You are on page 1of 34

A STEGANOGRAPHIC APPROACH TO SONAR

TRACKING

VEENA AJAYAN

College of Engineering Trivandrum


ECE(TVE18ECMT16)
Guided By: Gijy P G

November 13, 2019

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 1 / 34


Overview

1 Introduction
2 Steganography
3 Steganography Under Various Media
4 Steganography In Sonar
Track-Before-Detect
Mesurement Model
5 Adaptive Steganography
6 Monte Carlo Simulation
7 Results
8 Conclusion
9 References

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 2 / 34


INTRODUCTION

Find objects of interest using the knowledge of wave propagation and


scattering theory.

A linear frequency modulated (chirp) waveform used in many sonar


applications.

Sonar can have less environmental harm while still achieving its goal.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 3 / 34


INTRODUCTION CONTD..

SONAR TRACKING

Conventional active sonar tracking - detect and estimate the target


position.

Track-before-detect (TBD) approaches were improve the reliability of


tracking performance.

Sound travels as a longitudinal compression wave and its propagation


characteristics depend on the properties...

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 4 / 34


STEGANOGRAPHY

Steganography means hiding information in other information.

Steganography comes from the greek word,it means coverd or secret


writing.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 5 / 34


STEGANOGRAPHY UNDER VARIOUS MEDIA

STEGANOGRAPHY IN TEXT

STEGANOGRAPHY IN IMAGES

STEGANOGRAPHY IN AUDIO

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 6 / 34


STEGANOGRAPHY IN TEXT

It involves three type of coding:

LINE SHIFT CODING-Text lines are vertically shifted to encode the


document uniquely.

WORD SHIFT CODING-The codewords are coded into document by


shifting the horizontal locations of words within text lines.

FEATURE CODING In feature coding,certain text features are


altered,or not altered, depending on the code word .

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 7 / 34


STEGANOGRAPHY IN IMAGES

The most common approaches to information hiding in images:

LEAST SIGNIFICANT BIT INSERTION

MASKING AND FILTERING

ALGORITHMS AND TRANSFORMATIONS

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 8 / 34


STEGANOGRAPHY IN AUDIO

METHODS OF AUDIO DATA HIDING

LOW-BIT ENCODING

PHASE CODING

ECHO DATA HIDING

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 9 / 34


STEGANOGRAPHY IN SONAR

The ambient environmental sound is the cover.

The transmission from the platform is the hidden message.

Underwater acoustic environment is highly non-stationary and


heterogeneous.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 10 / 34


STEGANOGRAPHY IN SONAR CONTD....

TRACK-BEFORE-DETECT

Sound modeling approach captures the time-evolving aspect of


underwater ambient acoustic environment.

A track detection approach for weak targets using a long timescale


motion model.

A novel distance/similarity measure for time series.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 11 / 34


STEGANOGRAPHY IN SONAR CONTD.....
MEASUREMENT MODEL

Acoustic time series denoted as ym (t), t is the time .

The matched filtered and basebanded output of each scan, zm(t).

The propagation attenuation and delayed by the round trip time of the
transmitted waveform, Rm(t) (Range), and the filtered noise, vm(t).

zm(t) = Rm(t) + vm(t)

Track detection approach uses a long timescale motion model, that


better than the TBD methods.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 12 / 34


LONG TIMESCALE MOTION MODEL

A motion model captures the physical characteristics of target


motion.

Improve the search efficiency and achieve reliable tracking


performance.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 13 / 34


LONG TIMESCALE MOTION MODEL CONTD....

Figure: (a) Misaligned. (b) Partially aligned. (c) Aligned. (d) Misaligned sum.
(e) Partially aligned sum. (f) Aligned sum.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 14 / 34


LONG TIMESCALE MOTION MODEL CONTD....

Well-aligned autocorrelation peaks produce higher contrast integrated


peak as seen in (c) and (f)

Larger wc, due to signals with less bandwidth.

Narrowband signals may be more conspicuous.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 15 / 34


Information Hiding and Covert Waveform

Information hiding techniques for audio and image files is least significant
bit (LSB) manipulation.

The objective of the platform is not communication, but detection of


target echo.
The cover is the ambient environmental sound.
The hidden message is the transmission from the platform.
Two together make up the stego.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 16 / 34


Information Hiding and Covert Waveform contd....

Underwater ambient sound constantly evolving stochastically.

Critical difference between image/audio steganography and


underwater sonar is the variability of the cover.

Background sound heard at the time of transmission from the


platform will be different from the background sound heard when the
transmitted waveform impinges on the target.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 17 / 34


Information Hiding and Covert Waveform contd....

The statistical characteristics of the ambient sounds may be similar.

Spread spectrum can improve robustness.

Conventional sonar systems employed a narrowband pulsed waveform


for detection.

Tracking and narrowband filters to efficiently detect and track


waveforms.

DSSS is performed by modulating the message signal with pseudo


noise (PN) sequence.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 18 / 34


ADAPTIVE STEGANOGRAPHY

Figure: The striping pattern of zebras, while effective against its predator and
parasite, do not adapt to the environment, and are easily recognized by humans.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 19 / 34


ADAPTIVE STEGANOGRAPHY CONTD....

Figure: Octopus can blend into the environment with very high fidelity making it
very difficult for its predators to recognize it.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 20 / 34


ADAPTIVE STEGANOGRAPHY CONTD....

Heterogeneous cover may provide higher security.

Adaptive steganography is necessary for heterogeneous and


non-stationary cover .

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 21 / 34


MONTE CARLO SIMULATION

The background model estimated from a snapping shrimp recording .

Various types of transmission waveforms are sampled from different


waveform models.

Performance of the batch track detection approach evaluated by


processing the received echo.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 22 / 34


MONTE CARLO SIMULATION CONTD.....

The parameters of the simulation are the source level (SL) at the
platform and the initial range to the target, Rinit.

tscan = 2Rmax/c.

tscan = Obsertion Time.


Rmax = Max Range
C = speed of sound in water.

The snapping shrimp process is the background for the simulation.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 23 / 34


MONTE CARLO SIMULATION CONTD.....
Five types of candidate transmission waveforms are:

White Gaussian,pink Gaussian, snapping shrimp,colored Gaussian (2).


The same target motion is used for all waveform scenarios.

Figure: The target motion with amplified target echo level

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 24 / 34


MONTE CARLO SIMULATION CONTD.....

Figure: Processed data with true target motion.

The root mean square error (RMSE) of the estimated track is smaller
than the specified threshold - a successful target track detection.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 25 / 34


RESULTS

Simulation results organized in three parts; Steganographic


performance,Batch track detection performance, and Steganographic
sonar performance.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 26 / 34


RESULTS CONTD...

Figure: The expected lower bound on missed detection probability.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 27 / 34


RESULTS CONTD...

White Gaussian process maintains their steganographic security better


than other types of waveforms.

Achieving expected lower bound of missed detection probability of


over 0.4 at received signal level of 0 dB.

Snapping shrimp, perform well as the mimicking waveform, (better


than two of the colored Gaussian processes)

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 28 / 34


RESULTS CONTD...

Figure: The performance of the energy detector with 1 second integration


time with the false alarm rate set to be one every three hours.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 29 / 34


RESULTS CONTD...

Result is using all of the 1 s samples during the t tot observation time

Thresholding RL value, between 7 and 8 dB for most waveform types.

The missed detection probability suddenly converging to 0 in all of


the curves.

Variability of the cover - curves are all clustered together at low RL


region.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 30 / 34


RESULTS CONTD...

COMPARISON OF TWO MODEL

Reveals the distinguishing power of the two models used to compute


the probability.

Energy detector performance not affected the change in spectral


shape of the transmitted waveform.

Processing gain of an energy detector does grow with time.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 31 / 34


CONCLUSION

Steganographic transmission waveforms desirable for underwater


applications.

Track-before-detect approaches fail due to overwhelming search


computation with simplistic short timescale motion model.

Improved the search efficiency,coherent integration of target echo


energy ,Reliable target track detection.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 32 / 34


REFERENCES

IEEE Journal of oceanic engineering, VOL. 00, NO. 00, 2018 A


Steganographic Approach to Sonar Tracking J. Daniel Park , Member,
IEEE, and John F. Doherty
Provos, N. and P. Honeyman (2003) Hide and seek: An introduction
to steganography, Security Privacy, IEEE, 1(3), pp. 3244.
Sedighi, V., R. Cogranne, and J. Fridrich (2016) Content-Adaptive
Steganography by Minimizing Statistical Detectability, Information
Forensics and Security, IEEE Transactions on, 11(2), pp. 221234.

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 33 / 34


Thank You

VEENA AJAYAN (CET) Steganographic Approach November 13, 2019 34 / 34

You might also like