In this presentation both the major domains of information security is explored.
1) Watermarking
2) Steganography
factors affecting them,applications,various techiniques are discussed in the presentation.
2. TABLE OF CONTENT
Information Security
Watermarking
Introduction
Basics of Watermarking
Properties of Watermarking
Classification of Watermarking
Attacks on Digital Image Watermarking
Application of Watermarking
Steganography
Introduction
Types of Steganography
Steganography Terminology
Factors affecting stegnographic method
Application of Steganography
Steganography Techniques
Text Steganography techniques
Audio Steganography
Video Steganography
Image Steganography
Protocol Steganography
3. INFORMATION SECURITY
Information security is a set of strategies
for managing the processes, tools and
policies necessary to prevent, detect,
document and counter threats to digital
and non-digital information. Info security
responsibilities include establishing a set
of business processes that will protect
information assets regardless of how the
information is formatted or whether it is
in transit, is being processed or is at rest
in storage.
4. WATERMARKING
Digital watermarking is the process of embedding
secret digital data, signal into the digital media
such as image, video, audio and text.
It provides security, data validation and copyright
protection of the digital data.
The basic model of Digital Image Watermarking
consists of two parts:
Watermark embedding
Watermark extraction
5. PROPERTIES OF WATERMARKING
Robustness
Fidelity or Imperceptibility
Capacity or Data payload
Computation complexity
Inevitability
9. STEGANOGRAPHY
Steganography is a Greek word which
means concealed writing. The word
“steganos” means “covered “ and
“graphial “ means “writing” .
Steganography is not only the art of
hiding data but also hiding the fact of
transmission of secret data.
10. TYPES OF STEGANOGRAPHY
Text Steganography
Image Steganography
Audio Steganography
Video Steganography
Network or Protocol Steganography
11. VARIOUS FACTORS
Robustness
Imperceptibility
Payload Capacity
PSNR (Peak Signal to Noise Ratio)
MSE (Mean Square Error)
SNR (Signal to Noise Ratio)
12. APPLICATION OF STEGANOGRAPHY
Confidential communication and secret data storing
Potential capability to hide the existence of confidential data
Hardness of detecting the hidden (i.e., embedded) data
Enhancing the secrecy of the encrypted data
Protection of data alteration
Access control system for digital content distribution
Media Database systems
13. TEXT STEGANOGRAPHY TECHINIQUE
Text Steganography can
involve anything from
changing the formatting of an
existing text, to changing
words within a text, to
generating random character
sequences or using context-
free grammars to generate
readable texts.
it can be broadly classified into
three types:
Format based
Random and Statistical
generation
Linguistic methods
14. FORMAT BASED STEGNOGRAPHY
Character shifting
Line-Shift
Word Shift
Feature Coding
Open space methods
Inter-sentence spacing
Line spacing
Inter word spacing
Figure showing Line-Shift steganography
Figure showing Word-Shift steganography
Figure showing Line-Spacing steganography
16. RANDOM AND STATISTICAL GENERATION
White Steganography
SNOW Steganography
Spam Text
SMS-Texting
SSCE (Secret Steganographic Code for Embedding)
Word Mapping
MS Word Document
Cricket Match Scorecard
CSS (Cascading Style Sheet)
17. AUDIO STEGANOGRAPHY
The basic model of Audio steganography
consists of Carrier (Audio file), Message and
Password. Carrier is also known as a cover-
file, which conceals the secret information.
The information hiding process consists of
following two steps.
Identification of redundant bits in a cover-file.
Redundant bits are those bits that can be
modified without corrupting the quality or
destroying the integrity of the cover-file.
To embed the secret information in the cover
file, the redundant bits in the cover file is
replaced by the bits of the secret information.
18. AUDIO STEGNOGRAPHY TECHNIQUES
LSB CODING: Sampling technique followed by Quantization converts
analog audio signal to digital binary sequence.
Sampled Audio Stream (16 bit) ‘A’ in binary Audio stream with encoded message
1001 1000 0011 1100 0 1001 1000 0011 1100
1101 1011 0011 1000 1 1101 1011 0011 1001
1011 1100 0011 1101 1 1011 1100 0011 1101
1011 1111 0011 1100 0 1011 1111 0011 1100
1011 1010 0111 1111 0 1011 1010 0111 1110
1111 1000 0011 1100 1 1111 1000 0011 1101
1101 1100 0111 1000 0 1101 1100 0111 1000
1000 1000 0001 1111 1 1000 1000 0001 1111
Sampling of the Sine Wave followed by Quantization process.
25. VIDEO STEGANOGRAPHY TECHNIQUES
Transformations
Non-uniform rectangular partition
Compressed video steganography
Anti-forensics technique
26. IMAGE STEGANOGRAPHY
A secret data is being embedded
inside a cover image to produce the
stego-image. A key is often needed
in the embedding process.
27. CLASSIFICATION OF IMAGE
STEGANOGRAPHY
Steganography in images are classified into two categories:
Spatial-domain based Steganography
In spatial domain scheme, the secret messages are embedded directly. The pixel
values are altered to get desired enhancement.
This techniques are particularly useful for directly altering the values of individual
pixels and hence the overall contrast of the entire image.
Transform domain based Steganography
The transform domain Steganography technique is used for hiding a large
amount of data and provides high security, a Good invisibility and no loss of
secret message. The goal behind that is to hide information in frequency
domain by altering magnitude of all of discrete cosine transform (DCT)
coefficients of cover image.
28. IMAGE STEGANOGRAPHY TECHNIQUES
Spatial-domain based Steganography
Least significant bit (LSB)
Pixel value differencing (PVD)
Edges based data embedding method (EBE)
Random pixel embedding method (RPE)
Mapping pixel to hidden data method
Labeling or connectivity method
Pixel intensity based method
Texture based method
Histogram shifting methods
32. PROTOCOL STEGANOGRAPHY
The term protocol steganography refers to the technique of embedding
information within messages and network control protocols used in network
transmission. There are covert channels in the layers of the OSI network model
where steganography can be used.
33. PROTOCOL STEGANOGRAPHY
TECHNIQUES
HICCUPS
LACK
The voice packets stream is generated at the transmitter.
One of the voice packets is chosen to be intentionally delayed.
Chosen voice packets payload is replaced with steganogram and it is delayed.
After the delay timer expires, delayed voice packet is sent to the receiver.
Usual receiver treats excessively delayed voice packet as lost and it drops such packet.
LACK-aware receiver extracts steganogram from delayed voice packet.
RSTEG
34. PROTOCOL STEGANOGRAPHY
TECHNIQUES
SCTP Multistreaming-based Method
Sender wants to transmit following hidden bits: 10011100.
First two hidden bits are 10, so a chunk within stream 3 is sent.
Next a chunk within stream 2 is sent in order to transmit bits 01.
Then a chunk within stream 4 - bits 11.
Finally a chunk within stream 1 - bits 00.
PADSTEG
TRANSTEG
For a chosen RTP voice stream, find a codec that will result in a similar voice quality but
smaller voice payload size than the originally selected.
Then, transcode the voice stream.
At this step, the original voice payload size is intentionally unaltered and the change of the
codec is not indicated. Instead, after placing the transcoded voice payload, the remaining
free space is filled with hidden data. If Secure Real-time Transport Protocol (SRTP) is utilized
for RTP streams, TranSteg detection is very difficult to perform.