Академический Документы
Профессиональный Документы
Культура Документы
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
OUTLINE
Introduction Definition Watermarking and finger printing Steganography carriers Image steganography Image and transform domain. Image or spatial domain. Transform or frequency domain. Palette based images Algorithm requirements. Optimum pixel adjustment procedure Inverted pattern approach The proposed PVD method
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
INTRODUCTION
One of the most important factors of IT has been the security of information. Two ways to achieve it. 1. cryptography sole operation is to keep the message secret. 2. steganography sole operation is to hide the existence of communicated information.
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
DEFINITION
1. Steganography is art and science of invisible communication.
Greek word
Stegos
Greek word
cover
Grafia
Meaning
writing
steganography
Covered writing
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
Steganography carriers
The four main categories of file formats that can be used for steganography are., 1. 2. 3. 4. TEXT (nth letter) IMAGES (LSB) AUDIO / VIDEO (LSB) PROTOCOLS (HEADER OF TCP PACKET)
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
Image steganography
images are most popular cover objects used for steganography. To a computer, an image is a collection of numbers that constitute different light intensities. The number of bits in color scheme is called bit depth. For ex, the smallest bit depth is 8, meaning that there are 8 bits used to describe the color.
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
Image steganography techniques can be divided to two groups. 1. Image or spatial-domain technique. 2. Transform or frequency domain.
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
spatial domain embed messages directly in the pixels. Spatial domain encompass, bitwise methods. Most suitable formats are lossless . The techniques are dependent on image format.
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
Steganography in transform domain involves manipulation of algorithms and image transform. This method hides messages in MSB of image, making it robust. The techniques are independent of file formats. Embedded message may survive after conversion between lossy and lossless compression.
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
Image domain
LSB insertion is common approach to embed. In 24-bit image, a bit of each of red, green and blue color can be used to embed. Thus, one pixel can store 3 bits in each pixel. 800*600 image can store 180,000 bytes of data. pixels red color: 1100 0011 data to embed: 01111000 after embed: 1100 0010 Changes cannot be perceived by human eye. BMP images are common since they use lossless compression.
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
GIF images are popular palette based images used. A GIF image cannot have bit depth greater than 8. For GIF, the colors are stored in color lookup table. The 8bit information at a pixel is called the index for the color in LUT. The data is embedded in the CLUT.
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
Algorithm Requirments
Invisibility Payload capacity Robustness against attacks Robustness against image manipulation Independent of file format Unsuspicious files
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
It uses the idea of processing secret messages prior to embedding. In this method each section of secret image is determined to be inverted or not before it is embedded. The bits which are used record transformation are treated as secret keys.
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
Embedding procedure
Let embedded string is S. Replaced string is R. Let embedded string is divided to P parts. Let us consider n-bit LSB substitution algorithm to be made. Then S and R of n bits length. For i= 1 to P., a) If MSE(Si,Ri)<=MSE(Si , Ri) choose Si for embedding. mark key(i) as logic 0.
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
Embedding procedure
b. If MSE(Si, Ri)>=MSE(Si ,Ri) choose Si for embedding mark key(i) as logic 1. END WHERE S= data to be hidden S = data to hidden in inverted form.
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
Embedding procedure
MSE stands for MEAN SQUARE ERROR. It is the metric used to various image compression techniques. The MSE is the cumulative squared error between the compressed and the original image. The value of MSE is calculated as below
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
The stego image and key file are required at the retreival side. First, corresponding numbers of LSB are retrieved from stego image. If key is 0, then the retreived bits are kept same. If key is 1, then the bits are inverted.
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
Step 6:extract data from Y of lengths I1-1,I1,I1+1,I2-1,I2,I2+1 and save them in same order in dif(i),where i= 1 to 6. Step 7: now find if the D1 and D2 is nearer to any one of the dif(i). whichever dif(i) that is nearer, let us name it as MIN.
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
Step 8: if(MIN nearer to D1)&&((min-D1)<8) Then , adjust the current pixel value so that difference between the curreent pixel and the left pixel is the data that is fetched from Y. SAVE THE KEY AS 0
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
Step 9: if(MIN nearer to d2)&&((min-D2)<8) Then, adjust the current pixel so that the difference between the current pixel and the top pixel is the data that is fetched from Y. SAVE THE KEY AS 1
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
Step 10: if (MIN-D1)>8 && (MIN-D2)>8 then skip the current pixel without embedding.
SAVE THE KEY AS
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
RETRIEVING STEPS
1. 2. 3. 4.
Read the stego image and save the gray values in W. Read the key file and save the binary data in Y. Skip the first row and column. If (Y==0) Then,find the difference between the current pixel and the left pixel and save it in D. Also, find the number of bits stored from below pixel and save it in N. Convert D in to binary of N bits
TECHNICAL SEMINAR
DRK
College of Engineering & Technology
THANK YOU
TECHNICAL SEMINAR