b it -p lane c omplexity s teganography joseph szigeti (source list)

30
BIT-PLANE COMPLEXITY STEGANOGRAPHY Joseph Szigeti (source list)

Upload: constance-barber

Post on 17-Jan-2016

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

BIT-PLANE COMPLEXITY STEGANOGRAPHYJoseph Szigeti

(source list)

Page 2: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

OVERVIEW

Why BPCS was developed How it works Several implementations

Kawaguchi, Eason Beaullieu, Crissey, Smith Stoleru

Results Possible improvements

Page 3: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

STEGANOGRAPHY

Hiding a secret message by embedding it in data

Different from: Cryptography

Scrambling a secret message such that the message is not hidden, but simply unreadable

Watermarking Embedding copyright/ownership information inside

data

Page 4: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

BIT-PLANE COMPLEXITY STEGANOGRAPHY

BPCS Invented by Eiji Kawaguchi and Richard

Eason in 1997 Kyushu Institute of Technology University of Maine

Created because traditional forms of steganography were limited in information-hiding capacity Estimated at ≤10%

Page 5: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

OLD STEGANOGRAPHY VS. BPCS

Old stego. Replace small frequency components of vessel

data Replace LSB of vessel data

BPCS Separate vessel into bit-planes Replace noisy regions in bit-planes with secret

data Does not deteriorate quality

Works because of limitations in human vision

Page 6: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

VISUALIZATION OF BPCS

Page 7: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

VISUALIZATION OF BPCS

Page 8: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

KAWAGUCHI & EASON’S FINDINGS

Information-hiding capability is ≈50% Sharpening operations on vessel image

increase embedding capacity significantly Canonical Gray coded bit-planes are better

than binary bit-planes Randomization of the secret data by a

compression operation makes the embedded data even harder to spot

BPCS will never be overwriting the same bit-planes the same way from image to image

Page 9: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

CANONICAL GRAY VS. PURE BINARY

Goal of BPCS is to maximize space in an image that can be used for data hiding

PBC More space (noisier) Runs into “Hamming Cliff” problem

Small change in color affects many bits

CGC Flat regions stay flat at lower planes Does not have Hamming Cliffs Allows for more intelligent embedding

Page 10: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

CGC VS PBC EXAMPLE

PBC difference between 127 and 128 0111 1111 1000 0000

CGC difference between 127 and 128 0100 0000 1100 0000

Page 11: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

CGC VS PBC EXAMPLE

Page 12: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

IMAGE COMPLEXITY

Length of black-and-white border in a binary image is used to measure complexity Length determined by number of color changes

along the rows and columns in an image Image complexity α

α = border length / max possible B-W changes 0 ≤ α ≤ 1

In BPCS, α is measured on a local level Small pixel areas, as opposed to entire image

Page 13: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

ANALYSIS OF NOISY REGIONS

Conjugation α(P*) = 1 – α(P) Complexity of P* is symmetric to P about α=0.5

If the data is informative, it must be conjugated before embedding into vessel image

Page 14: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

ANALYSIS OF NOISY REGIONS

Create a complexity distribution of vessel image

Find point at which embedding data is viable e.g. α = 0.5 ± k*σ

k is some constant σ is some deviationNot viable Viable

Page 15: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

ANALYSIS OF NOISY REGIONS

Kawaguchi and Eason have determined that there is often a majority of noise-like 8x8 binary patterns In the previous example, 6.67x10-14% were

simple This is where BPCS gets its effectiveness

compared to LSB steganography

Page 16: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

KAWAGUCHI & EASON IMPLEMENTATION

Transform vessel image from PBC to CGC Segment bit-planes into informative and

noisy regions using threshold value (e.g. α0=0.3)

Group bytes of secret file into secret blocks If a block (S) is less complex than threshold

(α0), conjugate it Embed each secret block into noisy regions

of the bit-planes Record conjugated blocks in conjugation map

Embed conjugation map with secret blocks

Convert vessel image back to PBC

Page 17: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

KAWAGUCHI & EASON IMPLEMENTATION

Data to hide:

Page 18: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

RESULTS

Image with a lot of flat regions

Page 19: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

RESULTS

Image with few flat regions

Page 20: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

MODIFIABLE ALGORITHM PARAMETERS

Embedding location of secret file headers Embedding threshold α0

Sequence in which 8x8 regions are considered for embedding

Encoding of conjugation map Special operations

XOR of header bytes with pseudo-random numbers

Encryption parameters of secret files Compression parameters of secret files

Page 21: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

REGION SELECTION SEQUENCE

Demonstrated by Steve Beaullieu, Jon Crissey, Ian Smith UTSA

Regions for embedding are considered from the bottom left to the top right This could be

modified if a particular image warranted it

Page 22: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

CONT.

Starting the embedding process from the LSB is another option to make the image more convincing

Alternatively, change parameter for complexity with each plane

Page 23: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

FURTHER IMPROVEMENTS

Determining complexity using run length irregularity or border noisiness As opposed to number of borders

Randomly distribute data As opposed to linearly, from one bit plane to next

Encrypting data before embedding it

Page 24: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

PROBLEMS WITH BPCS

Bit operations after embedding data may make data unrecoverable Not robust

Complexity histogram of vessel image will be noticeably different

Page 25: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

APPLICATIONS

Secrecy Embedding data publicly

Without discernably altering quality of vessel Applying bit plane algorithms to files other

than PBC images

Page 26: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

MULTIPLE-IMAGE SCHEME (D. STOLERU)

Page 27: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

MULTIPLE-IMAGE SCHEME

Page 28: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

MORE EXAMPLES

Page 29: B IT -P LANE C OMPLEXITY S TEGANOGRAPHY Joseph Szigeti (source list)

MORE EXAMPLES