Information Theory and Synthetic Steganography
CSM25 Secure Information Hiding Dr Hans Georg Schaathun
University of Surrey
Spring 2008
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 1 / 53
Information Theory and Synthetic Steganography CSM25 Secure - - PowerPoint PPT Presentation
Information Theory and Synthetic Steganography CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Spring 2008 Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 1 / 53 Learning
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 1 / 53
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 2 / 53
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 3 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 4 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 5 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 5 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 5 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 5 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 5 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 5 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 6 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 6 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 6 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 6 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 6 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 7 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 7 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 7 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 7 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 7 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 7 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 7 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 8 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 8 / 53
Communications essentials Communications and Redundancy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 8 / 53
Communications essentials Anderson and Petitcolas 1999
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 9 / 53
Communications essentials Anderson and Petitcolas 1999
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 10 / 53
Communications essentials Anderson and Petitcolas 1999
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 10 / 53
Communications essentials Anderson and Petitcolas 1999
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 11 / 53
Communications essentials Anderson and Petitcolas 1999
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 11 / 53
Communications essentials Digital Communications
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 12 / 53
Communications essentials Digital Communications
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 13 / 53
Communications essentials Digital Communications
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 13 / 53
Communications essentials Digital Communications
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 13 / 53
Communications essentials Digital Communications
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 13 / 53
Communications essentials Digital Communications
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 13 / 53
Communications essentials Digital Communications
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 13 / 53
Communications essentials Digital Communications
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 13 / 53
Communications essentials Digital Communications
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 14 / 53
Communications essentials Digital Communications
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 14 / 53
Communications essentials Digital Communications
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 14 / 53
Communications essentials Digital Communications
Information Theory and Synthetic Steganography Spring 2008 15 / 53
Communications essentials Digital Communications
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 15 / 53
Communications essentials Digital Communications
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 15 / 53
Communications essentials Digital Communications
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 15 / 53
Communications essentials Shannon Entropy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 16 / 53
Communications essentials Shannon Entropy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 17 / 53
Communications essentials Shannon Entropy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 17 / 53
Communications essentials Shannon Entropy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 17 / 53
Communications essentials Shannon Entropy
2 log 1 2
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 18 / 53
Communications essentials Shannon Entropy
2 log 1 2
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 18 / 53
Communications essentials Shannon Entropy
2 log 1 2
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 18 / 53
Communications essentials Shannon Entropy
2 log 1 2
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 18 / 53
Communications essentials Shannon Entropy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 19 / 53
Communications essentials Shannon Entropy
1
2
3
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 20 / 53
Communications essentials Shannon Entropy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 21 / 53
Communications essentials Shannon Entropy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 21 / 53
Communications essentials Shannon Entropy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 22 / 53
Communications essentials Shannon Entropy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 22 / 53
Communications essentials Shannon Entropy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 22 / 53
Communications essentials Shannon Entropy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 22 / 53
Communications essentials Shannon Entropy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 22 / 53
Communications essentials Shannon Entropy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 22 / 53
Communications essentials Shannon Entropy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 22 / 53
Communications essentials Shannon Entropy
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 22 / 53
Communications essentials Security
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 23 / 53
Communications essentials Security
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 24 / 53
Communications essentials Security
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 25 / 53
Communications essentials Security
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 25 / 53
Communications essentials Security
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 25 / 53
Communications essentials Security
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 25 / 53
Communications essentials Security
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 25 / 53
Communications essentials Prediction
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 26 / 53
Communications essentials Prediction
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 27 / 53
Communications essentials Prediction
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 28 / 53
Communications essentials Prediction
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 29 / 53
Communications essentials Prediction
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 30 / 53
Communications essentials Prediction
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 31 / 53
Communications essentials Prediction
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 32 / 53
Communications essentials Prediction
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 33 / 53
Compression Huffmann Coding
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 34 / 53
Compression Huffmann Coding
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 35 / 53
Compression Huffmann Coding
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 36 / 53
Compression Huffmann Coding
2%
4%
4%
Information Theory and Synthetic Steganography Spring 2008 37 / 53
Compression Huffmann Coding
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 38 / 53
Compression Huffmann Coding
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 39 / 53
Compression Huffmann Steganography
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 40 / 53
Compression Huffmann Steganography
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 41 / 53
Compression Huffmann Steganography
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 42 / 53
Compression Huffmann Steganography
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 42 / 53
Compression Huffmann Steganography
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 43 / 53
Compression Huffmann Steganography
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 44 / 53
Compression Huffmann Steganography
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 45 / 53
Miscellanea Synthesis by Grammar
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 46 / 53
Miscellanea Synthesis by Grammar
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 47 / 53
Miscellanea Synthesis by Grammar
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 48 / 53
Miscellanea Synthesis by Grammar
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 48 / 53
Miscellanea Synthesis by Grammar
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 48 / 53
Miscellanea Synthesis by Grammar
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 49 / 53
Miscellanea Redundancy in Images
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 50 / 53
Miscellanea Redundancy in Images
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 51 / 53
Miscellanea Redundancy in Images
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 51 / 53
Miscellanea Redundancy in Images
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 51 / 53
Miscellanea Redundancy in Images
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 51 / 53
Miscellanea Redundancy in Images
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 51 / 53
Miscellanea Redundancy in Images
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 51 / 53
Miscellanea Redundancy in Images
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 52 / 53
Miscellanea Redundancy in Images
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 52 / 53
Miscellanea Redundancy in Images
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 52 / 53
Miscellanea Redundancy in Images
Dr Hans Georg Schaathun Information Theory and Synthetic Steganography Spring 2008 53 / 53