SlideShare a Scribd company logo
1 of 29
Watermarking & Steganography
Sanjay Goel
University at Albany, SUNY
• Cryptography is about protecting the content of
messages (their meaning).
• Steganography is about concealing the existence of
messages
• Watermarking is about establishing identity of
information to prevent unauthorized use
– They are imperceptible
– They are inseparable from the works they are embedded in
– They remain embedded in the work even during
transformation
Cryptograpy & Steganography vs. Watermarking
Comparison
• The word steganography comes from the Greek steganos ,
meaning covered or secret, and graphy , meaning writing or
drawing. Therefore, steganography literally means covered
writing.
• Steganography simply takes one piece of information and
hides it within another
– Computer files (images, sounds recordings, even disks) contain unused
or insignificant areas of data
– Steganography takes advantage of these areas, replacing them with
information (encrypted mail, for instance).
– The files can then be exchanged without anyone knowing what really
lies inside of them
– An image of the space shuttle landing might contain a private letter to
a friend.
– Rumor has it that terrorists used steganography to transmit messages
to one another. (http://www.wired.com/news/politics/0,1283,41658,00.html)
Steganography
Basics
Reference: http://members.tripod.com/steganography/stego.html
In his history of the Persian
Wars, Herodotus tells of a
messenger who shaved his head
and allowed a secret message to
be tattooed on his scalp. He
waited until his hair grew back.
Then he journeyed to where the
recipient awaited him and shaved
his head again. The message was
revealed. It was history’s first use
of steganography.
Steganography
Early Examples
Ancient Romans used to write
between lines using invisible ink
based on various natural
substances such as fruit juices,
urine, and milk. Their experience
was not forgotten: even
nowadays children play spies and
write secret messages that appear
only when heated.
Steganography
Invisible Ink
During the World War II the
Germans developed the microdot.
A secret message was
photographically reduced to the
size of a period, and affixed as the
dot for the letter 'i' or other
punctuation on a paper containing
a written message. Microdots
permitted the transmission of
large amounts of printed data,
including technical drawings, and
the fact of the transmission was
effectively hidden.
Steganography
Invisible Ink
• Computer Steganography is based on two principles.
– The first one is that the files containing digitized images or
sound can be altered to a certain extend without loosing
their functionality.
– The other principle deals with the human inability to
distinguish minor changes in image color or sound quality,
which is especially easy to make use of in objects that
contain redundant information, be it 16-bit sound, 8-bit or
even better 24-bit image. The value of the least significant
bit of the pixel color won’t result in any perceivable
change of that color.
Steganography
Principles
• The data to be concealed is compressed and hidden within
another file.
• The first step is to find a file which will be used to hide the
message (also called a carrier or a container.)
• The next step is to embed the message one wants to hide
within the carrier using a steganographic technique.
• Two different techniques commonly used for embedding are:
– Replace the least significant bit of each byte in the [carrier] with a
single bit for the hidden message.
– Select certain bytes in which to embed the message using a random
number generator; resampling the bytes to pixel mapping to preserve
color scheme, in the case of an image...; hiding information in the
coefficients of the discrete cosine, fractal or wavelet transform of an
image; and applying mimic functions that adapt bit pattern to a given
statistical distribution."
Steganography
Process
• EZStego (Stego Online, Stego Shareware, Romana Machado)
– Java based software program which supports only GIF and PICT
formats;
• Gif-It-Up v1.0 (Lee Nelson)
– A stego program for Windows 95 that hides data in GIF files
• Hide and Seek (Colin Maroney)
– can hide any data into GIF images;
• JPEG-JSTEG (Derek Upham)
– can hide data inside a JPEG file
• MP3Stego (Fabien A.P. Petitcolas, Computer Laboratory, University
of Cambridge)
– can hide data inside MP3 sound files;
• Steganos (Demcom, Frankfurt, Germany)
– encrypts files and then hides them within BMP, DIB, VOC, WAV,
ASCII and HTML files.
Reference:http://www.antichildporn.org/steganog.html
Steganography
Software
• S-Tools is one of the most popular steganography tools.
– This program is Windows 95/98 compatible
– It has the ability to conceal files within BMP, GIF and WAV files.
– Allows you to simply point and click your way to hiding files.
– It also has the ability to hide multiple files in one container.
– It has been updated each year and can be easily downloaded by
anyone. (http://members.tripod.com/steganography/stego/software.html)
Steganography Software
S-Tools
Dear Susan:
I can wait no
longer I want to see you
now please say that you
will come.
San...
• Steganalysis is the art of discovering and rendering
useless such covert messages.
• Steganalysis involves analysis of the carrier file
– Simpler steganographic techniques produce some
discernible change in the file size, statistics or both.
– These changes can manifest themselves in color variations,
loss of resolution and other distortions that are visible to
the human eye.
– This form of detection requires that you know what the
original carrier image or file should look like.
Steganalysis
Basics
• Watermarking is the practice of hiding a
message about an image, audio clip, or other
work of media within the work itself.
– Watermark is hidden from the user in normal use
– Watermark becomes visible as a result of a special
viewing process
Watermarking
Basics
• Sending a message to a spy by marking certain letters
in a newspaper using invisible ink
• Adding sub-perceptible echo at certain places in an
audio recording.
• Embedding a picture of President Andrew Jackson
into the paper during paper making process.
Watermarking
Examples
“In 1981, photographic reprints of confidential British
Cabinet Documents were being printed in newspapers.
Rumor has it that to determine the source of the leak,
Margaret Thatcher arranged to distribute uniquely identifiable
copies of the documents to each of the ministers. Each copy had
a different word spacing that was used to encode the identity of
the recipient.”
- Digital Watermarking, Cox
Watermarking
Examples
• A digital watermark is a digital signal or pattern
inserted into a digital image.
Digital Watermarking
Basics
• In a broadcast monitoring system identifying data is
added to the video/audio signal prior to transmission
• Two kinds of monitoring systems exist
– Passive Monitoring:
• Recognize the content being broadcast
• Compares received signals against a database of known content
• Very expensive as large frames need to be compared
• Useful for monitoring of competition
– Active Monitoring:
• Rely on information that is broadcast along with the content
• Relatively easier to implement
• Identification information is easily to interpret
• Requires cooperation of broadcasting mechanism
Watermarking
Applications
• Under US law the creator of a story, painting, song, or any
other original work holds copyright the instant it is recorded
in some physical form
– Up to 1998 a copyright notice was required to be attached to each
distributed copy if the owner wanted to protect his/her rights
– Even after the change in 1998 when this is no longer required the
awards are reduced significantly if the copyright information is not
present with the work
• Textual Copyright notices have several limitations
– They are easy to remove deliberately or inadvertently
– They can be aesthetically ugly if they cover a part of the image
– For music the copyright is only on the media not on the work
• Electronic watermarks are imperceptible and inseparable from
the work they are contained and are hence superior
Watermarking
Owner Identification
• Textual notices can be erased and replaced by a forger
– Image editors can be used to edit copyright notices
– One solution is to register the image with copyright
depository (expensive)
• Watermarking can prove image identity
– Watermarks may also be altered
– It is possible to prove that one image is derived from
another indirectly proving the ownership
Watermarking
Proof of Ownership
• Transaction Tracking
• Content Authentication
• Copy Control
• Device Control
Watermarking
Other Applications
• Should be perceptually invisible to prevent obstruction of the
original image.
• Statistically invisible so it cannot be detected or erased.
• Simple to extract watermark from image
– Otherwise, the detection process requires too much computation
time.
• Detection should be accurate.
– Few false positives & false negatives
• Should be able to produce numerous watermarks.
– Otherwise, only a limited number of images may be marked.
• Should be robust to filtering, additive noise, compression, and
other forms of image manipulation.
• Should be able to determine the true owner of the image.
Image Watermarking
Properties
Watermarking
Process
Reference: http://www.ece.utexas.edu/~bevans/courses/ee381k/projects/fall98/fu/literatureSurvey.pdf
• M-Sequence Generator
– Embedded or added to the last significant digit of the original image
– Watermark was extracted by taking the least significant bits at specific
locations
– Detection was done by cross correlation of the original and extracted
watermarks
• Discrete Cosine Transform (DCT)
– Watermark was placed in perpetually significant areas of the image
– Watermark based on 1000 random samples of a N(0,1) distribution
– Sample was added to the 1000 largest DCT coefficients of the image
– Inverse DCT was taken to retrieve the watermarked image
– For detection watermark was extracted from the DCT of suspected
image
Image Watermarking
Techniques
• Discrete Wavelet Transform(DWT)
– Watermark modeled as Gaussian noise was added to
middle and high frequency bands of the image
– Decoding process involved taking DWT of potentially
marked image
• Fractal Codes
– A collage map was composed from 8x8 blocks of original
image and from image’s DCT
Image Watermarking
Techniques
Watermarking
Image
Watermarking
Image
• Perceptually inaudible,
– such that no perceptual quality degradation occurs
• Statistically undetectable
– To ensure security
• Cannot be removed or modified by any signal
processing operation (e.g. filtering, compression,
MP3-encoding,...) without degrading perceptual
quality
• Readily extractable to detect copyright information
Watermarking
Audio Properties
• Echo Coding
• Phase Coding
• Direct-Sequence Spread Spectrum
• Frequency-Hopped Spread Spectrum
• Frequency Masking
Watermarking
Audio Techniques
Watermarked Sound
Watermarking
Audio
Original Sound
• Wideband Audio Signal is a raw WAV file
- Ten seconds in length
- Sampled at 44.1 kHz
- Quantized to 16 bits per sample
Watermarked Sound
Original Sound
Echo Coding Frequency Hopped Spread Spectrum
•
Fingerprinting

More Related Content

Similar to 8-steganography basic principle of the lesson.ppt

Steganography
SteganographySteganography
Steganography
Sonam M
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
Kamonasish Hore
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 

Similar to 8-steganography basic principle of the lesson.ppt (20)

Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Steganography
SteganographySteganography
Steganography
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Secure communication
Secure communicationSecure communication
Secure communication
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Survey Paper on Steganography
Survey Paper on Steganography Survey Paper on Steganography
Survey Paper on Steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography
SteganographySteganography
Steganography
 
steganography
steganographysteganography
steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
gyu.docx
gyu.docxgyu.docx
gyu.docx
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
1.pdf
1.pdf1.pdf
1.pdf
 
Audio stegnography
Audio stegnographyAudio stegnography
Audio stegnography
 

More from RobertCarreonBula

More from RobertCarreonBula (18)

tools and equipmentinanimation guide and descriptions.pptx
tools and equipmentinanimation guide and descriptions.pptxtools and equipmentinanimation guide and descriptions.pptx
tools and equipmentinanimation guide and descriptions.pptx
 
networktopology And its uses 123456.pptx
networktopology And its uses 123456.pptxnetworktopology And its uses 123456.pptx
networktopology And its uses 123456.pptx
 
PR-1222222222222111134556677889900..pptx
PR-1222222222222111134556677889900..pptxPR-1222222222222111134556677889900..pptx
PR-1222222222222111134556677889900..pptx
 
javaloop understanding what is java.pptx
javaloop understanding what is java.pptxjavaloop understanding what is java.pptx
javaloop understanding what is java.pptx
 
Kinds of animation 2d animation 3d animation stop and act animation.pptx
Kinds of animation 2d animation 3d animation stop and act animation.pptxKinds of animation 2d animation 3d animation stop and act animation.pptx
Kinds of animation 2d animation 3d animation stop and act animation.pptx
 
What Is Animation history types and its origin.pptx
What Is Animation history types and its origin.pptxWhat Is Animation history types and its origin.pptx
What Is Animation history types and its origin.pptx
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptx
 
Stenography sample lesson sample learning.pptx
Stenography sample lesson sample learning.pptxStenography sample lesson sample learning.pptx
Stenography sample lesson sample learning.pptx
 
Practical Research understanding and samples.pdf
Practical Research understanding and samples.pdfPractical Research understanding and samples.pdf
Practical Research understanding and samples.pdf
 
SSIP instructional Leadership Sample.docx
SSIP instructional Leadership Sample.docxSSIP instructional Leadership Sample.docx
SSIP instructional Leadership Sample.docx
 
Resistor-Basics knowledge knowing parallel and series.pptx
Resistor-Basics knowledge knowing parallel and series.pptxResistor-Basics knowledge knowing parallel and series.pptx
Resistor-Basics knowledge knowing parallel and series.pptx
 
Practical Research 3 qualitative importance.pptx
Practical Research 3 qualitative importance.pptxPractical Research 3 qualitative importance.pptx
Practical Research 3 qualitative importance.pptx
 
Practical research sample titlesintro.pptx
Practical research sample titlesintro.pptxPractical research sample titlesintro.pptx
Practical research sample titlesintro.pptx
 
Gantt chart information gantt chart and history.pptx
Gantt chart information gantt chart and history.pptxGantt chart information gantt chart and history.pptx
Gantt chart information gantt chart and history.pptx
 
Media and information literacy ethics-5.pptx
Media and information literacy ethics-5.pptxMedia and information literacy ethics-5.pptx
Media and information literacy ethics-5.pptx
 
Algorithms-Flowcharts-Data-Types-and-Pseudocodes.pptx
Algorithms-Flowcharts-Data-Types-and-Pseudocodes.pptxAlgorithms-Flowcharts-Data-Types-and-Pseudocodes.pptx
Algorithms-Flowcharts-Data-Types-and-Pseudocodes.pptx
 
Advanced-Word-Processing-Skills Empowerment Technologies.pptx
Advanced-Word-Processing-Skills Empowerment Technologies.pptxAdvanced-Word-Processing-Skills Empowerment Technologies.pptx
Advanced-Word-Processing-Skills Empowerment Technologies.pptx
 
Media and Information Literacy people Media
Media and Information Literacy people MediaMedia and Information Literacy people Media
Media and Information Literacy people Media
 

Recently uploaded

💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
nirzagarg
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 

Recently uploaded (20)

💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 

8-steganography basic principle of the lesson.ppt

  • 1. Watermarking & Steganography Sanjay Goel University at Albany, SUNY
  • 2. • Cryptography is about protecting the content of messages (their meaning). • Steganography is about concealing the existence of messages • Watermarking is about establishing identity of information to prevent unauthorized use – They are imperceptible – They are inseparable from the works they are embedded in – They remain embedded in the work even during transformation Cryptograpy & Steganography vs. Watermarking Comparison
  • 3. • The word steganography comes from the Greek steganos , meaning covered or secret, and graphy , meaning writing or drawing. Therefore, steganography literally means covered writing. • Steganography simply takes one piece of information and hides it within another – Computer files (images, sounds recordings, even disks) contain unused or insignificant areas of data – Steganography takes advantage of these areas, replacing them with information (encrypted mail, for instance). – The files can then be exchanged without anyone knowing what really lies inside of them – An image of the space shuttle landing might contain a private letter to a friend. – Rumor has it that terrorists used steganography to transmit messages to one another. (http://www.wired.com/news/politics/0,1283,41658,00.html) Steganography Basics Reference: http://members.tripod.com/steganography/stego.html
  • 4. In his history of the Persian Wars, Herodotus tells of a messenger who shaved his head and allowed a secret message to be tattooed on his scalp. He waited until his hair grew back. Then he journeyed to where the recipient awaited him and shaved his head again. The message was revealed. It was history’s first use of steganography. Steganography Early Examples
  • 5. Ancient Romans used to write between lines using invisible ink based on various natural substances such as fruit juices, urine, and milk. Their experience was not forgotten: even nowadays children play spies and write secret messages that appear only when heated. Steganography Invisible Ink
  • 6. During the World War II the Germans developed the microdot. A secret message was photographically reduced to the size of a period, and affixed as the dot for the letter 'i' or other punctuation on a paper containing a written message. Microdots permitted the transmission of large amounts of printed data, including technical drawings, and the fact of the transmission was effectively hidden. Steganography Invisible Ink
  • 7. • Computer Steganography is based on two principles. – The first one is that the files containing digitized images or sound can be altered to a certain extend without loosing their functionality. – The other principle deals with the human inability to distinguish minor changes in image color or sound quality, which is especially easy to make use of in objects that contain redundant information, be it 16-bit sound, 8-bit or even better 24-bit image. The value of the least significant bit of the pixel color won’t result in any perceivable change of that color. Steganography Principles
  • 8. • The data to be concealed is compressed and hidden within another file. • The first step is to find a file which will be used to hide the message (also called a carrier or a container.) • The next step is to embed the message one wants to hide within the carrier using a steganographic technique. • Two different techniques commonly used for embedding are: – Replace the least significant bit of each byte in the [carrier] with a single bit for the hidden message. – Select certain bytes in which to embed the message using a random number generator; resampling the bytes to pixel mapping to preserve color scheme, in the case of an image...; hiding information in the coefficients of the discrete cosine, fractal or wavelet transform of an image; and applying mimic functions that adapt bit pattern to a given statistical distribution." Steganography Process
  • 9. • EZStego (Stego Online, Stego Shareware, Romana Machado) – Java based software program which supports only GIF and PICT formats; • Gif-It-Up v1.0 (Lee Nelson) – A stego program for Windows 95 that hides data in GIF files • Hide and Seek (Colin Maroney) – can hide any data into GIF images; • JPEG-JSTEG (Derek Upham) – can hide data inside a JPEG file • MP3Stego (Fabien A.P. Petitcolas, Computer Laboratory, University of Cambridge) – can hide data inside MP3 sound files; • Steganos (Demcom, Frankfurt, Germany) – encrypts files and then hides them within BMP, DIB, VOC, WAV, ASCII and HTML files. Reference:http://www.antichildporn.org/steganog.html Steganography Software
  • 10. • S-Tools is one of the most popular steganography tools. – This program is Windows 95/98 compatible – It has the ability to conceal files within BMP, GIF and WAV files. – Allows you to simply point and click your way to hiding files. – It also has the ability to hide multiple files in one container. – It has been updated each year and can be easily downloaded by anyone. (http://members.tripod.com/steganography/stego/software.html) Steganography Software S-Tools Dear Susan: I can wait no longer I want to see you now please say that you will come. San...
  • 11. • Steganalysis is the art of discovering and rendering useless such covert messages. • Steganalysis involves analysis of the carrier file – Simpler steganographic techniques produce some discernible change in the file size, statistics or both. – These changes can manifest themselves in color variations, loss of resolution and other distortions that are visible to the human eye. – This form of detection requires that you know what the original carrier image or file should look like. Steganalysis Basics
  • 12. • Watermarking is the practice of hiding a message about an image, audio clip, or other work of media within the work itself. – Watermark is hidden from the user in normal use – Watermark becomes visible as a result of a special viewing process Watermarking Basics
  • 13. • Sending a message to a spy by marking certain letters in a newspaper using invisible ink • Adding sub-perceptible echo at certain places in an audio recording. • Embedding a picture of President Andrew Jackson into the paper during paper making process. Watermarking Examples
  • 14. “In 1981, photographic reprints of confidential British Cabinet Documents were being printed in newspapers. Rumor has it that to determine the source of the leak, Margaret Thatcher arranged to distribute uniquely identifiable copies of the documents to each of the ministers. Each copy had a different word spacing that was used to encode the identity of the recipient.” - Digital Watermarking, Cox Watermarking Examples
  • 15. • A digital watermark is a digital signal or pattern inserted into a digital image. Digital Watermarking Basics
  • 16. • In a broadcast monitoring system identifying data is added to the video/audio signal prior to transmission • Two kinds of monitoring systems exist – Passive Monitoring: • Recognize the content being broadcast • Compares received signals against a database of known content • Very expensive as large frames need to be compared • Useful for monitoring of competition – Active Monitoring: • Rely on information that is broadcast along with the content • Relatively easier to implement • Identification information is easily to interpret • Requires cooperation of broadcasting mechanism Watermarking Applications
  • 17. • Under US law the creator of a story, painting, song, or any other original work holds copyright the instant it is recorded in some physical form – Up to 1998 a copyright notice was required to be attached to each distributed copy if the owner wanted to protect his/her rights – Even after the change in 1998 when this is no longer required the awards are reduced significantly if the copyright information is not present with the work • Textual Copyright notices have several limitations – They are easy to remove deliberately or inadvertently – They can be aesthetically ugly if they cover a part of the image – For music the copyright is only on the media not on the work • Electronic watermarks are imperceptible and inseparable from the work they are contained and are hence superior Watermarking Owner Identification
  • 18. • Textual notices can be erased and replaced by a forger – Image editors can be used to edit copyright notices – One solution is to register the image with copyright depository (expensive) • Watermarking can prove image identity – Watermarks may also be altered – It is possible to prove that one image is derived from another indirectly proving the ownership Watermarking Proof of Ownership
  • 19. • Transaction Tracking • Content Authentication • Copy Control • Device Control Watermarking Other Applications
  • 20. • Should be perceptually invisible to prevent obstruction of the original image. • Statistically invisible so it cannot be detected or erased. • Simple to extract watermark from image – Otherwise, the detection process requires too much computation time. • Detection should be accurate. – Few false positives & false negatives • Should be able to produce numerous watermarks. – Otherwise, only a limited number of images may be marked. • Should be robust to filtering, additive noise, compression, and other forms of image manipulation. • Should be able to determine the true owner of the image. Image Watermarking Properties
  • 22. • M-Sequence Generator – Embedded or added to the last significant digit of the original image – Watermark was extracted by taking the least significant bits at specific locations – Detection was done by cross correlation of the original and extracted watermarks • Discrete Cosine Transform (DCT) – Watermark was placed in perpetually significant areas of the image – Watermark based on 1000 random samples of a N(0,1) distribution – Sample was added to the 1000 largest DCT coefficients of the image – Inverse DCT was taken to retrieve the watermarked image – For detection watermark was extracted from the DCT of suspected image Image Watermarking Techniques
  • 23. • Discrete Wavelet Transform(DWT) – Watermark modeled as Gaussian noise was added to middle and high frequency bands of the image – Decoding process involved taking DWT of potentially marked image • Fractal Codes – A collage map was composed from 8x8 blocks of original image and from image’s DCT Image Watermarking Techniques
  • 26. • Perceptually inaudible, – such that no perceptual quality degradation occurs • Statistically undetectable – To ensure security • Cannot be removed or modified by any signal processing operation (e.g. filtering, compression, MP3-encoding,...) without degrading perceptual quality • Readily extractable to detect copyright information Watermarking Audio Properties
  • 27. • Echo Coding • Phase Coding • Direct-Sequence Spread Spectrum • Frequency-Hopped Spread Spectrum • Frequency Masking Watermarking Audio Techniques
  • 28. Watermarked Sound Watermarking Audio Original Sound • Wideband Audio Signal is a raw WAV file - Ten seconds in length - Sampled at 44.1 kHz - Quantized to 16 bits per sample Watermarked Sound Original Sound Echo Coding Frequency Hopped Spread Spectrum