1 / 34

Steganography in WebP image using LSB embedding

Steganography in WebP image using LSB embedding. Master’s project d efense By Manchu Viswam. Introduction. Steganography is the art of hiding information in ways that prevent the detection of hidden messages. Steganography means “ covered writing .”

matana
Download Presentation

Steganography in WebP image using LSB embedding

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Steganography in WebP image using LSB embedding Master’s project defense By Manchu Viswam

  2. Introduction • Steganography is the art of hiding information in ways that prevent the detection of hidden messages. • Steganography means “covered writing.” • The goal of digital steganography are security and capacity. • The basic terms used in steganography are carrier file, message and stego file. • Steganography can be classified into three types, based on the carrier file used. Carrier file can be text, image, audio or video file [2]. • Least Significant Bit (LSB) insertion technique is exploited to embed data into a variety of digital media. WebP steganography , mviswam

  3. LSB insertion • It is a popular and simple approach to embed data in the carrier file. • It replaces least significant bits of the carrier file with the data to be embedded so that it is difficult to be detected by the human eye. • The insertion can be done at any of the bits on the carrier file and it is mostly done in least significant bits to minimize the image distortion. WebP steganography , mviswam

  4. LSB insertion - Example • When using a 24- bit image, one can change 3 bits in a pixel by changing a RGB color components. • For an example consider, three adjacent pixels of an image and embed binary value of 400 (110010000) in the LSB of the carrier file. 10010101 00001101 11001001 10010110 00001111 11001011 10011111 00010000 11001011 After embedding, 10010101 00001101 11001000 10010110 00001111 11001010 10011110 00010000 11001010 WebP steganography , mviswam

  5. Image steganography • In this project, we will use WebP image as the carrier file. • WebP is a new image format by Google, and uses small file size and gives better quality images on the web. • It supports both lossless and lossy compression techniques. • It also supports transparency for both image compressions. • WebP image is divided into sub-blocks. Each sub-block has 4x4 pixels. • It is based on block prediction, the same methodology used by the VP8 video format and it uses the Resource Interchange File Format (RIFF) as a container format. WebP steganography , mviswam

  6. WebP encoding overview WebP steganography , mviswam

  7. WebP block decoding WebP steganography , mviswam

  8. Previous work • LSB steganography has been implemented for lossless image formats such as BMP, GIF, and PNG[Reddy, Reddy, Subramanyam 2011]. • LSB steganography has also been implemented for lossy image format like JPEG[Elgabar 2013]. • These image formats uses DIIT (Digital Invisible Ink Toolkit)open source Java based tool as the framework for steganography and steganalysis [Hempstalk 2006]. WebP steganography , mviswam

  9. Motivation • WebP is a new image format. • It provides lossless and lossy compression for digital images. • In WebP, lossless images are 26% smaller in size when compared to PNG images [7]. • In WebP, lossy images are 25-34% smaller in size when compared to JPEG images [7]. WebP steganography , mviswam

  10. Design of LSB algorithm for WebP lossless image steganography Step1. Select the carrier image (c) as an input. Step2. Encode the c in binary [18]. Step3. The secret message (m). Step4. Encode the m in binary [18]. Step5. Choose one pixel of the c sequentially. Step6. Use that pixel to embed message in the least significant bits. Step7. Repeat step 6 until you embed message completely. Step8. Save the new image called stego image (s). Step9. During steganalysis [4] the stego image is decoded to obtain the hidden message (m). WebP steganography , mviswam

  11. Design for WebP lossless image steganography Carrier image (c) Stego image (s) Encode c in binary Message (m) Encode m in binary WebP steganography , mviswam

  12. Design for WebP lossless image steganalysis Hidden message (m) Stego image (s) WebP steganography , mviswam

  13. Design of LSB algorithm for WebP lossy image steganography Step1. Select the carrier image (c) as an input. Step2. WebP image is divided into sub-blocks (4x4), whose values are predicted using the values in neighboring block, so that only the difference is encoded using DCT transform [16]. DCT transform converts each sub-block of an image from the spatial domain into the frequency domain. Step3. Then do quantization to reduce information into a smaller one (coefficients). Step4. The secret message (m). Step5. Encode the m in binary [18]. Step6. Choose one coefficient sequentially. Step7. Use that coefficient to embed message in the least significant bit. Step8. Repeat step 7 until you embed message completely. Step9. After embedding the required message, the modified coefficients are compressed using entropy encoding to produce the stego image. Step10. Save the new image called stego image (s). WebP steganography , mviswam

  14. Design of LSB algorithm for WebP lossy image steganalysis Step1: Select the stego image (s) as an input. Step 2: Do the reverse of entropy encoding to get the coefficients. Step 3: From the coefficients we will obtain the hidden message (m). WebP steganography , mviswam

  15. Design for WebP lossy image steganography [5] Carrier image (c) 4x4 blocks Coefficients DCT Quantization Message (m) Table Entropy encoding Stego image (s) Encode (m) in binary Table WebP steganography , mviswam

  16. Design for WebP lossy image steganalysis [5] Hidden Message (m) Stego image (s) Coefficients WebP steganography , mviswam

  17. Implementation • Java development kit jdk 1.7 for 32 bit platform. • Java 32-bit process (Program Files (x86)). • Two prebuilt libraries are utilized -webp-imageio.jar and webp-imageio.dll. • Windows 7 operating system. • Digital Invisible Ink Toolkit 1.6 WebP steganography , mviswam

  18. Evaluation of WebP image steganography - 1 WebP steganography , mviswam

  19. Evaluation of WebP image steganography - 2 WebP steganography , mviswam

  20. Evaluation of WebP image steganography -3 WebP steganography , mviswam

  21. Evaluation of WebP image steganography -4 WebP steganography , mviswam

  22. Evaluation of WebP image steganography - 5 The mean-squared error (MSE) [4] between carrier image and stego image is: MSE = (1 / XY) * sum ((p(x, y) - p~(x, y))^2) The Normalized Cross-Correlation (NC) [4] between carrier image and stego image is: NC = sum(p(x,y)*p~(x,y)) / sum(p(x,y)^2) WebP steganography , mviswam

  23. Evaluation of WebP image steganography - 6 WebP steganography , mviswam

  24. Time taken to embed message -comparison WebP steganography , mviswam

  25. Time taken to retrieve message - comparison WebP steganography , mviswam

  26. Quantitative and qualitative metrics of WebP with PNG and JPEG WebP steganography , mviswam

  27. Conclusion • We have designed and implemented software to perform WebP steganography. • The DIIT tool is a stand-alone application and can be used on all platforms. • There are two benefits of this WebP steganography. • WebP steganography has higher stealth ability when compared to PNGs and JPEG images. • WebP steganography process takes more time to embed and retrieve messages than the PNGs and the JPEG images. This will improve when Java gets the ability to decode and encode WebP images. WebP steganography , mviswam

  28. Future work • Implement and experiment the results for WebP lossless steganography. This will involve in creating a new java imageio library to decode and encode WebP lossless images. • Experiment with other steganography techniques in WebP images. • Experiment the results with other message options such as image, audio or video. • Combine cryptography with steganography for additional security. WebP steganography , mviswam

  29. References • [1] Johnson, Neil F., and SushilJajodia. "Exploring steganography: Seeing the unseen." Computer 31, no. 2 (1998): 26-34. • [2] Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt. “Digital image steganography: Survey and analysis of current methods.” Signal Processing, Volume 90, Issue 3, Pages 727-752,March 2010. • [3] Elgabar, Eltyeb E. Abed, and Haysam A. Ali Alamin. "Comparison of LSB Steganography in GIF and BMP Images." International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-4, September 2013. • [4] Kathryn Hempstalk"Hiding Behind Corners:Using Edges in Images for Better Steganography",January 2006. • [5] Elgabar, Eltyeb E. Abed. "Comparison of LSB Steganography in BMP and JPEG Images." International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-5, November 2013. WebP steganography , mviswam

  30. References(Continued) • [6] Reddy, V. Lokeswara, A. Subramanyam, and P. Chenna Reddy. "Implementation of LSB steganography and its evaluation for various file formats." Int. J. Advanced Networking and Applications 2, no. 05 (2011): 868-872. • [7] WebP – Google Developers https://developers.google.com/speed/webp • [8]Ebrahimi, P. T. wg1n5578 WebP vs. Standard Image Coding. Technical report, ISO/ITU JPEG commitee, ICT-Link, 2010. • [9] Marie Babel “From image coding and representation to robotic vision.” tel-00754550, version 1 - 20 Nov 2012. http://tel.archives- ouvertes.fr/docs/00/75/45/50/PDF/HDRBabel2012Final_ReducedQuality.pdf • [10] Provos, Niels, and Peter Honeyman. "Hide and seek: An introduction to steganography." Security & Privacy, IEEE 1.3 (2003): 32-44. WebP steganography , mviswam

  31. References(Continued) • [11] Chandramouli, Rajarathnam, and Nasir D. Memon. "Steganography capacity: A steganalysis perspective." Electronic Imaging 2003. International Society for Optics and Photonics, 2003. • [12] Bankoski, James, Paul Wilkins, and Yaowu Xu. "Vp8 data format and decoding guide." (2011). • [13] Rabbat, Richard (2010-09-30). "WebP, a new image format for the Web". Chromium Blog. Google. Retrieved 2010-10-01. • [14] JyrkiAlakuijala, http://googlecode.blogspot.com/2011/11/lossless-and-transparency-encoding-in.html. August 30, 2012. • [15] Morkel, Tayana, Jan HP Eloff, and Martin S. Olivier. "An overview of image steganography." ISSA. 2005. WebP steganography , mviswam

  32. References(Continued) • [16] Ginesu, Giaime, Maurizio Pintus, and Daniele D. Giusto. "Objective assessment of the WebP image coding algorithm." Signal Processing: Image Communication 27.8 (2012): 867-874. • [17] Bennett, Neil R. JPEG STEGANALYSIS & TCP/IP STEGANOGRAPHY. Diss. University of Rhode Island, 2009. • [18] Al-Shatnawi, Atallah M. "A new method in image steganography with improved image quality." Applied Mathematical Sciences 6.79 (2012): 3907-3915. • [19] Wu, H-C., et al. "Image steganographic scheme based on pixel-value differencing and LSB replacement methods." IEE Proceedings-Vision, Image and Signal Processing 152.5 (2005): 611-615. • [20] Wiggins, Richard H., et al. "Image File Formats: Past, Present, and Future 1."Radiographics 21.3 (2001): 789-798. WebP steganography , mviswam

  33. References(Continued) • [21] Ahmed, Nasir, T. Natarajan, and Kamisetty R. Rao. "Discrete cosine transform."Computers, IEEE Transactions on 100.1 (1974): 90-93. • [22] Ahmed, Nasir, and KamisettyRamamohan Rao. "Walsh-hadamardtransform."Orthogonal Transforms for Digital Signal Processing. Springer Berlin Heidelberg, 1975. 99-152. • [23] Bankoski, Jim, Paul Wilkins, and Yaowu Xu. "Technical overview of VP8, an open source video codec for the web." ICME. 2011. WebP steganography , mviswam

  34. Thank you Questions? WebP steganography , mviswam

More Related