Professional Documents
Culture Documents
Outline
Introduction to Information Hiding Steganography
Definition and History Applications Basic Principles Examples of Techniques Demos Definition and History Applications Basic Principles Requirements Attacks Evaluation and Benchmarking Examples
Watermarking
Information Hiding
Information Hiding is a general term encompassing many subdisciplines Two important subdisciplines are: steganography and watermarking Steganography:
Hiding: keeping the existence of the information secret
Watermarking:
Hiding: making the information imperceptible
Information hiding is different than cryptography (cryptography is about protecting the content of messages)
Steganography: Applications
Unobtrusive communication
Military and intelligence agencies Criminals !! Normal people
Plausible deniability
Fair voting Personal privacy Limitation of liability
Anonymous communication
Vote privately Make political claims Access censored material Preserve free speech
stego-object stego-object s s Encoder Insecure Decoder (Hiding Mechanism) (Extraction Mechanism) Channel
message m
key k
key k
message m
Steganography: Demo 1
Information Hidden in an Audio File
cover c
stego-object stego-object s s Encoder Insecure Decoder (Hiding Mechanism) (Extraction Mechanism) Channel
message m
message m
Steganography: Demo 1
Information Hidden in an Audio File
Cover is a CD quality audio file (sampling frequency: 44.1 kHz, resolution: 16 bits, stereo) Message is a 256256 24-bit colour image
12 samples of Left audio channel 1 pixel of image LSB Substitution 16 bits
24 bits
Steganography: Demo 2
Information Hidden in an Image File
cover c stego-object stego-object s s Encoder Insecure Decoder (Hiding Mechanism) (Extraction Mechanism) Channel
message m
message m
Steganography: Demo 2
Information Hidden in an Image File
Cover is a 512512 8-bit monochrome image Message is an 8 kHz, 8-bits, mono audio file
8 pixels of image
8 bits
8 bits
Watermarking: Definition
Watermarking: is the practice of imperceptibly altering a cover to embed a message about that cover Watermarking is closely related to steganography, but there are differences between the two:
In watermarking the message is related to the cover Steganography typically relates to covert point-to-point communication between two parties Therefore, steganography requires only limited robustness Watermarking is often used whenever the cover is available to parties who know the existence of the hidden data and may have an interest in removing it Therefore, watermarking has the additional notion of resilience against attempts to remove the hidden data
Watermarks are inseparable from the cover in which they are embedded. Unlike cryptography, watermarks can protect content even after they are decoded
Watermarking: History
More than 700 years ago, watermarks were used in Italy to indicate the paper brand and the mill that produced it By the 18th century watermarks began to be used as anticounterfeiting measures on money and other documents The term watermark was introduced near the end of the 18th century. It was probably given because the marks resemble the effects of water on paper The first example of a technology similar to digital watermarking is a patent filed in 1954 by Emil Hembrooke for identifying music works In 1988, Komatsu and Tominaga appear to be the first to use the term digital watermarking About 1995, interest in digital watermarking began to mushroom
Watermarking: Applications
1. Copyright protection
Most prominent application Embed information about the owner to prevent others from claiming copyright Require very high level of robustness
2. Copy protection
Embed watermark to disallow unauthorized copying of the cover For example, a compliant DVD player will not playback or copy data that carry a copy never watermark
3. Content Authentication
Embed a watermark to detect modifications to the cover The watermark in this case has low robustness, fragile
Watermarking: Applications
4. Transaction Tracking
Embed a watermark to convey information about the legal recipient of the cover This is useful to monitor or trace back illegally produced copies of the cover This is usually referred to as fingerprinting
5. Broadcast Monitoring
Embed a watermark in the cover and use automatic monitoring to verify whether cover was broadcasted as agreed
Encoder
(Embedding)
Decoder
(Extraction)
watermark w
key k
key k
Watermarking: Requirements
Imperceptibility
The modifications caused by watermark embedding should be below the perceptible threshold
Robustness
The ability of the watermark to resist distortion introduced by standard or malicious data processing
Security
A watermark is secure if knowing the algorithms for embedding and extracting does not help unauthorised party to detect or remove the watermark
Watermarking: Requirements
Payload
The amount of information that can be stored in a watermark
Watermarking: Attacks
Signal enhancement (sharpening, contrast enhancement, etc.) Additive and multiplicative noise (gaussian, uniform, etc.) Filtering (High pass, low pass, linear, nonlinear, etc.) Lossy compression (JPEG, MPEG-x, H.26x, etc.) Geometric transforms (translation, rotation, etc.) Data reduction (cropping, clipping, etc.) Transcoding (MPEG2 H.263, etc.) D/A and A/D conversion (print-scan, etc.) Multiple watermarking Collusion attack Mosaic attack
Watermarking:
Objective Evaluation:
MSE, SNR, PSNR, NCC, etc.
Benchmarking Software:
Unzign StirMark CheckMark OptiMark
Watermarking: Examples
Informed Watermarking Method of Cox et al.
Original image D Extract largest N coefficients
DCT
V = [v1 , v2 , K, v N ]
key k
X = [x1 , x2 , L, x N ]
Embed
vi = vi (1 + xi )
V
Watermarked Image D
IDCT
ENCODER
Watermarking: Examples
Informed Watermarking Method of Cox et al.
Original image D Attacked image D* DCT Extract largest N coefficients Extract N coeff. from same locations
V = [v1 , v2 , K, v N ]
Extract
DCT
V* = [v *1 , v *2 , K , v * N ]
xi * = (
vi * 1) / vi
X*
key k
X = [x1 , x2 , L, x N ]
DECODER
Watermarking: Examples
original
= 0.1
= 0.4
= 0.6
original
N = 2000
N = 4000
N = 6000
Watermarking: Examples
original
original
Watermarked NC=0.999
Cropped NC=0.672
Watermarking: Examples
Original Image 512 X 512 DCT Watermarked Image
DCT IDCT
Walsh Coding
128 x 64
Watermarking: Examples
Questions