Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Introduction
Steganography
(covered writing, covert channels)
Watermarking
(all objects are marked in the same way)
Fingerprinting
(identify all objects, every object is marked specific)
Source: Richard Popa.
Steganography
(hide existence of the secret message, but do not use encryption)
Encryption
(encrypt the message, but do not hide the message)
Source: Richard Popa.
Innocent.
Suspicious.
History
440 B.C.
Histiaeus shaved the head of his most trusted slave and tattooed it with a message which disappeared after the hair had regrown. To instigate a revolt against Persians.
Current
Special inks are used to write a hidden messages on bank notes. Industry demands for digital watermarking and fingerprinting of audio and video.
Copyright Watermarking
Why is it so important?
Internet has lead to sharing of information e.g. digital libraries.
The stego object must remain unchanged or almost unchanged to naked eye.
In watermarking, changes in stego object have no effect on watermark. We assume the attacker knows secret data is hidden inside the stego object.
Encoder
Key
Secret Image
Decoder
Communications Channel Original Cover
Types of Steganography
Fragile Hidden information destroyed as soon as object is modified. Protocols tend to be easy to implement.
Useful in proving objects have not been manipulated and changed e.g. evidence in a court of law.
Robust It should be infeasible to remove the hidden data without degrading the perceived quality of the data. Protocols are more complex. One single protocol may not withstand all object manipulations.
Steganography Techniques
Binary Files Text
Document XML
Images
LSB, DCT, Wavelet
Audio
Midi, MP3
Other Types
b = 3;
c = b + 3; d = b + c;
c = b + 3;
a = 2; d = b + c;
a = 2;
c = b + 3; d = b + c;
c = b + 3;
d = b + c; a = 2;
Codebook Encoder
Original Document
Marked Documents
Shift of words slightly left or right, decided by codebook An Example of this Example is shifted to the left. this is shifted An Example of this to the right
Feature Coding - Analyse document, then pick features to change e.g. text height
Text Techniques
White Space manipulation
Text viewers cant see white space at the end of lines.
Text Techniques
Dear Friend , Especially for you - this red-hot intelligence. We will comply with all removal requests . This mail is being sent in compliance with Senate bill 2116 , Title 9 ; Section 303 ! THIS IS NOT A GET RICH SCHEME.Why work for somebody else when you can become rich inside 57 weeks . Have you ever noticed most everyone has a cellphone & people love convenience . Well, now is your chance to capitalize on this . WE will help YOU SELL MORE and sell more ! You are guaranteed to succeed because we take all the risk ! But don't believe us . Ms Simpson of Washington tried us and says "My only problem now is where to park all my cars" . This offer is 100% legal . You will blame yourself forever if you don't order now ! Sign up a friend and you'll get a discount of 50% . Thank-you for your serious consideration of our offer . Dear Decision maker ; Thank-you for your interest in our briefing . If you are not interested in our publications and wish to . . .
Text Techniques
XML
Universal format for structured data and documents.
Text Techniques
Using tag structure to hide information
Stego data: <img src=foo1.jpg></img> <img src=foo2.jpg/> <img src=foo3.jpg/> <img src=foo4.jpg/> <img src=foo5.jpg></img>
Text Techniques
Using white space in tags Stego key: <user > <tag>, </tag>, or <tag/> 0 <tag >, </tag >, or <tag /> 1 <name>Alice</name > <id >01</id> </user>
Text Techniques
Containment of elements
stego key: <favorite><fruit>SOMETHING</fruit></favorite> 0 <fruit><favorite>SOMETHING</favorite></fruit> 1 Using the order of elements stego key: <user><name>NAME</name><id>ID</id></user> 0 <user><id>ID</id><name>NAME</name></user> 1
Image Techniques
Simple Watermarking
A simple way of watermarking images is to embed another image into them.
Image Techniques
LSB Least Significant Bit
A simple yet effective way of hiding data in an image for any purpose.
The least significant bits of the host image are used to hide the most significant bits of the hidden image (for image-in-image hiding).
The least significant bits can always be used to hide other data types. The next example will show how image-in-image hiding works via this method.
Image Techniques
To extract the hidden image, you basically take out the LSBs from the host image and create a new image from them.
Image Techniques
Original Images Bit Level 1 7 4
Image Techniques
This method works best when both the hidden image and host image have equal priority in terms of the number of bits used. Not a very good way of watermarking as it is easy to remove the hidden data. The hidden data can easily be corrupted by noise. The LSBs can be used to store other information like text the only limitation is the size of the data you wish to store.
Image Techniques
DCT (Direct Cosine Transformation)
DCTs convert images from the spatial domain to the frequency domain.
High frequencies correspond to rapidly changing pixel values. Low frequencies correspond to slowly changing pixel values.
Used to compress JPEG images and can be used as part of a information hiding technique.
Image Techniques
A Quantizer is used as part of the JPEG compression technique.
It lowers the accuracy of the DCT coefficients which are obtained by executing a DCT on 8x8 blocks of the host image. These values can be tweaked to be all even or all odd. All even = 1 All odd = 0 An image can store 1 bit of information per 8x8 block.
Image Techniques
DCT example
Original
Watermarked
JPEG Compressed
Image Techniques
Wavelet Transformation
Wavelets are mathematical functions for image compression and digital signal processing. Used in the JPEG2000 standard. Wavelets are better for higher compression levels than the DCT method. Generally wavelets are more robust and are a good way of hiding data.
Image Techniques
Sound Techniques
Midi
Midi files are made up of a number of different messages some of which are silent, some of which are audible. A message called Program Change is used to change the current instrument. If a number of these messages are placed together, only the last change is used. Store the hidden information in the preceding fake program changes!
Sound Techniques
MP3
The data to be hidden is stored as the MP3 file is created in the compression stage.
As the sound file is being compressed, data is selectively lost depending on the bit rate the user has specified.
The hidden data is encoded in the parity bit of this information.
To retrieve the data all you need to do is uncompress the MP3 file and read the parity bits.
Other Techniques
Video
A mixture of both image and sound techniques are used.
DNA
Use different DNA bases to code secret messages via some cipher key. DNA is so small it can be hidden in a dot like the microdot method.
Basic Attacks
Adjusting the length of an audio file, while leaving the pitch unaffected can remove hidden data.
Robustness Attacks
Need to cope with common transformations to prevent accidental removal of mark. Many techniques can survive individual transformations but are vulnerable to combinations of them. Try to anticipate pirates actions and design to cope with them. Use of benchmarking can help determine vulnerabilities.
Interpretation Attacks
Cannot tell which watermark is inserted first. Copyright owner publishes document d with watermark w, ie d + w. Pirate adds watermark w and claims that original is d + w w. Clear that someone is lying but no way of telling who is genuine owner.
Implementation Attacks
If software implementation is poor it can allow some attacks. Digimarc requires users to register ID and password. Attacker broke into software and disabled password checks. Could then change the ID, affecting already marked images and bypassing checks for existing marks to overwrite them.
Comparison
Confidentiality Integrity Unremovability
Yes
No
Yes
No
Yes
No
Yes/No
Yes/No
Yes
Conclusion
Steganography will become increasingly important as more copyrighted material becomes available online. Many techniques are not robust enough to prevent detection and removal of embedded data. For technique to be considered robust:
The quality of the media should not noticeably degrade upon embedding data. Data should be undetectable without secret knowledge typically the key. If multiple marks are present they should not interfere with each other. The marks should survive attacks that dont degrade the perceived quality of the work.
Questions