tr10

Embed Size (px)

Citation preview

  • 8/4/2019 tr10

    1/12

  • 8/4/2019 tr10

    2/12

    2

    Stego Techniques 2-3

    Using grammar for mimicry*It's time for another gamebetween the Whappers and theBlogs in scenic downtownBlovonia . I've just got to saythat the Blog fans have come tosupport their team and rant andrave . Play Ball ! Top of theinning. Yup. What a game so fartoday . The pitcher spits. FrankGavi adjusts the cup and entersthe batter's box . Yeah. It's arattler . He swings for the

    stands, but no contact . Here'sthe pitch It's a bouncingknuckleball . . .

    *http://www.wayner.org/texts/mimic/

    Stego Techniques 2-4

    Computer graphicso A digitized photograph is

    represented by a matrix

    of numbers that stand forthe intensity of light

    emanating from aparticular place at a

    particular time.

    o The array of charged-coupled devices that

    convert photons to bitsare not perfect.

  • 8/4/2019 tr10

    3/12

  • 8/4/2019 tr10

    4/12

    4

    Stego Techniques 2-7

    Where to hideo The least significant bits seem close to random, but often

    contain hidden patterns.

    o Destroying these subtle statistical correlations may well

    give the show away.

    Peter Wayners deskDisappearing Cryptography.

    Least significant bits of same

    Stego Techniques 2-8

    Another problemo Compressions artists often beat stenanographers to the

    punch.

    o JPEG can often get by with one or two bits per pixel and

    save a factor of ten in file size.

    Peter Wayners desk again Most significant bits of same

  • 8/4/2019 tr10

    5/12

    5

    Stego Techniques 2-9

    Hiding in a GIF fileo GIF compression

    maintains a table of up to

    256 colors that best

    represent the image.

    o The color of each pixel is

    described by indexing into

    this color table.

    o Changing the least

    significant bit may

    significantly change theimage.

    Stego Techniques 2-10

    A possible solutiono Hide and Seek 4.1

    converts the color table

    from 256 colors to 128,then duplicates each of

    these colors so thatadjacent entries in the

    color table are duplicatesof each other.

    o Unfortunately, this

    technique leaves a largered flag for anyone

    scanning GIFs for hidden

    information.

  • 8/4/2019 tr10

    6/12

    6

    Stego Techniques 2-11

    Another solutiono EzStego sorts the color

    palette so that the colors

    flow smoothly into each

    other.

    o The hope is that changing

    the least significant bit

    doesnt drastically change

    the color.

    Stego Techniques 2-12

    The Traveling Salesperson Problemo Ordering colors in one

    dimension is easy.

    Ordering a threedimensional color space is

    not.

    o EzStego treats the colors

    as cities in RGB space and

    and tries to find theshortest path through all

    of the stops.

  • 8/4/2019 tr10

    7/12

    7

    Stego Techniques 2-13

    A heuristic for TSPBegin with a list of two

    cities, {c1 c2}. Set C = c1.

    1. Find city, d, that is

    farthest from C.

    2. Scan the list to find i

    such that

    d(d, ci) + d(d, ci+1) isminimized.

    3. Insert dbetween iand i+1

    and set C = d.

    Stego Techniques 2-14

    EzStego covers its tracks1. Sort the palette so closest colors fall next to

    each other.

    2. Encode the encrypted message by twiddling the

    least significant bit.

    3. Unsort the palette by renumbering all of the

    colors with their original values.

    4. Ship the image.

    5. Receiver resorts palette using same algorithmand extracts bits by using the sorted palette.

  • 8/4/2019 tr10

    8/12

    8

    Stego Techniques 2-15

    GIFShuffleo A palette containing N colors can be permuted in N!

    different ways. Each permutation may encode log2(N!) bits

    of information.

    Original palette Sorted palette Permuted palette

    Stego Techniques 2-16

    Transform domain techniqueso LSB modification techniques are highly

    vulnerable to even small cover modifications.

    o Transform domain methods hide messages in

    significant areas of the cover image making them

    more robust modification than LSB methods.

    o JPEGs are perfect candidates for hiding

    information using such methods.

  • 8/4/2019 tr10

    9/12

    9

    Stego Techniques 2-17

    Fourier serieso Fourier series are expansions of periodic functions f(x) in

    terms of an infinite sum of sines and cosines of the form

    o Successive partial sums produce increasingly accurateapproximations to the f(x).

    Stego Techniques 2-18

    Cosines sufficeo Cosine functions similar to those shown below are used to

    model sound waves in MP3 music compression.

  • 8/4/2019 tr10

    10/12

    10

    Stego Techniques 2-19

    Gimme a Wo The Wellesley W was

    recreated using the four

    cosine functions shown on

    the previous slide:

    1.0 cos(x) + 0.5 cos(2x) -

    0.8 cos (3x) + 0.3 cos(4x).

    o MP3 compression uses

    Discrete cosine

    transforms to find cosine

    coefficients givensequences of soundsamples.

    Stego Techniques 2-20

    A two-dimensional discrete analogueo The discrete cosine transform of a two-dimensional N x N

    array, s, of real numbers is given by

    o The inverse cosine transform is given by

    where C(u) equals 2-1/2 if u is 0 and 1 otherwise.

    S(u, v) =2

    NC(u)C(v) s(x, y)cos(

    pu(2x +1)

    2Ny= 0

    N-1

    x=0

    N-1

    )cos(p(2y +1)

    2N)

    s(x,y) =2

    NC(u)C(v) S(u, v)cos(

    pu(2x +1)

    2Nv=0

    N-1

    u= 0

    N-1

    )cos(p(2y +1)

    2N)

  • 8/4/2019 tr10

    11/12

    11

    Stego Techniques 2-21

    JPEG compression

    Convert image into YCbCr color

    space and break up each colorplane into 8x8 blocks.

    All blocks are

    DCT transformed.

    Divide DCT coefficientsby predefined quantization

    values to modulate influenceof spectral components on image.

    Compress the quantizedDCT coefficients using

    entropy coder.

    Stego Techniques 2-22

    Quantization factorso DCT coefficients corresponding to highest frequency

    cosines are likely to be dominated by noise.

    o Values in the quantization table are calculated to reduce the

    influence of these noisy coefficients.

  • 8/4/2019 tr10

    12/12

    12

    Stego Techniques 2-23

    Encoding in the frequency domain1. Select two DCT coefficients,

    Bi (u1, v1) and Bi(u2, v2) whose

    corresponding cosinesfunctions are in the mid-frequency with equal

    quantization coeffs.

    2. Split the cover into 8x8

    pixel blocks; each blockencodes one bit.

    3. Select a pseudorandom block

    bi to encode the ith messagebit.

    4. Block encodes a 1 if B i (u1, v1)> Bi(u2, v2) , otherwise a 0.