There are many different wavelets:MorletHaar Daubechies
• Simultaneous localization in time and scale- The location of the wavelet allows to explicitly representthe location of e...
Properties of Wavelets (cont’d)• Sparsity: for functions typically found inpractice, many of the coefficients in a wavelet...
Properties of Wavelets (cont’d)• Adaptability: wavelets can be adapted torepresent a wide variety of functions (e.g.,funct...
Wavelet Transforms• Continuous Wavelet Transform (CWT)• Discrete Wavelet Transform (DWT)
CWT: Main Steps1. Take a wavelet and compare it to a section at the startof the original signal.2. Calculate a number, C, ...
CWT: Main Steps (cont’d)3. Shift the wavelet to the right and repeat steps 1 and 2 untilyouve covered the whole signal.
CWT: Main Steps (cont’d)4. Scale the wavelet and repeat steps 1 through 3.5. Repeat steps 1 through 4 for all scales.
DWT• ImageDecomposition– Scale 2– 4 subbands:• Each coeff. a 2*2area in scale 1 image• Low Frequency:• High frequencies:HL...
DWT• Image Decomposition– Parent– Children– Descendants:corresponding coeff. atfiner scales– Ancestors: correspondingcoeff...
• Image Decomposition– Feature 1:• Energy distribution similar toother Transform: Concentrated inlow frequencies– Feature ...
Filterbank Structure: Decomposition
Filterbank Structure: Reconstruction•
Example - Haar basis (revisited)low-pass,down-samplinghigh-pass,down-sampling(9+7)/2 (3+5)/2 (9-7)/2 (3-5)/2[9 7 3 5]
Example - Haar basis (revisited)high-pass,down-samplinglow-pass,down-sampling(8+4)/2 (8-4)/2[9 7 3 5]
Illustrating1D Haar wavelet decompositionx x x x x x … x x…re-arrange:re-arrange:detailaverage
Examples of lowpass/highpassanalysis filtersDaubechiesHaarh0h1h0h1
d0 d1 d2 d3 0 0 0 0g0 g1 g2 g3 0 0 0 00 0 d0 d1 d2 d3 0 00 0 g0 g1 g2 g3 0 00 0 0 0 d0 d1 d2 d30 0 0 0 g0 g1 g2 g30 0 0 0 ...
A note in the “Ripples in Mathematics”
Wavelet Decomposition:ExampleLENA D4 construction
Applications• Noise filtering• Image compression– Fingerprint compression• Image fusion• Recognition• Image matching and r...
1. Ranjan Parekh, “Principles of Multimedia” ,Chapter Image,Graphics , TataMcGraw-Hill2. Giuseppe Mastronardi, Marcello Ca...
Steganography wavelet
Steganography wavelet
Upcoming SlideShare
Loading in …5
×

Steganography wavelet

820 views

Published on

Published in: Technology, Spiritual
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
820
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
34
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Steganography wavelet

  1. 1. STEGANOGRAPHY
  2. 2. STEGANOGRAPHYSteganography is the art and science of writing hiddenmessages in such a way that no one, apart from thesender and intended recipient, suspects the existence ofthe message.The word ‘steganography’ is of Greek origin and means‘concealed writing’ from the Greek words ‘stegan-xgraf-ein’.Definition:
  3. 3. STEGANOGRAPHYHistory:EXAMPLE NOTED BY HERODOTUS :A man called Harpagus wanted to send a message to Cyrus, but allroads were guarded – he used a here to conceal the message in itsstomach.A trusted servant dressed as a huntsman carried the here and byword of mouth asked the recipient to cut the sewed animal.
  4. 4. STEGANOGRAPHYHistory:EXAMPLE NOTED BY HERODOTUS :Histiaios, being himself detained, wished to inform Aristagoras thathe should revolt. Therefore he shaved the hair of a faithful servant andtattooed his head.once his hair had grown back, the slave traveled to Mileots wherehe had his head re-shaved and thus message was retrieved.
  5. 5. In 1499 Johannes Trithemius, from Würzburg, wrote 3books “Steganographia”.In 1518 Trithemius printed 6 books, 540 pages, oncryptography and steganography. Books title:Polygraphiae.In 1665 Gaspari Schotti published the book“Steganographica”, 400pages. (New presentation ofTrithemius.)HISTORY
  6. 6. Ancient Chinese wrote messages on fine silk, which was thencrunched into a tiny ball and covered in wax. The messenger thenswallowed the ball of wax.During Second World War a technique was developed to shrinkphotographically a page of text into a dot less than one millimeterin diameter, and then hide this microdot in an apparentlyinnocuous letter. (The first microdot has been spotted by FBI in1941.)HISTORY
  7. 7. MODERN DIGITAL SCIENTIFIC STUDY1983 : Simmons stated the ‘prisoners problem’
  8. 8. 8Steganography and WatermarkingGENERAL STEGANOGRAPHIC MODELA general model of a steganography system has alreadyemerged.Model of steganographic systems
  9. 9. TEXT IMAGE AUDIO VIDEO
  10. 10. TEXT
  11. 11. WEB based TEXT
  12. 12. TEXT IMAGE AUDIO VIDEO
  13. 13. IMAGE
  14. 14. IMAGE AUDIO VIDEOTEXT
  15. 15. AUDIO
  16. 16. IMAGE VIDEOTEXT AUDIO
  17. 17. VIDEO
  18. 18. STEGANOGRAPHY1.To have secure secret communication where strong cryptography is impossible.2. In some cases, for example in military applications, even the knowledge thattwo parties communicate can be of large importance. (Covert Channel)3. The health care, and especially medical imaging systems, may very muchbenefit from information hiding techniques.4. Automatic monitoring and tracking of copy-write material on WEB. (Forexample, a robot searches the Web for marked material and thereby identifiespotential illegal issues.)5. Fingerprinting applications (in order to distinguish distributed data)Uses:
  19. 19. Wavelets are functions that “wave” above and below the x-axis, have1. Varying frequency,2. Limited duration,3 An average value of zero.WAVELETWavelet
  20. 20. What are Wavelets? (cont’d)• There are many different wavelets:MorletHaar Daubechies
  21. 21. • Simultaneous localization in time and scale- The location of the wavelet allows to explicitly representthe location of events in time.- The shape of the wavelet allows to represent differentdetail or resolution.Properties of Wavelets
  22. 22. Properties of Wavelets (cont’d)• Sparsity: for functions typically found inpractice, many of the coefficients in a waveletrepresentation are either zero or very small.• Linear-time complexity: many wavelettransformations can be accomplished in O(N)time.
  23. 23. Properties of Wavelets (cont’d)• Adaptability: wavelets can be adapted torepresent a wide variety of functions (e.g.,functions with discontinuities, functionsdefined on bounded domains etc.).– Well suited to problems involving images, open orclosed curves, and surfaces of just about anyvariety.– Can represent functions with discontinuities orcorners more efficiently (i.e., some have sharpcorners themselves).
  24. 24. Wavelet Transforms• Continuous Wavelet Transform (CWT)• Discrete Wavelet Transform (DWT)
  25. 25. CWT: Main Steps1. Take a wavelet and compare it to a section at the startof the original signal.2. Calculate a number, C, that represents how closelycorrelated the wavelet is with this section of thesignal. The higher C is, the more the similarity.
  26. 26. CWT: Main Steps (cont’d)3. Shift the wavelet to the right and repeat steps 1 and 2 untilyouve covered the whole signal.
  27. 27. CWT: Main Steps (cont’d)4. Scale the wavelet and repeat steps 1 through 3.5. Repeat steps 1 through 4 for all scales.
  28. 28. DWT• ImageDecomposition– Scale 2– 4 subbands:• Each coeff. a 2*2area in scale 1 image• Low Frequency:• High frequencies:HL1LH1 HH1HH2LH2HL2LL24/0  2/4/  
  29. 29. DWT• Image Decomposition– Parent– Children– Descendants:corresponding coeff. atfiner scales– Ancestors: correspondingcoeff. at coarser scalesHL1LH1 HH1HH2LH2HL2HL3LL3LH3 HH3
  30. 30. • Image Decomposition– Feature 1:• Energy distribution similar toother Transform: Concentrated inlow frequencies– Feature 2:• Spatial self-similarity acrosssubbandsHL1LH1 HH1HH2LH2HL2HL3LL3LH3 HH3The zigzag scanning order of the subbands for encoding the significancemap.DWT
  31. 31. Filterbank Structure: Decomposition
  32. 32. Filterbank Structure: Reconstruction•
  33. 33. Example - Haar basis (revisited)low-pass,down-samplinghigh-pass,down-sampling(9+7)/2 (3+5)/2 (9-7)/2 (3-5)/2[9 7 3 5]
  34. 34. Example - Haar basis (revisited)high-pass,down-samplinglow-pass,down-sampling(8+4)/2 (8-4)/2[9 7 3 5]
  35. 35. Illustrating1D Haar wavelet decompositionx x x x x x … x x…re-arrange:re-arrange:detailaverage
  36. 36. Examples of lowpass/highpassanalysis filtersDaubechiesHaarh0h1h0h1
  37. 37. d0 d1 d2 d3 0 0 0 0g0 g1 g2 g3 0 0 0 00 0 d0 d1 d2 d3 0 00 0 g0 g1 g2 g3 0 00 0 0 0 d0 d1 d2 d30 0 0 0 g0 g1 g2 g30 0 0 0 0 0 d0 d1 d2 d30 0 0 0 0 0 g0 g1 g2 g3Daubechies D4 forward transform matrix for 8 elementg0= d3 g1= -d2g2= d1 g0= -d0
  38. 38. A note in the “Ripples in Mathematics”
  39. 39. Wavelet Decomposition:ExampleLENA D4 construction
  40. 40. Applications• Noise filtering• Image compression– Fingerprint compression• Image fusion• Recognition• Image matching and retrieval
  41. 41. 1. Ranjan Parekh, “Principles of Multimedia” ,Chapter Image,Graphics , TataMcGraw-Hill2. Giuseppe Mastronardi, Marcello Castellano, FrancescomariaMarino, “Steganography Effects in Various Formats of Images. APreliminary Study,”3. Debnath Bhattacharyya, Poulami Das, Samir kumarBandyopadhyay and Tai-hoon Kim, “Text Steganography: A NovelApproach,”4. Barry J. Blake “Secret Language’’, pp. 72 - 113, 2010.5. Bryan Clair, "Steganography: How to Send a Secret Message“,http://www.strangehorizons.com/2001/20011008/steganography.shtml6. Gary C. Kessler,"Steganography: Hiding Data Within Data" ,http://www.garykessler.net/library/steganography.htmlREFERENCES

×