SlideShare uma empresa Scribd logo
1 de 38
steganography
&
watermarking
by Sudip Nandi
OVERVIEW
Information hidding
Steganography Defined
Block diagram
Steganography in various media
Steganalysis
Application
Advantages and Disadvantages
Watermarking
INTRODUCTION
Information Hiding Techniques
Information Hiding
Steganography Watermarking
3
Information Hiding
Information Hiding : Communication of
information by embedding in original data and
retrieving it from other digital data.
Depending on application we may need process to
be imperceptible, robust, secure. Etc.
Where can we hide?
Media
 Video
 Audio
 Still Images
 Documents
Software
Etc.
We focus on data hiding in media.
We mainly use images but techniques and concepts
can be suitably generalized to other media.
Why Hide?
Because you don’t want any one to even know about its
existence.
Covert communication – Steganography
Because you want to protect it from malicious use.
copy protection and deterrence - Digital Watermarks
STEGANOGRAPHY
STEGANOGRAPHY DEFINED
The word steganography comes from the
Greek ‘steganos’ , meaning covered or secret,
and ‘graphy’ , meaning writing or drawing.
Therefore, steganography literally means –
“covered writing”.
STEGANOGRAPHY UNDER VaRIOUS MEDIA
 Steganography in “TEXT”
 Steganography in “IMAGES”
 Steganography in “AUDIO”
STEGANOGRAPHY IN TEXT
It involves three types of coding:
Line-Shift Coding : Here, text lines are vertically shifted to
encode the document uniquely.
 Word-Shift Coding : The codewords are coded into a
document by shifting the horizontal locations of words
within text lines, while maintaining a natural spacing
appearance.
STEGANOGRAPHY IN IMAGE
Digital images are made up of pixels.
The arrangement of pixels make up the
image.
Each pixel can have 8-bit(Gray image)
and 24-bit(Color image) binary number.
The larger the image size, the more
information you can hide. However, larger
images may require compression to avoid
detection
GRAYSCALE PALETTE
NEBULA PALETTE
IMAGE-BASED TECHNIQUES
Least Significant Bit Insertion :
Replaces least significant bits with the message to be encoded
A sample raster data for 3 pixels (9 bytes)
00100111 11101001 11001000
00100111 11001000 11101001
11001000 00100111 11101011
00100110 11101001 11001000
00100110 11001000 11101000
11001000 00100111 11101011
Inserting
the binary
value for
A
(01000001)
changes
4 bits
STEGANOGRAPHY IN AUDIO
Audio Environments
Digital representation
In audio steganography, secret message is embedded into
digitized audio signal which result slight altering of binary
sequence of the corresponding audio file. There are several
methods are available for audio steganography. We are going to
have a brief introduction on some of them.
STEGANOGRAPHY IN AUDIO
Methods of Audio Data Hiding
LSB techniques:
Phase coding :
STEGANALYSIS
Here 2 methods of Steganalysis are looked into :
 detecting messages or their transmission
 disabling embedded information
RELATION BETWEEN STEGANOGRAPHY
AND STEGANALYSIS
APPLICATION OF STEGANOGRAPHY
Confidential communication and secret data storing
Protection of data alteration
Media database system
• ADVANTAGES :
 Difficult to detect and Only receiver can detect.
 It can be done faster with large no. of softwares.
DISADVANTAGES :
 The confidentiality of information is maintained by the algorithms, and
if the algorithms are known then this technique is of no use.
 Password leakage may occur and it leads to the unauthorized access
of data.
ADVANTAGE AND DISADVANTAGE OF STEGANOGRAPHY
STEGANOGRAPHY VS WATERMARKING
Watermarking is a process in which the information which
verifies the owner is embedded into the digital image or signal.
These signals could be either videos or pictures or audios;
steganography is changing the image in a way that only the
sender and the intended recipient are able to detect the
message sent through it.
 Watermarking is of two types; visible watermarking and
invisible watermarking.
 Steganography is typically invisible.
 The ease in use and abundant availability of steganography tools
has law enforcement concerned in trafficking of illicit material via web
page images, audio, and other transmissions over the Internet.
 This seminar provides an overview of steganalysis and introduced
some characteristics of steganographic software that point signs of
information hiding.
Formerly, just an interest of the military, steganography is now
gaining popularity among the masses.
CONCLUSION
Digital Watermarks
What is a Watermark?
A watermark is a “secret message” that is embedded
into a “cover message”.
Usually, only the knowledge of a secret key allows us
to extract the watermark.
Visible Watermarking Invisible Watermarking
26
History
• The Italians where the 1st to use watermarks in the
manufacture of paper in the 1270's.
• A watermark was used in banknote production by the
Bank of England in 1697.
It is a good security feature because the watermark
cannot be photocopied or scanned effectively.
27
Why Watermark? Motivation
 Copyright protection of multimedia data
Copyright owners want to be compensated every time their work
is used.
 The need to limit the number of copies created whereas
the watermarks are modified by the hardware and at some
point would not create any more copies (i.e. DVD) - the
reading device must be able to modify the watermark
 Content protection – content stamped with a visible
watermark that is very difficult to remove so that it can be
publicly and freely distributed
28
Watermarks Classification
1. Paper Watermark: Intended to be somewhat visible.
2. Digital Watermark: A digital signal or pattern
imposed on a digital document ( text, graphics,
multimedia presentations , …).
29
Paper Watermark
The technique of impressing into the paper a
form of image or text.
“Cannot be photocopied or scanned effectively”
Purpose: To make forgery more difficult to record the
manufacturer’s trademark, Copyright protection, logos,
etc …
Used in :
Currency, Banknotes , Passports, …
Paper watermark
Example
31
Digital Watermarking Types
 Visible and Invisible:
 Visible such as a company logo stamped on an image or
Video.
 Invisible intended to be imperceptible to the human eye or
inaudible. the watermark can only be determined through
watermark extraction or detection by computers.
Visible Watermarking Invisible Watermarking
32
Watermarking Process
• Two major steps:
– Location Selection : Where to embed watermark
– Processing : How to modify original data to embed
watermark
33
Watermarking Embedding & Extraction
Cover Image Cover + WM
Embedding F : Watermarked Image = Function (Cover, Watermark, Key)
Extraction F : Watermark = Function (Watermarked Image, Key(
Cover + WM
34
Watermarking Techniques
• Text – Varying spaces after punctuation, spaces in
between lines of text, spaces at the end of sentences, etc.
• Audio – Low bit coding, random.
• Images / Video – Least-significant bit, random
It is used for copyright protection.
It is used for source tracing.
Annotation of photographs.
APPLICATION OF WATERMARKING
36
Limitations / Conclusions
• Rapidly growing field of digitized images, video and audio has
urged for the need of protection.
• Watermarking is a key process in the protection of copyright
ownership of electronic data (image, videos, audio, ...).
• Digital watermarking does not prevent copying or distribution.
• Digital watermarking alone is not a complete solution for
access/copy control or copyright protection.
• Digital watermarks cannot survive every possible attack.
REFERENCES
[4] L. Boney, A. Tewfik, and K. Hamdy, “Digital watermarks for
audio signals,” in IEEE Proc. Multimedia, 1996, pp. 473-480.
1)Petitcol Fabien A.P., “Information Hiding: Techniques for
Steganography and Digital
Watermarking.”, 2000.
2) StegoArchive, “Steganography Information, Software and News to
enhance your Privacy”,
2001, URL: www.StegoArchive.com
3) Petitcolas, Fabien A.P., “The Information Hiding Homepage: Digital
Watermarking and
Steganography”,
URL: http://www.cl.cam.ac.uk/~fapp2/steganography/
38

Mais conteúdo relacionado

Mais procurados (20)

Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganography
SteganographySteganography
Steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Watermarking
WatermarkingWatermarking
Watermarking
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Steganography
SteganographySteganography
Steganography
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Steganography
SteganographySteganography
Steganography
 
Watermark
WatermarkWatermark
Watermark
 
Digital Watermarking
Digital WatermarkingDigital Watermarking
Digital Watermarking
 
Steganography
SteganographySteganography
Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 

Semelhante a Steganography & Watermarking Techniques Explained

Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio SignalsGufran karim
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingprdpgpt
 
Data hiding in audio signals ppt
Data hiding in audio signals pptData hiding in audio signals ppt
Data hiding in audio signals pptjackkhush
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyAlexander Decker
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniquestheijes
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000authority12
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingIJERA Editor
 
Secure communication
Secure communicationSecure communication
Secure communicationTushar Swami
 
Digital Audio Watermarking
Digital Audio WatermarkingDigital Audio Watermarking
Digital Audio WatermarkingHasit Trivedi
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
 
Understanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical ApproachUnderstanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical ApproachIRJET Journal
 

Semelhante a Steganography & Watermarking Techniques Explained (20)

Data Hiding in Audio Signals
Data Hiding in Audio SignalsData Hiding in Audio Signals
Data Hiding in Audio Signals
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
[IJET-V1I6P12] Authors: Manisha Bhagat, Komal Chavan ,Shriniwas Deshmukh
 
digital steganography
digital steganographydigital steganography
digital steganography
 
Data hiding in audio signals ppt
Data hiding in audio signals pptData hiding in audio signals ppt
Data hiding in audio signals ppt
 
digital watermarking
digital watermarkingdigital watermarking
digital watermarking
 
A study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptographyA study of image fingerprinting by using visual cryptography
A study of image fingerprinting by using visual cryptography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
A Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking TechniquesA Brief Survey on Robust Video Watermarking Techniques
A Brief Survey on Robust Video Watermarking Techniques
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
1709 1715
1709 17151709 1715
1709 1715
 
1709 1715
1709 17151709 1715
1709 1715
 
0c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf0000000c96052b28b8e9f1cf000000
0c96052b28b8e9f1cf000000
 
Survey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio WatermarkingSurvey on Different Methods of Digital Audio Watermarking
Survey on Different Methods of Digital Audio Watermarking
 
Secure communication
Secure communicationSecure communication
Secure communication
 
Digital Audio Watermarking
Digital Audio WatermarkingDigital Audio Watermarking
Digital Audio Watermarking
 
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...
 
Understanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical ApproachUnderstanding Image Steganography with Practical Approach
Understanding Image Steganography with Practical Approach
 

Último

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Último (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Steganography & Watermarking Techniques Explained

  • 2. OVERVIEW Information hidding Steganography Defined Block diagram Steganography in various media Steganalysis Application Advantages and Disadvantages Watermarking
  • 3. INTRODUCTION Information Hiding Techniques Information Hiding Steganography Watermarking 3
  • 4. Information Hiding Information Hiding : Communication of information by embedding in original data and retrieving it from other digital data. Depending on application we may need process to be imperceptible, robust, secure. Etc.
  • 5. Where can we hide? Media  Video  Audio  Still Images  Documents Software Etc. We focus on data hiding in media. We mainly use images but techniques and concepts can be suitably generalized to other media.
  • 6. Why Hide? Because you don’t want any one to even know about its existence. Covert communication – Steganography Because you want to protect it from malicious use. copy protection and deterrence - Digital Watermarks
  • 8. STEGANOGRAPHY DEFINED The word steganography comes from the Greek ‘steganos’ , meaning covered or secret, and ‘graphy’ , meaning writing or drawing. Therefore, steganography literally means – “covered writing”.
  • 9.
  • 10. STEGANOGRAPHY UNDER VaRIOUS MEDIA  Steganography in “TEXT”  Steganography in “IMAGES”  Steganography in “AUDIO”
  • 11. STEGANOGRAPHY IN TEXT It involves three types of coding: Line-Shift Coding : Here, text lines are vertically shifted to encode the document uniquely.  Word-Shift Coding : The codewords are coded into a document by shifting the horizontal locations of words within text lines, while maintaining a natural spacing appearance.
  • 12. STEGANOGRAPHY IN IMAGE Digital images are made up of pixels. The arrangement of pixels make up the image. Each pixel can have 8-bit(Gray image) and 24-bit(Color image) binary number. The larger the image size, the more information you can hide. However, larger images may require compression to avoid detection
  • 15. IMAGE-BASED TECHNIQUES Least Significant Bit Insertion : Replaces least significant bits with the message to be encoded A sample raster data for 3 pixels (9 bytes) 00100111 11101001 11001000 00100111 11001000 11101001 11001000 00100111 11101011 00100110 11101001 11001000 00100110 11001000 11101000 11001000 00100111 11101011 Inserting the binary value for A (01000001) changes 4 bits
  • 16. STEGANOGRAPHY IN AUDIO Audio Environments Digital representation In audio steganography, secret message is embedded into digitized audio signal which result slight altering of binary sequence of the corresponding audio file. There are several methods are available for audio steganography. We are going to have a brief introduction on some of them.
  • 17. STEGANOGRAPHY IN AUDIO Methods of Audio Data Hiding LSB techniques: Phase coding :
  • 18. STEGANALYSIS Here 2 methods of Steganalysis are looked into :  detecting messages or their transmission  disabling embedded information
  • 20. APPLICATION OF STEGANOGRAPHY Confidential communication and secret data storing Protection of data alteration Media database system
  • 21. • ADVANTAGES :  Difficult to detect and Only receiver can detect.  It can be done faster with large no. of softwares. DISADVANTAGES :  The confidentiality of information is maintained by the algorithms, and if the algorithms are known then this technique is of no use.  Password leakage may occur and it leads to the unauthorized access of data. ADVANTAGE AND DISADVANTAGE OF STEGANOGRAPHY
  • 22. STEGANOGRAPHY VS WATERMARKING Watermarking is a process in which the information which verifies the owner is embedded into the digital image or signal. These signals could be either videos or pictures or audios; steganography is changing the image in a way that only the sender and the intended recipient are able to detect the message sent through it.  Watermarking is of two types; visible watermarking and invisible watermarking.  Steganography is typically invisible.
  • 23.  The ease in use and abundant availability of steganography tools has law enforcement concerned in trafficking of illicit material via web page images, audio, and other transmissions over the Internet.  This seminar provides an overview of steganalysis and introduced some characteristics of steganographic software that point signs of information hiding. Formerly, just an interest of the military, steganography is now gaining popularity among the masses. CONCLUSION
  • 25. What is a Watermark? A watermark is a “secret message” that is embedded into a “cover message”. Usually, only the knowledge of a secret key allows us to extract the watermark. Visible Watermarking Invisible Watermarking
  • 26. 26 History • The Italians where the 1st to use watermarks in the manufacture of paper in the 1270's. • A watermark was used in banknote production by the Bank of England in 1697. It is a good security feature because the watermark cannot be photocopied or scanned effectively.
  • 27. 27 Why Watermark? Motivation  Copyright protection of multimedia data Copyright owners want to be compensated every time their work is used.  The need to limit the number of copies created whereas the watermarks are modified by the hardware and at some point would not create any more copies (i.e. DVD) - the reading device must be able to modify the watermark  Content protection – content stamped with a visible watermark that is very difficult to remove so that it can be publicly and freely distributed
  • 28. 28 Watermarks Classification 1. Paper Watermark: Intended to be somewhat visible. 2. Digital Watermark: A digital signal or pattern imposed on a digital document ( text, graphics, multimedia presentations , …).
  • 29. 29 Paper Watermark The technique of impressing into the paper a form of image or text. “Cannot be photocopied or scanned effectively” Purpose: To make forgery more difficult to record the manufacturer’s trademark, Copyright protection, logos, etc … Used in : Currency, Banknotes , Passports, …
  • 31. 31 Digital Watermarking Types  Visible and Invisible:  Visible such as a company logo stamped on an image or Video.  Invisible intended to be imperceptible to the human eye or inaudible. the watermark can only be determined through watermark extraction or detection by computers. Visible Watermarking Invisible Watermarking
  • 32. 32 Watermarking Process • Two major steps: – Location Selection : Where to embed watermark – Processing : How to modify original data to embed watermark
  • 33. 33 Watermarking Embedding & Extraction Cover Image Cover + WM Embedding F : Watermarked Image = Function (Cover, Watermark, Key) Extraction F : Watermark = Function (Watermarked Image, Key( Cover + WM
  • 34. 34 Watermarking Techniques • Text – Varying spaces after punctuation, spaces in between lines of text, spaces at the end of sentences, etc. • Audio – Low bit coding, random. • Images / Video – Least-significant bit, random
  • 35. It is used for copyright protection. It is used for source tracing. Annotation of photographs. APPLICATION OF WATERMARKING
  • 36. 36 Limitations / Conclusions • Rapidly growing field of digitized images, video and audio has urged for the need of protection. • Watermarking is a key process in the protection of copyright ownership of electronic data (image, videos, audio, ...). • Digital watermarking does not prevent copying or distribution. • Digital watermarking alone is not a complete solution for access/copy control or copyright protection. • Digital watermarks cannot survive every possible attack.
  • 37. REFERENCES [4] L. Boney, A. Tewfik, and K. Hamdy, “Digital watermarks for audio signals,” in IEEE Proc. Multimedia, 1996, pp. 473-480. 1)Petitcol Fabien A.P., “Information Hiding: Techniques for Steganography and Digital Watermarking.”, 2000. 2) StegoArchive, “Steganography Information, Software and News to enhance your Privacy”, 2001, URL: www.StegoArchive.com 3) Petitcolas, Fabien A.P., “The Information Hiding Homepage: Digital Watermarking and Steganography”, URL: http://www.cl.cam.ac.uk/~fapp2/steganography/
  • 38. 38