Sei sulla pagina 1di 31

A STEGANOGRAPHIC APPROACH TO SONAR

TRACKING

VEENA AJAYAN

College of Engineering Trivandrum


ECE(TVE18ECMT16)
Guided By: Gijy P G

November 12, 2019

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 1 / 31


Overview

1 Introduction
2 Steganography
3 Steganography Under Various Media
4 Steganography In Sonar
Track-Before-Detect
Mesurement Model
5 Adaptive Steganography
6 Monte Carlo Simulation
7 Results
8 Conclusion
9 References

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 2 / 31


INTRODUCTION

Find objects of interest using the knowledge of wave propagation and


scattering theory.

A linear frequency modulated (chirp) waveform used in many sonar


applications.

Sonar can have less environmental harm while still achieving its goal.

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 3 / 31


SONAR TRACKING

Conventional active sonar tracking - detect and estimate the target


position.

Track-before-detect (TBD) approaches were improve the reliability of


tracking performance.

Sound travels as a longitudinal compression wave and its propagation


characteristics depend on the properties...

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 4 / 31


STEGANOGRAPHY

Steganography means hiding information in other information.

Steganography comes from the greek word,it means coverd or secret


writing.

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 5 / 31


STEGANOGRAPHY UNDER VARIOUS MEDIA

STEGANOGRAPHY IN TEXT

STEGANOGRAPHY IN IMAGES

STEGANOGRAPHY IN AUDIO

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 6 / 31


STEGANOGRAPHY IN TEXT

It involves three type of coding:

LINE SHIFT CODING-Text lines are vertically shifted to encode the


document uniquely.

WORD SHIFT CODING-The codewords are coded into document by


shifting the horizontal locations of words within text lines.

FEATURE CODING In feature coding,certain text features are


altered,or not altered, depending on the code word .

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 7 / 31


STEGANOGRAPHY IN IMAGES

The most common approaches to information hiding in images:

LEAST SIGNIFICANT BIT INSERTION

MASKING AND FILTERING

ALGORITHMS AND TRANSFORMATIONS

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 8 / 31


STEGANOGRAPHY IN AUDIO

METHODS OF AUDIO DATA HIDING

LOW-BIT ENCODING

PHASE CODING

ECHO DATA HIDING

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 9 / 31


STEGANOGRAPHY IN SONAR

The ambient environmental sound is the cover.

The transmission from the platform is the hidden message.

Underwater acoustic environment is highly non-stationary and


heterogeneous.

The modeling approach is focuses on capturing the temporal


characteristics of the underwater background sound.

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 10 / 31


TRACK-BEFORE-DETECT

Sound modeling approach captures the time-evolving aspect of


underwater ambient acoustic environment.

A track detection approach for weak targets using a long timescale


motion model.

A novel distance/similarity measure for time series.

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 11 / 31


MEASUREMENT MODEL

Acoustic time series denoted as ym (t), t is the time .

The matched filtered and basebanded output of each scan, zm(t).

The propagation attenuation and delayed by the round trip time of


the transmitted waveform, Rm(t), and the filtered noise, vm(t).

zm(t) = Rm(t) + vm(t)

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 12 / 31


Track detection approach uses a long timescale motion model, that
better than the TBD methods.

LONG TIMESCALE MOTION MODEL

A motion model captures the physical characteristics of target


motion.

Improve the search efficiency and achieve reliable tracking


performance.

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 13 / 31


Well aligned autocorrelation peaks produces higher contrast integrated
peak

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 14 / 31


Information Hiding and Covert Waveform

Information hiding techniques for audio and image files is least significant
bit (LSB) manipulation.

The objective of the platform is not communication, but detection of


target echo.
The cover is the ambient environmental sound.
The hidden message is the transmission from the platform.
Two together make up the stego.

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 15 / 31


Underwater ambient sound constantly evolving stochastically.

Critical difference between image/audio steganography and


underwater sonar is the variability of the cover.

Background sound heard at the time of transmission from the


platform will be different from the background sound heard when the
transmitted waveform impinges on the target.

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 16 / 31


The statistical characteristics of the ambient sounds may be similar.

Spread spectrum can improve robustness.

Conventional sonar systems employed a narrowband pulsed waveform


for detection.

Tracking and narrowband filters to efficiently detect and track


waveforms.

DSSS is performed by modulating the message signal with pseudo


noise (PN) sequence.

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 17 / 31


ADAPTIVE STEGANOGRAPHY

The striping pattern of zebras, while effective against its predator and
parasite, do not adapt to the environment, and are easily recognized
by humans.

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 18 / 31


Octopus can blend into the environment with very high fidelity
making it very difficult for its predators to recognize it.

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 19 / 31


Heterogeneous cover may provide higher security.

Adaptive steganography is necessary for heterogeneous and


non-stationary cover .

deep water acoustic environment modeled with Gaussian distributed


noise with a spectrum known as the Wenz curve.

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 20 / 31


MONTE CARLO SIMULATION

The background model estimated from a snapping shrimp recording .

Various types of transmission waveforms are sampled from different


waveform models.

Performance of the batch track detection approach evaluated by


processing the received echo.

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 21 / 31


The parameters of the simulation are the source level (SL) at the
platform and the initial range to the target, Rinit.

tscan = 2Rmax/c.

tscan = Obsertion Time.


Rmax = 3 KM.
C = speed of sound in water.
ttot = M tscan .

The snapping shrimp process is the background for the simulation.

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 22 / 31


Five types of candidate transmission waveforms are:

White Gaussian,pink Gaussian, snapping shrimp,colored Gaussian (2).


The same target motion is used for all waveform scenarios.

The target motion with amplified target echo level

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 23 / 31


Processed data with true target motion.

The root mean square error (RMSE) of the estimated track is smaller
than the specified threshold - a successful target track detection.

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 24 / 31


RESULTS

Simulation results organized in three parts; Steganographic


performance,Batch track detection performance, and Steganographic
sonar performance.

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 25 / 31


The expected lower bound on missed detection probability.

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 26 / 31


The performance of the energy detector with 1 second integration
time with the false alarm rate set to be one every three hours.

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 27 / 31


Batch Track Detection Probability

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 28 / 31


CONCLUSION

Steganographic transmission waveforms desirable for underwater


applications.

Track-before-detect approaches fail due to overwhelming search


computation with simplistic short timescale motion model.

Improved the search efficiency,coherent integration of target echo


energy ,Reliable target track detection.

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 29 / 31


References

Provos, N. and P. Honeyman (2003) Hide and seek: An introduction


to steganography, Security Privacy, IEEE, 1(3), pp. 3244.
Sedighi, V., R. Cogranne, and J. Fridrich (2016) Content-Adaptive
Steganography by Minimizing Statistical Detectability, Information
Forensics and Security, IEEE Transactions on, 11(2), pp. 221234.
Bouvet, M. and S. Schwartz (1986) Detection in underwater noises
modeled as a Gaussian-Gaussian mixture, in Acoustics, Speech, and
Signal Processing, IEEE International Conference on ICASSP86., vol.
11, IEEE, pp. 27952798.

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 30 / 31


Thank You

VEENA AJAYAN (CET) Steganographic Approach November 12, 2019 31 / 31

Potrebbero piacerti anche