SlideShare ist ein Scribd-Unternehmen logo
1 von 57
Steganography application of effective
Genetic Shifting Algorithm against RS
Analysis
Advisor: MScEE, Vladislav Kaplan
Vadim Purinson LV Tailoring Software
Who owns the information – owns the
world
Rotschild Nathan Mayer
• What is Steganography?
• Why Steganography?
• History of Steganography.
• Digital steganography.
• Steganalysis.
• RS Fridrich analysis.
• Genetic shifting algorithm.
• Software implementation.
• Tests
• Conclusions
7/16/2015LV Tailoring Software
2
What is Steganography?
The art and science of hiding information by embedding it in some
other media.
• Steganography versus cryptography
• In general, steganography approaches hide a
message in a cover e.g. text, image, audio file,
etc.
7/16/2015LV Tailoring Software
3
Why Steganography?
• Transfer secret information or embed secret
messages into media.
• Data, intellectual property and privacy
protection - Digital Water marking, medical
data.
7/16/2015LV Tailoring Software
4
History of Steganography.
• 400 B.C. – writings of Herodotus
• 1499 – “Steganographia”, Trithemius –
steganography and magic.
• 1665 – Steganographica, Gaspari Schotti.
• 1870 – The Pigeon Post into Paris.
Most popular example in history this is use
invisible inks.
7/16/2015LV Tailoring Software
5
Terminology and Definitions
•
7/16/2015LV Tailoring Software
6
Equation 3
Equation 4
Terminology and Definitions
• Steganographic system or stegasystem –
this is set of tools and methods are used to
generate a secret channel of information
transmission.
7/16/2015LV Tailoring Software
7
Digital image definition
A digital image is binary representation of a two
dimensional image and contains a fixed number of rows
and columns of pixels.
• Pixel
• Byte
• Bit
7/16/2015LV Tailoring Software
8
Equation 1
Message embedding
mathematical definition
8 bit Grayscale equivalents to 1 byte per pixel.
For example, for the image size of 7 Kbyte
maximum message size can be embedded, by
using 1 LSB is 7168 bit
7/16/2015LV Tailoring Software
9
Equation 2
Digital steganography.
Advantages of digital images steganography is:
• There are a variety of methods used in which information can be hidden in
the images.
• Relatively large volume of digital images representation, that allows the
embedding of large amount of information.
• Known size of the cover media, that absence of restrictions, requirements
imposed by real-time.
• Presence of relatively large textural regions in most digital images that have
noise structure and well suited for information integration.
• Weak sensitivity of the human eye to minor changes the color of the image,
brightness, contrast and the noise presence.
• Image steganography has come quite far with the development of fast,
powerful graphical computers.
7/16/2015LV Tailoring Software
10
IMAGE STEGANOGRAPHY TECHNIQUES
• Least Significant Bit insertion – LSB
• Masking and filtering
7/16/2015LV Tailoring Software
11
The simple LSB schema
7/16/2015LV Tailoring Software
12
LSB - Example
7/16/2015LV Tailoring Software
13
Lena Söderberg
LSB - Example
“A” = 65(decimal) = 10000001 (binary)
7/16/2015LV Tailoring Software
14
Classification of Steganography
Methods.
• Substitution methods in spatial domain = LSB;
• Transform domain = frequency domain;
• Spread spectrum techniques;
• Statistical methods;
• Distortion techniques;
• Cover generation methods;
7/16/2015LV Tailoring Software
15
The properties of the human eye
used in the steganography .
• selectivity to brightness fluctuations;
• frequency sensitivity;
• masking effect;
7/16/2015LV Tailoring Software
16
Selectivity to brightness fluctuations
7/16/2015LV Tailoring Software
17
Human eye sensitivity to
contrast.
Experimental data by Aubert (1865), Koenig and
Brodhun (1889) and Blanchard (1918). It
indicates that the Weber-Fechner law - according
to which the smallest perceptible change in
intensity ∆ 𝐼 vs. intensity level I is constant.
Frequency sensitivity
7/16/2015LV Tailoring Software
18
Sensitivity of eye for the colors
Masking effect
7/16/2015LV Tailoring Software
19
Herman Grid
Steganalysis
• Steganalysis
• Steganalyst
• Attack on steganography system
7/16/2015LV Tailoring Software
20
Stegattacks classes
• Attack with the knowledge of the modified media only.
• Attack with knowledge of unmodified container.
7/16/2015LV Tailoring Software
21
The results of stegattack
• Detect secret message presence.
• Recover secret message from stegoimage.
• Destroy the message in case no possibility to recover
message.
Steganalysis hierarchy
7/16/2015LV Tailoring Software
22
Main methods of stegattack
• Visual analysis – detect visual image
degradation by “naked” eye.
• Statistical Histogram and STD analysis.
• Detection methods are based on data hiding
analyzing the characteristics of the probability
distribution of the container.
7/16/2015LV Tailoring Software
23
Visual Attacks
7/16/2015LV Tailoring Software
24
Grayscale image
visual attack example
Grayscale image filter
visual attack example
Histogram Analysis Attack
7/16/2015LV Tailoring Software
25
Statistical Analysis Attack
• Stego Only Attack;
• Known Cover Attack;
• Known Message Attack;
• Blind Steganalysis;
• Semi-blind;
7/16/2015LV Tailoring Software
26
Fridrich RS Analysis
𝐹𝑚 1 ↔ 2,3 ↔ 4, … 223 ↔ 224
𝐹−𝑚 0 ↔ 1,2 ↔ 3, … 224 ↔ 225
• “regular”
• “singular”
• “unchanged”
7/16/2015LV Tailoring Software
27
← 𝑅−𝑚 𝑆−𝑚 →
𝑅 𝑚 ↔ 𝑆 𝑚𝑅 𝑚 > 𝑆 𝑚
𝑅−𝑚 > 𝑆−𝑚
Genetic Shifting Algorithm (Shen Wang )
7/16/2015LV Tailoring Software
28
Before or After ?
𝐶 =
𝑖
𝑁
𝑖 + 1 − 𝑖
𝑁 − 1
𝑁 – this is number of pixels, and (𝑖 + 1) and
𝑖 are indicate current and next pixel values.
Introduction to LabVIEW
7/16/2015LV Tailoring Software
29
Front Panel
7/16/2015LV Tailoring Software
30
Example of Front panel view
• Modern
• System
• Classic
• Express
• Control
Design &
Simulation
• .Net &
ActiveX
• Signal
processing
• Add ons
• User
Controls
• Select and
control
• DSC
Module
• RF
Communica
tions
• Sound &
Vibration
• Vision
Controls palette view
Block diagram
7/16/2015LV Tailoring Software
31
Function paletteExample of Block diagram view
More functions
• Tools palette • Operating tool
• Positioning tool
• Labeling tool
• Wiring tool
7/16/2015LV Tailoring Software
32
• Wiring
• SubVis
Basic LabVIEW Hierarchy
7/16/2015LV Tailoring Software
33
Front panel view
7/16/2015LV Tailoring Software
34
1. Source cover image
2. Result stegoimage
3. Cover Histogram and STD statistic window
4. Stegoimage Histogram and STD statistic window
5. RS analysis results on Stegoimage
6. LSB level to be used (up to LSB-4)
7. Start shifting (GSM)
8. Standard deviation evaluation
9. Snaked array length.
10. Open output result text message
11. Decode message from stegoimage
12. Encode message into cover message
13. Stop button
14. Start / stop menu
Steganography directory view
7/16/2015LV Tailoring Software
35
Encoding Decoding Example
7/16/2015LV Tailoring Software
36
Steps definition
• Perform basic message coding (Cover Image) up to LSB-4 for gray images.
• Perform basic message recovery (Stego Image) up to LSB-4 for gray images.
• Compare visual image degradation.
• Compare visual degradation through common tools (Histogram, STD).
• Perform study of coded message saturation (message of different length) vs.
recovery and image degradation per different LSB coding at gray images.
• Build RS analysis (Fridrich algorithm) routine.
• Confirm validity of RS analysis on gray images.
• Implement secure genetic steganography method for RS baseline shifting
for LSB-1. (GSM for RS shifting).
• Perform basic message recovery with GSM for RS shifting for LSB-1.
• Perform RS analysis comparison for different message length with GSM for
RS shifting and without, use different “snake” division array image
representation.
7/16/2015LV Tailoring Software
37
Compare visual image degradation
7/16/2015LV Tailoring Software
38
LSB-1
The recovered text file size is 6.21 KB
(6,361 bytes), 1177 words text,
equivalent to 2.5 pages in WORD
format.
Compare tool
7/16/2015LV Tailoring Software
39
Compare visual image degradation
7/16/2015LV Tailoring Software
40
LSB-2
The recovered text file size is 12.4 KB
(12,737 bytes), 2228 words text,
equivalent to 5 pages in WORD
format.
Compare visual image degradation
7/16/2015LV Tailoring Software
41
LSB-3
The recovered text file size is 18.6 KB
(19,106 bytes), 3317 words text, equivalent
to 7.5 pages in WORD format.
Compare visual image degradation
7/16/2015LV Tailoring Software
42
LSB-4
The recovered text file size is 24.8 KB
(25,477 bytes), 4468 words text,
equivalent to 10 pages in WORD format –
this is a maximum text file size can be
imbedded into 225 × 225 𝑝𝑖𝑥𝑒𝑙𝑠 image by
using 4LSB plane.
Compare visual degradation through
common tools
7/16/2015LV Tailoring Software
43
Compare visual degradation through
common tools
7/16/2015LV Tailoring Software
44
Different depth of the LSB
Blue line is displays Cover
image Histogram and red line
represents manipulated image
distribution.
Compare visual degradation through
common tools
7/16/2015LV Tailoring Software
45
Histogram degradation trough of
message enlargement for 4LSB level
Compare visual degradation through
common tools
7/16/2015LV Tailoring Software
46
STD view
Build RS analysis (Fridrich algorithm)
routine.
7/16/2015LV Tailoring Software
47
Build RS analysis (Fridrich algorithm)
routine
7/16/2015LV Tailoring Software
48
LSB-1
𝑅 𝑚/𝑆 𝑚 differences versus message
volume.
7/16/2015LV Tailoring Software
49
Image1
Message % of Rm % of Sm diff
Message
length(bytes) % of image
0 54.9 45.1 9.8 0 0
1 53.8 46.2 7.6 699 1.05
2 52.1 47.9 4.2 2,225 3.35
3 51.5 48.5 3 4,055 6.11
4 51.4 48.6 2.8 4,222 6.36
5 50.8 49.2 1.6 6,201 9.34
6 49.8 50.2 -0.4 8,169 12.3
Image2
0 54.2 45.8 8.4 0 0
1 53.9 46.1 7.8 699 1.78
2 52.5 47.5 5 2,225 5.67
3 51.8 48.2 3.6 4,055 10.34
4 51.7 48.3 3.4 4,222 10.76
5 50 50 0 6,201 15.8
6 49.8 50.2 -0.4 6,361 16.33
Image3
0 52.5 47.5 6 0 0
1 52 48 5 699 1.05
2 51.8 48.2 4.4 2,225 3.35
3 51.9 48.1 4 4,055 6.11
4 51.7 48.3 4 4,222 6.36
5 50.9 49.1 3.4 6,201 9.34
6 50.8 49.2 0.6 8,169 12.31
Build RS analysis (Fridrich algorithm)
routine
7/16/2015LV Tailoring Software
50
Image 2 RS analysis results.
7/16/2015LV Tailoring Software
51
2LSB
Message
% of
Rm % of Sm diff
Message length(bytes)
% of
image
0 54.2 45.8 8.4 0 0
1 54 46 8 699 1.78
2 53.4 46.6 6.8 2,225 5.67
3 52.8 47.2 5.6 4,055 10.34
4 52.7 47.3 5.4 4,222 10.76
5 52.1 47.9 4.2 6,201 15.8
6 50.9 49.1 1.8 12,737 24.31
3LSB
0 54.2 45.8 8.4 0 0
1 54.2 45.8 8.4 699 1.78
2 54.2 45.8 8.4 2,225 5.67
3 53.9 46.1 7.8 4,055 10.34
4 53.9 46.1 7.8 4,222 10.76
5 53.4 46.6 6.8 6,201 15.8
6 52 48 4 19,106 36.47
4LSB
0 54.2 45.8 8.4 0 0
1 54.1 45.9 8.2 699 1.78
2 54 46 8 2,225 5.67
3 53.9 46.1 7.8 4,055 10.34
4 53.9 46.1 7.8 4,222 10.76
5 53.4 46.6 6.8 6,201 15.8
6 50.3 49.7 0.6 25,477 48.56
Build RS analysis (Fridrich algorithm) routine (30
images 225 × 225 𝑝𝑖𝑥𝑒𝑙𝑠, 8𝑏𝑖𝑡 𝑑𝑒𝑝𝑡ℎ)
7/16/2015LV Tailoring Software
52
Secure genetic steganography method
7/16/2015LV Tailoring Software
53
13 and 29 division snaked array LSB-1
RS analysis results
7/16/2015LV Tailoring Software
54
Image 1
Message % of Rm % of Sm diff
Message
length(bytes)
% of imager
0 63 37 26 0 0
1 60.9 39.1 21.8
699 1.33
2 56.9 43.1 13.8
2,225 4.24
3 54.5 45.5 9 4,055 7.74
4 54.5 45.5 9 4,222 8.06
5 52.4 47.6 4.8 6,201 11.83
6 51.1 48.9 2.2 6,361 12.14
Image 2
0 60 40 20 0 0
1 58.9 41.1 17.8
699 1.05
2 57.1 42.9 14.2
2,225 3.35
3 55.3 44.7 10.6
4,055 6.11
4 55.5 44.5 11 4,222 6.36
5 51.7 48.3 3.4 6,201 9.34
6 51.1 48.9 2.2 8,169 12.3
Image3
0 58.1 41.9 16.2
0 0
1 56.6 43.4 13.2
699 1.05
2 55 45 10 2,225 3.35
3 54.2 45.8 8.4 4,055 6.11
4 54.3 45.7 8.6 4,222 6.36
5 53.3 46.7 6.6 6,201 9.34
6 50.9 49.1 1.8 8,169 12.31
Image 1
Message % of Rm % of Sm diff
Message
length(bytes)
% of
image
0 58.7 41.3 17.4 0 0
1 57 43 14 699 1.05
2 54.5 45.5 9 2,225 3.35
3 53 47 6 4,055 6.11
4 52.8 47.2 5.6 4,222 6.36
5 51.2 48.8 2.4 6,201 9.34
6 50.5 49.5 1 8,169 12.3
Image 2
0 56.9 43.1 13.8 0 0
1 56 44 12 699 1.33
2 53.7 46.3 7.4 2,225 4.24
3 52.1 47.9 4.2 4,055 7.74
4 52.1 47.9 4.2 4,222 8.06
5 49.9 50.1 -0.2 6,201 11.83
6 49.7 50.3 -0.6 6,361 12.14
Image3
0 54.9 45.1 9.8 0 0
1 53.8 46.2 7.6 699 1.05
2 52.7 47.3 5.4 2,225 3.35
3 52.6 47.4 5.2 4,055 6.11
4 52.5 47.5 5 4,222 6.36
5 52.1 47.9 4.2 6,201 9.34
6 50.6 49.4 1.2 8,169 12.31
13 division snaked array 29 division snaked array
Secure genetic steganography method
7/16/2015LV Tailoring Software
55
No shifted 13 division snake array
29 division snake array 51 division snake array
Conclusions
7/16/2015LV Tailoring Software
56
Thank you for your attention
7/16/2015
57
LV Tailoring Software

Weitere ähnliche Inhalte

Was ist angesagt?

Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - SteganographyMohamed Talaat
 
sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography- sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography- Nikhil Praharshi
 
Steganography wavelet
Steganography waveletSteganography wavelet
Steganography waveletSantu Chall
 
Image Steganography
Image SteganographyImage Steganography
Image SteganographyAnkit Gupta
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image SteganographyEditor IJCATR
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptographyAvinash Mishra
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentationkartikeya upadhyay
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project ReportVijayMaheshwari12
 

Was ist angesagt? (20)

Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography- sharing the data using audio and image Steganography-
sharing the data using audio and image Steganography-
 
Steganography wavelet
Steganography waveletSteganography wavelet
Steganography wavelet
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
SteganographySteganography
Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography
SteganographySteganography
Steganography
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Steganography
SteganographySteganography
Steganography
 

Ähnlich wie Project presentation - Steganographic Application of improved Genetic Shifting algorithm against RS analysis - BScEE final assignment by Vadim Purinson, adviser Vladislav Kaplan MScEE

124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892
124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892
124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892Vadim Purinson
 
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET Journal
 
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...ijtsrd
 
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataencryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataINFOGAIN PUBLICATION
 
Data compression, data security, and machine learning
Data compression, data security, and machine learningData compression, data security, and machine learning
Data compression, data security, and machine learningChris Huang
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Securityijtsrd
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)Muqeed Hussain
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...IRJET Journal
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...IAEME Publication
 
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Imageijtsrd
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
 
High Capacity Image Steganography Using Adjunctive Numerical Representations ...
High Capacity Image Steganography Using Adjunctive Numerical Representations ...High Capacity Image Steganography Using Adjunctive Numerical Representations ...
High Capacity Image Steganography Using Adjunctive Numerical Representations ...ijcisjournal
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Methodijtsrd
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security Systemijtsrd
 
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...ijcsit
 

Ähnlich wie Project presentation - Steganographic Application of improved Genetic Shifting algorithm against RS analysis - BScEE final assignment by Vadim Purinson, adviser Vladislav Kaplan MScEE (20)

124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892
124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892
124310ba-d290-4b8f-89f6-3d1bca40da23-150716111411-lva1-app6892
 
review.pptx
review.pptxreview.pptx
review.pptx
 
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
 
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
 
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataencryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text data
 
Data compression, data security, and machine learning
Data compression, data security, and machine learningData compression, data security, and machine learning
Data compression, data security, and machine learning
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Security
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)Image stegnogrpahy(muqeed)
Image stegnogrpahy(muqeed)
 
gyu.docx
gyu.docxgyu.docx
gyu.docx
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
 
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Image
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
 
short-story.pptx
short-story.pptxshort-story.pptx
short-story.pptx
 
High Capacity Image Steganography Using Adjunctive Numerical Representations ...
High Capacity Image Steganography Using Adjunctive Numerical Representations ...High Capacity Image Steganography Using Adjunctive Numerical Representations ...
High Capacity Image Steganography Using Adjunctive Numerical Representations ...
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
 
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
 
G017444651
G017444651G017444651
G017444651
 

Mehr von Vladislav Kaplan

Steganographic Application of improved Genetic Shifting algorithm against RS ...
Steganographic Application of improved Genetic Shifting algorithm against RS ...Steganographic Application of improved Genetic Shifting algorithm against RS ...
Steganographic Application of improved Genetic Shifting algorithm against RS ...Vladislav Kaplan
 
LVTS - Image Resolution Monitor for Litho-Metrology
LVTS - Image Resolution Monitor for Litho-MetrologyLVTS - Image Resolution Monitor for Litho-Metrology
LVTS - Image Resolution Monitor for Litho-MetrologyVladislav Kaplan
 
LVTS - Remote CDSEM concept for Fab Metrology
LVTS  - Remote CDSEM concept for Fab MetrologyLVTS  - Remote CDSEM concept for Fab Metrology
LVTS - Remote CDSEM concept for Fab MetrologyVladislav Kaplan
 
LVTS - Macro-inspection using Flatbed scanner concept
LVTS - Macro-inspection using Flatbed scanner conceptLVTS - Macro-inspection using Flatbed scanner concept
LVTS - Macro-inspection using Flatbed scanner conceptVladislav Kaplan
 
LVTS - Dose&Focus recognition by image part2
LVTS  - Dose&Focus recognition by image part2LVTS  - Dose&Focus recognition by image part2
LVTS - Dose&Focus recognition by image part2Vladislav Kaplan
 
LVTS Dose&Focus recognition by image
LVTS Dose&Focus recognition by imageLVTS Dose&Focus recognition by image
LVTS Dose&Focus recognition by imageVladislav Kaplan
 
LVTS Advanced matching matching concept for CDSEM
LVTS Advanced matching matching concept for CDSEMLVTS Advanced matching matching concept for CDSEM
LVTS Advanced matching matching concept for CDSEMVladislav Kaplan
 

Mehr von Vladislav Kaplan (9)

Steganographic Application of improved Genetic Shifting algorithm against RS ...
Steganographic Application of improved Genetic Shifting algorithm against RS ...Steganographic Application of improved Genetic Shifting algorithm against RS ...
Steganographic Application of improved Genetic Shifting algorithm against RS ...
 
LVTS - Image Resolution Monitor for Litho-Metrology
LVTS - Image Resolution Monitor for Litho-MetrologyLVTS - Image Resolution Monitor for Litho-Metrology
LVTS - Image Resolution Monitor for Litho-Metrology
 
LVTS - Remote CDSEM concept for Fab Metrology
LVTS  - Remote CDSEM concept for Fab MetrologyLVTS  - Remote CDSEM concept for Fab Metrology
LVTS - Remote CDSEM concept for Fab Metrology
 
LVTS - Macro-inspection using Flatbed scanner concept
LVTS - Macro-inspection using Flatbed scanner conceptLVTS - Macro-inspection using Flatbed scanner concept
LVTS - Macro-inspection using Flatbed scanner concept
 
LVTS - Dose&Focus recognition by image part2
LVTS  - Dose&Focus recognition by image part2LVTS  - Dose&Focus recognition by image part2
LVTS - Dose&Focus recognition by image part2
 
LVTS Dose&Focus recognition by image
LVTS Dose&Focus recognition by imageLVTS Dose&Focus recognition by image
LVTS Dose&Focus recognition by image
 
LVTS Advanced matching matching concept for CDSEM
LVTS Advanced matching matching concept for CDSEMLVTS Advanced matching matching concept for CDSEM
LVTS Advanced matching matching concept for CDSEM
 
LVTS APC fuzzy controller
LVTS APC fuzzy controllerLVTS APC fuzzy controller
LVTS APC fuzzy controller
 
LVTS Projects
LVTS ProjectsLVTS Projects
LVTS Projects
 

Kürzlich hochgeladen

NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEselvakumar948
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxNadaHaitham1
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 

Kürzlich hochgeladen (20)

NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 

Project presentation - Steganographic Application of improved Genetic Shifting algorithm against RS analysis - BScEE final assignment by Vadim Purinson, adviser Vladislav Kaplan MScEE

  • 1. Steganography application of effective Genetic Shifting Algorithm against RS Analysis Advisor: MScEE, Vladislav Kaplan Vadim Purinson LV Tailoring Software
  • 2. Who owns the information – owns the world Rotschild Nathan Mayer • What is Steganography? • Why Steganography? • History of Steganography. • Digital steganography. • Steganalysis. • RS Fridrich analysis. • Genetic shifting algorithm. • Software implementation. • Tests • Conclusions 7/16/2015LV Tailoring Software 2
  • 3. What is Steganography? The art and science of hiding information by embedding it in some other media. • Steganography versus cryptography • In general, steganography approaches hide a message in a cover e.g. text, image, audio file, etc. 7/16/2015LV Tailoring Software 3
  • 4. Why Steganography? • Transfer secret information or embed secret messages into media. • Data, intellectual property and privacy protection - Digital Water marking, medical data. 7/16/2015LV Tailoring Software 4
  • 5. History of Steganography. • 400 B.C. – writings of Herodotus • 1499 – “Steganographia”, Trithemius – steganography and magic. • 1665 – Steganographica, Gaspari Schotti. • 1870 – The Pigeon Post into Paris. Most popular example in history this is use invisible inks. 7/16/2015LV Tailoring Software 5
  • 6. Terminology and Definitions • 7/16/2015LV Tailoring Software 6 Equation 3 Equation 4
  • 7. Terminology and Definitions • Steganographic system or stegasystem – this is set of tools and methods are used to generate a secret channel of information transmission. 7/16/2015LV Tailoring Software 7
  • 8. Digital image definition A digital image is binary representation of a two dimensional image and contains a fixed number of rows and columns of pixels. • Pixel • Byte • Bit 7/16/2015LV Tailoring Software 8 Equation 1
  • 9. Message embedding mathematical definition 8 bit Grayscale equivalents to 1 byte per pixel. For example, for the image size of 7 Kbyte maximum message size can be embedded, by using 1 LSB is 7168 bit 7/16/2015LV Tailoring Software 9 Equation 2
  • 10. Digital steganography. Advantages of digital images steganography is: • There are a variety of methods used in which information can be hidden in the images. • Relatively large volume of digital images representation, that allows the embedding of large amount of information. • Known size of the cover media, that absence of restrictions, requirements imposed by real-time. • Presence of relatively large textural regions in most digital images that have noise structure and well suited for information integration. • Weak sensitivity of the human eye to minor changes the color of the image, brightness, contrast and the noise presence. • Image steganography has come quite far with the development of fast, powerful graphical computers. 7/16/2015LV Tailoring Software 10
  • 11. IMAGE STEGANOGRAPHY TECHNIQUES • Least Significant Bit insertion – LSB • Masking and filtering 7/16/2015LV Tailoring Software 11
  • 12. The simple LSB schema 7/16/2015LV Tailoring Software 12
  • 13. LSB - Example 7/16/2015LV Tailoring Software 13 Lena Söderberg
  • 14. LSB - Example “A” = 65(decimal) = 10000001 (binary) 7/16/2015LV Tailoring Software 14
  • 15. Classification of Steganography Methods. • Substitution methods in spatial domain = LSB; • Transform domain = frequency domain; • Spread spectrum techniques; • Statistical methods; • Distortion techniques; • Cover generation methods; 7/16/2015LV Tailoring Software 15
  • 16. The properties of the human eye used in the steganography . • selectivity to brightness fluctuations; • frequency sensitivity; • masking effect; 7/16/2015LV Tailoring Software 16
  • 17. Selectivity to brightness fluctuations 7/16/2015LV Tailoring Software 17 Human eye sensitivity to contrast. Experimental data by Aubert (1865), Koenig and Brodhun (1889) and Blanchard (1918). It indicates that the Weber-Fechner law - according to which the smallest perceptible change in intensity ∆ 𝐼 vs. intensity level I is constant.
  • 18. Frequency sensitivity 7/16/2015LV Tailoring Software 18 Sensitivity of eye for the colors
  • 19. Masking effect 7/16/2015LV Tailoring Software 19 Herman Grid
  • 20. Steganalysis • Steganalysis • Steganalyst • Attack on steganography system 7/16/2015LV Tailoring Software 20
  • 21. Stegattacks classes • Attack with the knowledge of the modified media only. • Attack with knowledge of unmodified container. 7/16/2015LV Tailoring Software 21 The results of stegattack • Detect secret message presence. • Recover secret message from stegoimage. • Destroy the message in case no possibility to recover message.
  • 23. Main methods of stegattack • Visual analysis – detect visual image degradation by “naked” eye. • Statistical Histogram and STD analysis. • Detection methods are based on data hiding analyzing the characteristics of the probability distribution of the container. 7/16/2015LV Tailoring Software 23
  • 24. Visual Attacks 7/16/2015LV Tailoring Software 24 Grayscale image visual attack example Grayscale image filter visual attack example
  • 25. Histogram Analysis Attack 7/16/2015LV Tailoring Software 25
  • 26. Statistical Analysis Attack • Stego Only Attack; • Known Cover Attack; • Known Message Attack; • Blind Steganalysis; • Semi-blind; 7/16/2015LV Tailoring Software 26
  • 27. Fridrich RS Analysis 𝐹𝑚 1 ↔ 2,3 ↔ 4, … 223 ↔ 224 𝐹−𝑚 0 ↔ 1,2 ↔ 3, … 224 ↔ 225 • “regular” • “singular” • “unchanged” 7/16/2015LV Tailoring Software 27 ← 𝑅−𝑚 𝑆−𝑚 → 𝑅 𝑚 ↔ 𝑆 𝑚𝑅 𝑚 > 𝑆 𝑚 𝑅−𝑚 > 𝑆−𝑚
  • 28. Genetic Shifting Algorithm (Shen Wang ) 7/16/2015LV Tailoring Software 28 Before or After ? 𝐶 = 𝑖 𝑁 𝑖 + 1 − 𝑖 𝑁 − 1 𝑁 – this is number of pixels, and (𝑖 + 1) and 𝑖 are indicate current and next pixel values.
  • 29. Introduction to LabVIEW 7/16/2015LV Tailoring Software 29
  • 30. Front Panel 7/16/2015LV Tailoring Software 30 Example of Front panel view • Modern • System • Classic • Express • Control Design & Simulation • .Net & ActiveX • Signal processing • Add ons • User Controls • Select and control • DSC Module • RF Communica tions • Sound & Vibration • Vision Controls palette view
  • 31. Block diagram 7/16/2015LV Tailoring Software 31 Function paletteExample of Block diagram view
  • 32. More functions • Tools palette • Operating tool • Positioning tool • Labeling tool • Wiring tool 7/16/2015LV Tailoring Software 32 • Wiring • SubVis
  • 33. Basic LabVIEW Hierarchy 7/16/2015LV Tailoring Software 33
  • 34. Front panel view 7/16/2015LV Tailoring Software 34 1. Source cover image 2. Result stegoimage 3. Cover Histogram and STD statistic window 4. Stegoimage Histogram and STD statistic window 5. RS analysis results on Stegoimage 6. LSB level to be used (up to LSB-4) 7. Start shifting (GSM) 8. Standard deviation evaluation 9. Snaked array length. 10. Open output result text message 11. Decode message from stegoimage 12. Encode message into cover message 13. Stop button 14. Start / stop menu
  • 36. Encoding Decoding Example 7/16/2015LV Tailoring Software 36
  • 37. Steps definition • Perform basic message coding (Cover Image) up to LSB-4 for gray images. • Perform basic message recovery (Stego Image) up to LSB-4 for gray images. • Compare visual image degradation. • Compare visual degradation through common tools (Histogram, STD). • Perform study of coded message saturation (message of different length) vs. recovery and image degradation per different LSB coding at gray images. • Build RS analysis (Fridrich algorithm) routine. • Confirm validity of RS analysis on gray images. • Implement secure genetic steganography method for RS baseline shifting for LSB-1. (GSM for RS shifting). • Perform basic message recovery with GSM for RS shifting for LSB-1. • Perform RS analysis comparison for different message length with GSM for RS shifting and without, use different “snake” division array image representation. 7/16/2015LV Tailoring Software 37
  • 38. Compare visual image degradation 7/16/2015LV Tailoring Software 38 LSB-1 The recovered text file size is 6.21 KB (6,361 bytes), 1177 words text, equivalent to 2.5 pages in WORD format.
  • 40. Compare visual image degradation 7/16/2015LV Tailoring Software 40 LSB-2 The recovered text file size is 12.4 KB (12,737 bytes), 2228 words text, equivalent to 5 pages in WORD format.
  • 41. Compare visual image degradation 7/16/2015LV Tailoring Software 41 LSB-3 The recovered text file size is 18.6 KB (19,106 bytes), 3317 words text, equivalent to 7.5 pages in WORD format.
  • 42. Compare visual image degradation 7/16/2015LV Tailoring Software 42 LSB-4 The recovered text file size is 24.8 KB (25,477 bytes), 4468 words text, equivalent to 10 pages in WORD format – this is a maximum text file size can be imbedded into 225 × 225 𝑝𝑖𝑥𝑒𝑙𝑠 image by using 4LSB plane.
  • 43. Compare visual degradation through common tools 7/16/2015LV Tailoring Software 43
  • 44. Compare visual degradation through common tools 7/16/2015LV Tailoring Software 44 Different depth of the LSB Blue line is displays Cover image Histogram and red line represents manipulated image distribution.
  • 45. Compare visual degradation through common tools 7/16/2015LV Tailoring Software 45 Histogram degradation trough of message enlargement for 4LSB level
  • 46. Compare visual degradation through common tools 7/16/2015LV Tailoring Software 46 STD view
  • 47. Build RS analysis (Fridrich algorithm) routine. 7/16/2015LV Tailoring Software 47
  • 48. Build RS analysis (Fridrich algorithm) routine 7/16/2015LV Tailoring Software 48 LSB-1
  • 49. 𝑅 𝑚/𝑆 𝑚 differences versus message volume. 7/16/2015LV Tailoring Software 49 Image1 Message % of Rm % of Sm diff Message length(bytes) % of image 0 54.9 45.1 9.8 0 0 1 53.8 46.2 7.6 699 1.05 2 52.1 47.9 4.2 2,225 3.35 3 51.5 48.5 3 4,055 6.11 4 51.4 48.6 2.8 4,222 6.36 5 50.8 49.2 1.6 6,201 9.34 6 49.8 50.2 -0.4 8,169 12.3 Image2 0 54.2 45.8 8.4 0 0 1 53.9 46.1 7.8 699 1.78 2 52.5 47.5 5 2,225 5.67 3 51.8 48.2 3.6 4,055 10.34 4 51.7 48.3 3.4 4,222 10.76 5 50 50 0 6,201 15.8 6 49.8 50.2 -0.4 6,361 16.33 Image3 0 52.5 47.5 6 0 0 1 52 48 5 699 1.05 2 51.8 48.2 4.4 2,225 3.35 3 51.9 48.1 4 4,055 6.11 4 51.7 48.3 4 4,222 6.36 5 50.9 49.1 3.4 6,201 9.34 6 50.8 49.2 0.6 8,169 12.31
  • 50. Build RS analysis (Fridrich algorithm) routine 7/16/2015LV Tailoring Software 50
  • 51. Image 2 RS analysis results. 7/16/2015LV Tailoring Software 51 2LSB Message % of Rm % of Sm diff Message length(bytes) % of image 0 54.2 45.8 8.4 0 0 1 54 46 8 699 1.78 2 53.4 46.6 6.8 2,225 5.67 3 52.8 47.2 5.6 4,055 10.34 4 52.7 47.3 5.4 4,222 10.76 5 52.1 47.9 4.2 6,201 15.8 6 50.9 49.1 1.8 12,737 24.31 3LSB 0 54.2 45.8 8.4 0 0 1 54.2 45.8 8.4 699 1.78 2 54.2 45.8 8.4 2,225 5.67 3 53.9 46.1 7.8 4,055 10.34 4 53.9 46.1 7.8 4,222 10.76 5 53.4 46.6 6.8 6,201 15.8 6 52 48 4 19,106 36.47 4LSB 0 54.2 45.8 8.4 0 0 1 54.1 45.9 8.2 699 1.78 2 54 46 8 2,225 5.67 3 53.9 46.1 7.8 4,055 10.34 4 53.9 46.1 7.8 4,222 10.76 5 53.4 46.6 6.8 6,201 15.8 6 50.3 49.7 0.6 25,477 48.56
  • 52. Build RS analysis (Fridrich algorithm) routine (30 images 225 × 225 𝑝𝑖𝑥𝑒𝑙𝑠, 8𝑏𝑖𝑡 𝑑𝑒𝑝𝑡ℎ) 7/16/2015LV Tailoring Software 52
  • 53. Secure genetic steganography method 7/16/2015LV Tailoring Software 53
  • 54. 13 and 29 division snaked array LSB-1 RS analysis results 7/16/2015LV Tailoring Software 54 Image 1 Message % of Rm % of Sm diff Message length(bytes) % of imager 0 63 37 26 0 0 1 60.9 39.1 21.8 699 1.33 2 56.9 43.1 13.8 2,225 4.24 3 54.5 45.5 9 4,055 7.74 4 54.5 45.5 9 4,222 8.06 5 52.4 47.6 4.8 6,201 11.83 6 51.1 48.9 2.2 6,361 12.14 Image 2 0 60 40 20 0 0 1 58.9 41.1 17.8 699 1.05 2 57.1 42.9 14.2 2,225 3.35 3 55.3 44.7 10.6 4,055 6.11 4 55.5 44.5 11 4,222 6.36 5 51.7 48.3 3.4 6,201 9.34 6 51.1 48.9 2.2 8,169 12.3 Image3 0 58.1 41.9 16.2 0 0 1 56.6 43.4 13.2 699 1.05 2 55 45 10 2,225 3.35 3 54.2 45.8 8.4 4,055 6.11 4 54.3 45.7 8.6 4,222 6.36 5 53.3 46.7 6.6 6,201 9.34 6 50.9 49.1 1.8 8,169 12.31 Image 1 Message % of Rm % of Sm diff Message length(bytes) % of image 0 58.7 41.3 17.4 0 0 1 57 43 14 699 1.05 2 54.5 45.5 9 2,225 3.35 3 53 47 6 4,055 6.11 4 52.8 47.2 5.6 4,222 6.36 5 51.2 48.8 2.4 6,201 9.34 6 50.5 49.5 1 8,169 12.3 Image 2 0 56.9 43.1 13.8 0 0 1 56 44 12 699 1.33 2 53.7 46.3 7.4 2,225 4.24 3 52.1 47.9 4.2 4,055 7.74 4 52.1 47.9 4.2 4,222 8.06 5 49.9 50.1 -0.2 6,201 11.83 6 49.7 50.3 -0.6 6,361 12.14 Image3 0 54.9 45.1 9.8 0 0 1 53.8 46.2 7.6 699 1.05 2 52.7 47.3 5.4 2,225 3.35 3 52.6 47.4 5.2 4,055 6.11 4 52.5 47.5 5 4,222 6.36 5 52.1 47.9 4.2 6,201 9.34 6 50.6 49.4 1.2 8,169 12.31 13 division snaked array 29 division snaked array
  • 55. Secure genetic steganography method 7/16/2015LV Tailoring Software 55 No shifted 13 division snake array 29 division snake array 51 division snake array
  • 57. Thank you for your attention 7/16/2015 57 LV Tailoring Software