Upload
lokesh1990
View
229
Download
0
Embed Size (px)
Citation preview
8/4/2019 tr10
1/12
8/4/2019 tr10
2/12
2
Stego Techniques 2-3
Using grammar for mimicry*It's time for another gamebetween the Whappers and theBlogs in scenic downtownBlovonia . I've just got to saythat the Blog fans have come tosupport their team and rant andrave . Play Ball ! Top of theinning. Yup. What a game so fartoday . The pitcher spits. FrankGavi adjusts the cup and entersthe batter's box . Yeah. It's arattler . He swings for the
stands, but no contact . Here'sthe pitch It's a bouncingknuckleball . . .
*http://www.wayner.org/texts/mimic/
Stego Techniques 2-4
Computer graphicso A digitized photograph is
represented by a matrix
of numbers that stand forthe intensity of light
emanating from aparticular place at a
particular time.
o The array of charged-coupled devices that
convert photons to bitsare not perfect.
8/4/2019 tr10
3/12
8/4/2019 tr10
4/12
4
Stego Techniques 2-7
Where to hideo The least significant bits seem close to random, but often
contain hidden patterns.
o Destroying these subtle statistical correlations may well
give the show away.
Peter Wayners deskDisappearing Cryptography.
Least significant bits of same
Stego Techniques 2-8
Another problemo Compressions artists often beat stenanographers to the
punch.
o JPEG can often get by with one or two bits per pixel and
save a factor of ten in file size.
Peter Wayners desk again Most significant bits of same
8/4/2019 tr10
5/12
5
Stego Techniques 2-9
Hiding in a GIF fileo GIF compression
maintains a table of up to
256 colors that best
represent the image.
o The color of each pixel is
described by indexing into
this color table.
o Changing the least
significant bit may
significantly change theimage.
Stego Techniques 2-10
A possible solutiono Hide and Seek 4.1
converts the color table
from 256 colors to 128,then duplicates each of
these colors so thatadjacent entries in the
color table are duplicatesof each other.
o Unfortunately, this
technique leaves a largered flag for anyone
scanning GIFs for hidden
information.
8/4/2019 tr10
6/12
6
Stego Techniques 2-11
Another solutiono EzStego sorts the color
palette so that the colors
flow smoothly into each
other.
o The hope is that changing
the least significant bit
doesnt drastically change
the color.
Stego Techniques 2-12
The Traveling Salesperson Problemo Ordering colors in one
dimension is easy.
Ordering a threedimensional color space is
not.
o EzStego treats the colors
as cities in RGB space and
and tries to find theshortest path through all
of the stops.
8/4/2019 tr10
7/12
7
Stego Techniques 2-13
A heuristic for TSPBegin with a list of two
cities, {c1 c2}. Set C = c1.
1. Find city, d, that is
farthest from C.
2. Scan the list to find i
such that
d(d, ci) + d(d, ci+1) isminimized.
3. Insert dbetween iand i+1
and set C = d.
Stego Techniques 2-14
EzStego covers its tracks1. Sort the palette so closest colors fall next to
each other.
2. Encode the encrypted message by twiddling the
least significant bit.
3. Unsort the palette by renumbering all of the
colors with their original values.
4. Ship the image.
5. Receiver resorts palette using same algorithmand extracts bits by using the sorted palette.
8/4/2019 tr10
8/12
8
Stego Techniques 2-15
GIFShuffleo A palette containing N colors can be permuted in N!
different ways. Each permutation may encode log2(N!) bits
of information.
Original palette Sorted palette Permuted palette
Stego Techniques 2-16
Transform domain techniqueso LSB modification techniques are highly
vulnerable to even small cover modifications.
o Transform domain methods hide messages in
significant areas of the cover image making them
more robust modification than LSB methods.
o JPEGs are perfect candidates for hiding
information using such methods.
8/4/2019 tr10
9/12
9
Stego Techniques 2-17
Fourier serieso Fourier series are expansions of periodic functions f(x) in
terms of an infinite sum of sines and cosines of the form
o Successive partial sums produce increasingly accurateapproximations to the f(x).
Stego Techniques 2-18
Cosines sufficeo Cosine functions similar to those shown below are used to
model sound waves in MP3 music compression.
8/4/2019 tr10
10/12
10
Stego Techniques 2-19
Gimme a Wo The Wellesley W was
recreated using the four
cosine functions shown on
the previous slide:
1.0 cos(x) + 0.5 cos(2x) -
0.8 cos (3x) + 0.3 cos(4x).
o MP3 compression uses
Discrete cosine
transforms to find cosine
coefficients givensequences of soundsamples.
Stego Techniques 2-20
A two-dimensional discrete analogueo The discrete cosine transform of a two-dimensional N x N
array, s, of real numbers is given by
o The inverse cosine transform is given by
where C(u) equals 2-1/2 if u is 0 and 1 otherwise.
S(u, v) =2
NC(u)C(v) s(x, y)cos(
pu(2x +1)
2Ny= 0
N-1
x=0
N-1
)cos(p(2y +1)
2N)
s(x,y) =2
NC(u)C(v) S(u, v)cos(
pu(2x +1)
2Nv=0
N-1
u= 0
N-1
)cos(p(2y +1)
2N)
8/4/2019 tr10
11/12
11
Stego Techniques 2-21
JPEG compression
Convert image into YCbCr color
space and break up each colorplane into 8x8 blocks.
All blocks are
DCT transformed.
Divide DCT coefficientsby predefined quantization
values to modulate influenceof spectral components on image.
Compress the quantizedDCT coefficients using
entropy coder.
Stego Techniques 2-22
Quantization factorso DCT coefficients corresponding to highest frequency
cosines are likely to be dominated by noise.
o Values in the quantization table are calculated to reduce the
influence of these noisy coefficients.
8/4/2019 tr10
12/12
12
Stego Techniques 2-23
Encoding in the frequency domain1. Select two DCT coefficients,
Bi (u1, v1) and Bi(u2, v2) whose
corresponding cosinesfunctions are in the mid-frequency with equal
quantization coeffs.
2. Split the cover into 8x8
pixel blocks; each blockencodes one bit.
3. Select a pseudorandom block
bi to encode the ith messagebit.
4. Block encodes a 1 if B i (u1, v1)> Bi(u2, v2) , otherwise a 0.