Professional Documents
Culture Documents
Steganography Hiding Information
Steganography Hiding Information
that is
Hiding information
into pictures and other media
Prof.Dr. Mihly Tth toth.mihaly@szgti.bmf.hu
October 2003 Seminar #1 in HTI
Phenomena of Steganography
Carrying (or Covering) media
Which may be picture, video, sound file, radio communication, even the structure of a File system. The carry medium ought to look innocent.
The hidden information (or the information to hide) called Stego medium or Stego message.
Which may be open message, but may be encrypted one as well.
December 03 Seminar #1 in HTI 2
Selecting Steganography
Some elements of the covering medium are selected to carry the hidden information. The relevant information is hidden in a narrow-band region of a wide band noise. The hiding (narrow) band is changed by time to time. (Radio Communication.)
December 03 Seminar #1 in HTI 3
December 03
Seminar #1 in HTI
There exist cases when we do not want the message being completely hidden (watermark).
December 03 Seminar #1 in HTI 6
December 03
Seminar #1 in HTI
December 03
Naturally our ancestors applied secret writings as well. They used both substitution and permutation of letters and other codes for light signals.
December 03 Seminar #1 in HTI 9
Hiding methods in WW 2
In WW2 the hardly visible dots still were used to denote the selected letters in a newspaper, for example. Many soldiers tried to send home hidden messages that way, but the method was well known by the censors. (If they cannot
discover the hiding method, they mixed the words at least or put the stamp in an other position, etc.)
electronic watermarking
December 03 Seminar #1 in HTI 12
In common name:
December 03
13
December 03
Seminar #1 in HTI
14
Advantages/disadvantages
Methods when the hidden information is carried by the appearance of the text, (not only the text file.) Such a way the printed or copied text also carries the hidden information. (E.g. a confidential circular letter.) This makes difficult to select out the appropriate letters by a computer. The printing/copying/scanning processes bring additional problems to revoke the hidden text.
December 03 Seminar #1 in HTI 15
December 03
Seminar #1 in HTI
17
Modifying fonts
Increasing the lenght of the vertical lines in some characters (like b,d,h,k,l,p,q) with a small amount is not prominent. This also may carry information. Arabic writing allows many decorative variations of the letters in a text Which may be used to mark selected letters. Any proposition?
December 03
Seminar #1 in HTI
19
2.
If the picture (graphics) was made directly for that purpose See the example in the next slide. In so called cover pictures. (We will come back to that.)
Using covering pictures is the most frequent method of hiding information.
Seminar #1 in HTI
December 03
22
December 03
Seminar #1 in HTI
23
change of a pixel is not visible if the LSBs of the color bytes are changed. (In fact the average number of changes affect half of the color bytes only)
December 03
Seminar #1 in HTI
25
December 03
Seminar #1 in HTI
26
December 03
Perhaps some very little change of some colors are visible in the second row of the previous slide. It happened on 256 grade scale of the basic colors. The luminescence is also changed from 120 to 112. 27 Seminar #1 in HTI
Visual experiences
Changing the LSBs of the basic colors cannot be detected by a visual way, at least not on a computer screen. Changing, however, the last four bits of a color byte could be detected visually. The reason for that is in the physiological characteristic of the human eyes. The black and white and gray-scale sensing abilities of the human eyes are much better, but in spite of that the gray-scale pictures are more suitable for hiding information in them. Changing LSBs the average byte change is half of the total number of color bytes.
December 03 Seminar #1 in HTI 28
December 03
Seminar #1 in HTI
30
December 03
Seminar #1 in HTI
31
JPG
December 03
21 795 bytes
Seminar #1 in HTI
21 952 bytes
32
Steganography (cont.)
Hiding by 1 bit
Hiding by 4 bits
December 03
Seminar #1 in HTI
34
Steganography (cont.)
Though the hiding method shown is very sensitive to the editing of the covering picture, it has a considerable advantage too: It does not increase the size of the covering file for it utilizes its redundancy (As it was shown by bitmap images of Kand sculpture)
December 03 Seminar #1 in HTI 35
Steganography (cont.)
Steganography covers even the existence of any hidden message. One disadvantage is that quite an amount of covering information is needed to hide whatever we want to. At least 8 to 10 times more if we really want it to be non detectable. Nevertheless if the fact of the hiding becomes evident then the entire business is virtually useless, if we had not encrypted the information in advance. The really big disadvantage is that editing or compressing the picture do catastrophic damage to the hidden information.
December 03
Seminar #1 in HTI
36
The problem is that visibility as such is very subjective. We may talk about hardly visible and very much visible e-watermarks as well.
December 03
Seminar #1 in HTI
37
Masking
This is a hiding technology which is suitable to produce both
Non-detectable e-watermarks and e-watermarks of different grade of visibility
The carrier medium is modified a suitable way by the information to be the watermark and the colors of the pixels below the mask are modified. The visibility depends upon the amount of modification.
December 03 Seminar #1 in HTI 38
December 03
Seminar #1 in HTI
39
December 03
Seminar #1 in HTI
watermark
40
Applying masking
The location of masked stego information within the pictures area is NOT indifferent. Essentially the same technology is applied in case of video tapes or DVDs, but
the watermark is put different locations on the subsequent slides there is no watermark in EVERY slides of the movie.
December 03 Seminar #1 in HTI 41
42
Summary (1)
The meaning of Steganography is hiding information and the related technologies. There is a principal difference between Steganography and Encryption, however they can meet at some points too. They can be applied together, i.e. encrypted information can be hidden in addition. (As it will be demonstrated soon.)
December 03 Seminar #1 in HTI 48
Summary (2)
To hide something a covering medium is always needed. (Picture, sound track, text or even the structure of a file system, etc.) The covering medium must be redundant, otherwise the hidden information could be detected easily.
December 03
Seminar #1 in HTI
49
Summary (3)
The technology of hiding should match the nature of the medium. The hidden information should not be lost, if the carrying medium is edited, modified, formatted, re-sized, compressed or printed. Thats a difficult task to realize.
December 03
Seminar #1 in HTI
50
Summary (4)
Its an expectation as well, that the fact of hidden information should be impossible to detect by other then the addressee. On the other hand security services should have methods to detect such information. At least its existence. Realizing a good trade-off there are different technologies.
December 03 Seminar #1 in HTI 51
Summary (5)
Nowadays the most popular application of Steganography is hiding copy rights and other commercial information. Such kind of hidden information is known as e-watermark. The e-watermark is not always invisible. There are cases when it is made deliberately strikingly visible. E.g. in case of trial versions of software.
December 03 Seminar #1 in HTI 52
October 2003
Seminar #1 in HTI
53