the dct domain and jpeg
play

The DCT domain and JPEG CSM25 Secure Information Hiding Dr Hans - PowerPoint PPT Presentation

The DCT domain and JPEG CSM25 Secure Information Hiding Dr Hans Georg Schaathun University of Surrey Spring 2008 Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 1 / 62 Learning Objectives Be able to work with and JPEG images


  1. Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M × N image: N · M samples per component ( Y , Cb , Cr ). Y is more useful than Cb and Cr . Therefore we can downsample Cb and Cr M / 2 × N / 2 is common for Cb and Cr Still use M × M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 17 / 62

  2. Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M × N image: N · M samples per component ( Y , Cb , Cr ). Y is more useful than Cb and Cr . Therefore we can downsample Cb and Cr M / 2 × N / 2 is common for Cb and Cr Still use M × M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 17 / 62

  3. Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M × N image: N · M samples per component ( Y , Cb , Cr ). Y is more useful than Cb and Cr . Therefore we can downsample Cb and Cr M / 2 × N / 2 is common for Cb and Cr Still use M × M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 17 / 62

  4. Compression Downsampling What is sampling? Fact The human eye is more sensitive to changes in luminance than in chrominance. To sample is to collect measurements. Each pixel is a sample (measuring the colour of the image). Lower resolution means fewer samples. Reducing resolution = downsampling Basic M × N image: N · M samples per component ( Y , Cb , Cr ). Y is more useful than Cb and Cr . Therefore we can downsample Cb and Cr M / 2 × N / 2 is common for Cb and Cr Still use M × M for Y Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 17 / 62

  5. Compression Downsampling What do we save? Original: M × N pixels × 3 components . Compressed: 2 × M 2 × N 2 + M × N = 11 2 M × N Ratio = 1 1 2 MN 3 MN = 1 Compressed 2 . Original We just saved 50% Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 18 / 62

  6. Compression Downsampling What do we save? Original: M × N pixels × 3 components . Compressed: 2 × M 2 × N 2 + M × N = 11 2 M × N Ratio = 1 1 2 MN 3 MN = 1 Compressed 2 . Original We just saved 50% Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 18 / 62

  7. Compression Downsampling What do we save? Original: M × N pixels × 3 components . Compressed: 2 × M 2 × N 2 + M × N = 11 2 M × N Ratio = 1 1 2 MN 3 MN = 1 Compressed 2 . Original We just saved 50% Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 18 / 62

  8. Compression Downsampling What do we save? Original: M × N pixels × 3 components . Compressed: 2 × M 2 × N 2 + M × N = 11 2 M × N Ratio = 1 1 2 MN 3 MN = 1 Compressed 2 . Original We just saved 50% Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 18 / 62

  9. Compression Downsampling Chrominance versus Luminence Fact The human eye is more sensitive to changes in luminance than in chrominance. Watermarking tend to embed in Y (luminence) Embedding in Cb and Cr would more easily be destroyed by JPEG Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 19 / 62

  10. Compression Downsampling Chrominance versus Luminence Fact The human eye is more sensitive to changes in luminance than in chrominance. Watermarking tend to embed in Y (luminence) Embedding in Cb and Cr would more easily be destroyed by JPEG Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 19 / 62

  11. Compression Downsampling Chrominance versus Luminence Fact The human eye is more sensitive to changes in luminance than in chrominance. Watermarking tend to embed in Y (luminence) Embedding in Cb and Cr would more easily be destroyed by JPEG Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 19 / 62

  12. Compression Downsampling Downsampling in JPEG Translation to YCbCr. 1 Downsampling 2 DCT transform 3 Each downsampled component matrix Y , Cb , Cr is Divided into 8 × 8 blocks DCT transformed blockwise An 8 × 8 block in Cb can be associated with 1,2 or 4 Y blocks depending on downsampling. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 20 / 62

  13. Compression Quantisation Outline Overview 1 Image Representation 2 Alternatives to RGB The blockwise DCT domain 3 Compression Downsampling Quantisation Source Coding Steganography in JPEG 4 Into the compressed domain JSteg and OutGuess 0.1 Steganalysis F3 – 4 – 5 The JPEG toolbox 5 Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 21 / 62

  14. Compression Quantisation What is quantisation? Rounding in general Rounding numbers is quantisation. Measuring gives continuous numbers Whether you measure pixel luminence, or the length of your garage. No matter how close to points are, there is a point in between. However, our precision is limited. We give lengths to the nearest unit. Luminence is categorised into 256 intervals (8bit integers). Computer memory is finite, 256 different possibilites for a byte Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 22 / 62

  15. Compression Quantisation Quantisation in JPEG Quantisation in the DCT domain Each coefficient is divided by the quantisation constant. The result is rounded to nearest integer. Different quantisation constants for each coefficient in the block. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 23 / 62

  16. Compression Quantisation Example Quantisation in JPEG 2 DCT matrix 3 2 Quantisation matrix 3 − 415 − 30 − 61 27 56 − 20 − 2 0 16 11 10 16 24 40 51 61 6 7 6 7 6 4 − 22 − 61 10 13 − 7 − 9 5 7 6 12 12 14 19 26 58 60 55 7 6 7 6 7 6 − 47 7 77 − 25 − 29 10 5 − 6 7 6 14 13 16 24 40 57 69 56 7 6 7 6 7 − 49 12 34 − 15 − 10 6 2 2 ./ 14 17 22 29 51 87 80 62 6 7 6 7 6 7 6 7 12 − 7 − 13 − 4 − 2 2 − 3 3 18 22 37 56 68 109 103 77 6 7 6 7 6 7 6 7 − 8 3 2 − 6 − 2 1 4 2 24 35 55 64 81 104 113 92 6 7 6 7 6 7 6 7 − 1 0 0 − 2 − 1 − 3 4 − 1 49 64 78 87 103 121 120 101 4 5 4 5 0 0 − 1 − 4 − 1 0 1 2 72 92 95 98 112 100 103 99 2 Quantised DCT matrix 3 − 26 − 3 − 6 2 2 − 1 0 0 6 7 0 − 2 − 4 1 1 0 0 0 6 7 6 7 − 3 1 5 − 1 − 1 0 0 0 6 7 6 7 − 4 1 2 − 1 0 0 0 0 6 7 ≈ 6 7 1 0 0 0 0 0 0 0 6 7 6 7 0 0 0 0 0 0 0 0 6 7 6 7 0 0 0 0 0 0 0 0 4 5 0 0 0 0 0 0 0 0 Example from Wikipedia . Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 24 / 62

  17. Compression Source Coding Outline Overview 1 Image Representation 2 Alternatives to RGB The blockwise DCT domain 3 Compression Downsampling Quantisation Source Coding Steganography in JPEG 4 Into the compressed domain JSteg and OutGuess 0.1 Steganalysis F3 – 4 – 5 The JPEG toolbox 5 Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 25 / 62

  18. Compression Source Coding Entropy Coding Recall  − 26 − 3 − 6 2 2 − 1 0 0  0 − 2 − 4 1 1 0 0 0     − 3 1 5 − 1 − 1 0 0 0     − 4 1 2 − 1 0 0 0 0     1 0 0 0 0 0 0 0     0 0 0 0 0 0 0 0     0 0 0 0 0 0 0 0   0 0 0 0 0 0 0 0 Observe 0 is extremely common ± 1 is common Two-digit numbers are very rare This is typical Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 26 / 62

  19. Compression Source Coding Entropy Coding In order to compress the data Use few bits (short codewords) for frequent symbols Many bits (long codewords) only for rare symbols Usually, JPEG uses a simple Huffman code. it can use other codes (saving space, but computionally costly) For instance, a single short codeword to say ‘the rest of the block is zero’ Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 27 / 62

  20. Steganography in JPEG Into the compressed domain Outline Overview 1 Image Representation 2 Alternatives to RGB The blockwise DCT domain 3 Compression Downsampling Quantisation Source Coding Steganography in JPEG 4 Into the compressed domain JSteg and OutGuess 0.1 Steganalysis F3 – 4 – 5 The JPEG toolbox 5 Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 28 / 62

  21. � � � � � � � � Steganography in JPEG Into the compressed domain Before or after compression message LSB JPEG stego- pixmap embedding compression image message JPEG LSB stego- pixmap compression embedding image Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 29 / 62

  22. Steganography in JPEG Into the compressed domain Fragility of LSB LSB embedding is criticised for being fragile JPEG removes insignificant information ... such as the LSB JPEG compression after embedding (probably) ruins the message When is this a problem? Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 30 / 62

  23. Steganography in JPEG Into the compressed domain When fragility is a problem It is a problem in robust watermarking JPEG compression is common-place most applications need robustness If the purpose is steganography, and Alice and Bob are allowed to exchange pixmaps, then it is not a problem. Obviously, if your steganogram is supposed to be JPEG ... Do not do LSB in the pixmap. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 31 / 62

  24. Steganography in JPEG Into the compressed domain When fragility is a problem It is a problem in robust watermarking JPEG compression is common-place most applications need robustness If the purpose is steganography, and Alice and Bob are allowed to exchange pixmaps, then it is not a problem. Obviously, if your steganogram is supposed to be JPEG ... Do not do LSB in the pixmap. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 31 / 62

  25. Steganography in JPEG Into the compressed domain When fragility is a problem It is a problem in robust watermarking JPEG compression is common-place most applications need robustness If the purpose is steganography, and Alice and Bob are allowed to exchange pixmaps, then it is not a problem. Obviously, if your steganogram is supposed to be JPEG ... Do not do LSB in the pixmap. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 31 / 62

  26. Steganography in JPEG Into the compressed domain Double compression Common bug in existing software Read a arbitrary image file JPEG is decompressed on reading ... → pixmap Embedding works on JPEG image is compressed to produce JPEG signal quality factor (QF) either default or supplied by user A JPEG steganogram has now been compressed twice different QF produces an artifact Is there any reason for de- and recompressing? Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 32 / 62

  27. Steganography in JPEG Into the compressed domain Important lessons Do not make unnecessary image conversions. 1 Many techniques apply to any format 2 LSB applies to JPEG signals ... but it is called Jsteg Use a technique which fits the target (stego-) format 3 i.e. the format you are allowed to use on the channel. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 33 / 62

  28. Steganography in JPEG Into the compressed domain Main development The past at a glance Core Reading Hide and Seek: An Introduction to Steganography by Niels Provos and Peter Honeyman, in IEEE Security & Privacy 2003. JSteg was published 1 JSteg was broken 2 OutGuess was published 3 OutGuess was broken 4 F5 was published 5 F5 was broken 6 Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 34 / 62

  29. Steganography in JPEG Into the compressed domain Main development The past at a glance Core Reading Hide and Seek: An Introduction to Steganography by Niels Provos and Peter Honeyman, in IEEE Security & Privacy 2003. JSteg was published 1 JSteg was broken 2 OutGuess was published 3 OutGuess was broken 4 F5 was published 5 F5 was broken 6 Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 34 / 62

  30. Steganography in JPEG Into the compressed domain Main development The past at a glance Core Reading Hide and Seek: An Introduction to Steganography by Niels Provos and Peter Honeyman, in IEEE Security & Privacy 2003. JSteg was published 1 JSteg was broken 2 OutGuess was published 3 OutGuess was broken 4 F5 was published 5 F5 was broken 6 Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 34 / 62

  31. Steganography in JPEG Into the compressed domain Main development The past at a glance Core Reading Hide and Seek: An Introduction to Steganography by Niels Provos and Peter Honeyman, in IEEE Security & Privacy 2003. JSteg was published 1 JSteg was broken 2 OutGuess was published 3 OutGuess was broken 4 F5 was published 5 F5 was broken 6 Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 34 / 62

  32. Steganography in JPEG Into the compressed domain Main development The past at a glance Core Reading Hide and Seek: An Introduction to Steganography by Niels Provos and Peter Honeyman, in IEEE Security & Privacy 2003. JSteg was published 1 JSteg was broken 2 OutGuess was published 3 OutGuess was broken 4 F5 was published 5 F5 was broken 6 Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 34 / 62

  33. Steganography in JPEG Into the compressed domain Main development The past at a glance Core Reading Hide and Seek: An Introduction to Steganography by Niels Provos and Peter Honeyman, in IEEE Security & Privacy 2003. JSteg was published 1 JSteg was broken 2 OutGuess was published 3 OutGuess was broken 4 F5 was published 5 F5 was broken 6 Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 34 / 62

  34. Steganography in JPEG JSteg and OutGuess 0.1 Outline Overview 1 Image Representation 2 Alternatives to RGB The blockwise DCT domain 3 Compression Downsampling Quantisation Source Coding Steganography in JPEG 4 Into the compressed domain JSteg and OutGuess 0.1 Steganalysis F3 – 4 – 5 The JPEG toolbox 5 Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 35 / 62

  35. Steganography in JPEG JSteg and OutGuess 0.1 The JSteg algorithm JSteg denotes a software package. Approach: simple LSB in the DCT domain. No different from LSB in the spatial domain χ 2 analysis applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 36 / 62

  36. Steganography in JPEG JSteg and OutGuess 0.1 Pseudocode The JSteg algorithm Input: Image I , Message � m Output: Image J for each bit b of � m c := next DCT coefficient from I while c = 0 or c = 1, c := next DCT coefficient from I end while c := c mod 2 + b replace coefficient in I by c end for May ignore high and/or low frequency coefficients Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 37 / 62

  37. � � � � � � � � Steganography in JPEG JSteg and OutGuess 0.1 Bitflips in JSteg − 5 − 4 − 3 − 2 − 1 + 1 + 2 + 3 + 4 + 5 Cover 0 � � � � � �������� � � �������� � � �������� � � �������� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � Stego − 5 + 1 + 2 + 3 + 4 + 5 − 4 − 3 − 2 − 1 0 Typical JPEG. Typical JSteg. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 38 / 62

  38. Steganography in JPEG JSteg and OutGuess 0.1 Pros and Cons Why is JSteg important? First publicly available solution. Simple solution What are the disadvantages? Similar to LSB in Spatial domain. Histogramme analysis applies χ 2 /pairs of values applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 39 / 62

  39. Steganography in JPEG JSteg and OutGuess 0.1 Pros and Cons Why is JSteg important? First publicly available solution. Simple solution What are the disadvantages? Similar to LSB in Spatial domain. Histogramme analysis applies χ 2 /pairs of values applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 39 / 62

  40. Steganography in JPEG JSteg and OutGuess 0.1 Pros and Cons Why is JSteg important? First publicly available solution. Simple solution What are the disadvantages? Similar to LSB in Spatial domain. Histogramme analysis applies χ 2 /pairs of values applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 39 / 62

  41. Steganography in JPEG JSteg and OutGuess 0.1 Pros and Cons Why is JSteg important? First publicly available solution. Simple solution What are the disadvantages? Similar to LSB in Spatial domain. Histogramme analysis applies χ 2 /pairs of values applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 39 / 62

  42. Steganography in JPEG JSteg and OutGuess 0.1 Pros and Cons Why is JSteg important? First publicly available solution. Simple solution What are the disadvantages? Similar to LSB in Spatial domain. Histogramme analysis applies χ 2 /pairs of values applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 39 / 62

  43. Steganography in JPEG JSteg and OutGuess 0.1 Pros and Cons Why is JSteg important? First publicly available solution. Simple solution What are the disadvantages? Similar to LSB in Spatial domain. Histogramme analysis applies χ 2 /pairs of values applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 39 / 62

  44. Steganography in JPEG JSteg and OutGuess 0.1 Pros and Cons Why is JSteg important? First publicly available solution. Simple solution What are the disadvantages? Similar to LSB in Spatial domain. Histogramme analysis applies χ 2 /pairs of values applies Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 39 / 62

  45. Steganography in JPEG JSteg and OutGuess 0.1 Outguess 0.1 How can we improve JSteg? How did we improve LSB in the Spatial Domain? Solution Choose random coefficients from the entire image. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 40 / 62

  46. Steganography in JPEG JSteg and OutGuess 0.1 Outguess 0.1 How can we improve JSteg? How did we improve LSB in the Spatial Domain? Solution Choose random coefficients from the entire image. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 40 / 62

  47. Steganography in JPEG JSteg and OutGuess 0.1 Outguess 0.1 How can we improve JSteg? How did we improve LSB in the Spatial Domain? Solution Choose random coefficients from the entire image. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 40 / 62

  48. Steganography in JPEG JSteg and OutGuess 0.1 Pseudocode Outguess 0.1 Input: Image I , Message � m , Key k Output: Image J Seed PRNG with k for each bit b of � m c := pseudo-random DCT coefficient from I while c = 0 or c = 1, c := pseudo-random DCT coefficient from I end while c := c mod 2 + b replace coefficient in I by c end for May ignore high and/or low frequency coefficients Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 41 / 62

  49. Steganography in JPEG Steganalysis Outline Overview 1 Image Representation 2 Alternatives to RGB The blockwise DCT domain 3 Compression Downsampling Quantisation Source Coding Steganography in JPEG 4 Into the compressed domain JSteg and OutGuess 0.1 Steganalysis F3 – 4 – 5 The JPEG toolbox 5 Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 42 / 62

  50. Steganography in JPEG Steganalysis Histogramme analysis Pairs of values 1 Generalised χ 2 works Symmetry 2 Embedding exchange + 2 ↔ + 3 and − 2 ↔ − 1. The DCT histogramme is expected to be symmetric Outguess/JSteg destroy the symmetry. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 43 / 62

  51. Steganography in JPEG Steganalysis Symmetry analysis � 1 − q � I 2 i + q J 2 i = 2 I 2 i + 1 , 2 J 2 i + i = q � 1 − q � 2 I 2 i + I 2 i + 1 2 Writing a = 1 − q / 2 b = q / 2 1 − q , and 1 − q we get I 2 i = aJ 2 i − bJ 2 i + 1 , I 2 i + 1 = − bJ 2 i + aJ 2 i + 1 . Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 44 / 62

  52. Steganography in JPEG Steganalysis Symmetry analysis (II) � � � � I 2 i = I 2 i , and I 2 i + 1 = I 2 i + 1 . i > 0 i < 0 i < 0 i > 0 In other words � � � � I 2 i + I 2 i + 1 = I 2 i + I 2 i + 1 . i > 0 i < 0 i < 0 i > 0 Substitute for I 2 i and J 2 i + 1 One equation in one unknown : q Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 45 / 62

  53. Steganography in JPEG Steganalysis Exercise Symmetry analysis � � � � I 2 i + I 2 i + 1 = I 2 i + I 2 i + 1 . i > 0 i < 0 i < 0 i > 0 Substitute for I 2 i and I 2 i + 1 get equation in J 2 i and J 2 i + 1 . Solve for J 1 , write as equation in J 1 (left hand side) ∆ i = J 2 i − J 2 i + 1 ( i > 0), and ∆ i = J 2 i + 1 − J 2 i ( i < 0). Solve for q Can you implement the resulting expression for p in Matlab? Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 46 / 62

  54. Steganography in JPEG F3 – 4 – 5 Outline Overview 1 Image Representation 2 Alternatives to RGB The blockwise DCT domain 3 Compression Downsampling Quantisation Source Coding Steganography in JPEG 4 Into the compressed domain JSteg and OutGuess 0.1 Steganalysis F3 – 4 – 5 The JPEG toolbox 5 Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 47 / 62

  55. Steganography in JPEG F3 – 4 – 5 Improvements at a glance F3 – F4 changes the embedding better histogramme – maintain symmetry Statistics-aware embedding Outguess 0.2 uses unused capacity dummy changes are used to even out the statistics Matrix coding/wet paper coding F5 minimises distortion using coding theory fewer bit-flips per message bit techniques from coding for restricted memory Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 48 / 62

  56. � � � � � � � � � � � � � � � � � � � � Steganography in JPEG F3 – 4 – 5 Bitflips in F3 Avoid pairs of values. Always decrease absolute value when changing Zeros are ignored. Zero created: reembed in new coefficient Cover − 5 − 4 − 3 − 2 − 1 0 + 1 + 2 + 3 + 4 + 5 � � � � � � � � � � � �������� �������� �������� �������� �������� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � Stego − 5 − 4 − 3 − 2 − 1 + 1 + 2 + 3 + 4 + 5 0 Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 49 / 62

  57. Steganography in JPEG F3 – 4 – 5 The problem of F3 Reembedding Zero created by message zeroes Zeros are reembedded Extra zeros embedded ⇒ overweight of even coefficients. Typical JPEG. Typical F3. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 50 / 62

  58. � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � Steganography in JPEG F3 – 4 – 5 F4 : evening out even values Swap interpretation for negative coefficients +1 causes reembedding of zero -1 causes reembedding of one − 5 + 1 + 2 + 3 + 4 + 5 Cover − 4 − 3 − 2 − 1 0 � � � � � � � � � � � �������� �������� �������� �������� �������� � � � � � � � � � � F3 � � � � � � � � � � � � � � � � � � � � Stego − 5 − 4 − 3 − 2 − 1 0 + 1 + 2 + 3 + 4 + 5 − 5 + 1 + 2 + 3 + 4 + 5 Cover − 4 − 3 − 2 − 1 0 � � � � � � � � � � � �������� � �������� �������� �������� �������� � � � � � � � � � � F4 � � � � � � � � � � � � � � � � � � � � � � Stego − 5 − 4 − 3 − 2 − 1 + 1 + 2 + 3 + 4 + 5 0 Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 51 / 62

  59. Steganography in JPEG F3 – 4 – 5 F4 histogramme What does the histogramme look like after F4 embedding? Coefficients have generally been decreased. Effect similar to reduced quality factor. F4 (and F5) can be broken Suggested Reading Jessica Fridrich, Miroslav Goljan, Dorin Hogea: ‘Steganalysis of JPEG Images: Breaking the F5 Algorithm’. http: //www.ws.binghamton.edu/fridrich/Research/F5.pdf Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 52 / 62

  60. Steganography in JPEG F3 – 4 – 5 F4 histogramme What does the histogramme look like after F4 embedding? Coefficients have generally been decreased. Effect similar to reduced quality factor. F4 (and F5) can be broken Suggested Reading Jessica Fridrich, Miroslav Goljan, Dorin Hogea: ‘Steganalysis of JPEG Images: Breaking the F5 Algorithm’. http: //www.ws.binghamton.edu/fridrich/Research/F5.pdf Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 52 / 62

  61. Steganography in JPEG F3 – 4 – 5 F4 histogramme What does the histogramme look like after F4 embedding? Coefficients have generally been decreased. Effect similar to reduced quality factor. F4 (and F5) can be broken Suggested Reading Jessica Fridrich, Miroslav Goljan, Dorin Hogea: ‘Steganalysis of JPEG Images: Breaking the F5 Algorithm’. http: //www.ws.binghamton.edu/fridrich/Research/F5.pdf Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 52 / 62

  62. Steganography in JPEG F3 – 4 – 5 F4 histogramme What does the histogramme look like after F4 embedding? Coefficients have generally been decreased. Effect similar to reduced quality factor. F4 (and F5) can be broken Suggested Reading Jessica Fridrich, Miroslav Goljan, Dorin Hogea: ‘Steganalysis of JPEG Images: Breaking the F5 Algorithm’. http: //www.ws.binghamton.edu/fridrich/Research/F5.pdf Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 52 / 62

  63. Steganography in JPEG F3 – 4 – 5 F5 : Matrix embedding Embedding as F4 . . . extra Matrix Coding layer n coefficients represent k bits Flip fewer k / 2 bits on average. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 53 / 62

  64. Steganography in JPEG F3 – 4 – 5 Example Matrix embedding n = 3 coefficients (LSB): x 1 , x 2 , x 3 k = 2 message bits: m 1 , m 2 Decoder ˆ m 1 = x 1 ⊕ x 3 ˆ m 2 = x 2 ⊕ x 3 Encoder m 1 = x 1 ⊕ x 3 and m 2 = x 2 ⊕ x 3 : no change m 1 � = x 1 ⊕ x 3 and m 2 = x 2 ⊕ x 3 : change x 1 m 1 = x 1 ⊕ x 3 and m 2 � = x 2 ⊕ x 3 : change x 2 m 1 � = x 1 ⊕ x 3 and m 2 � = x 2 ⊕ x 3 : change x 3 Averange number of changes: 3 / 4 per two bits Compare to F4 (and others): 1 per two bits Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 54 / 62

  65. Steganography in JPEG F3 – 4 – 5 Example Matrix embedding n = 3 coefficients (LSB): x 1 , x 2 , x 3 k = 2 message bits: m 1 , m 2 Decoder ˆ m 1 = x 1 ⊕ x 3 ˆ m 2 = x 2 ⊕ x 3 Encoder m 1 = x 1 ⊕ x 3 and m 2 = x 2 ⊕ x 3 : no change m 1 � = x 1 ⊕ x 3 and m 2 = x 2 ⊕ x 3 : change x 1 m 1 = x 1 ⊕ x 3 and m 2 � = x 2 ⊕ x 3 : change x 2 m 1 � = x 1 ⊕ x 3 and m 2 � = x 2 ⊕ x 3 : change x 3 Averange number of changes: 3 / 4 per two bits Compare to F4 (and others): 1 per two bits Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 54 / 62

  66. Steganography in JPEG F3 – 4 – 5 Example Matrix embedding n = 3 coefficients (LSB): x 1 , x 2 , x 3 k = 2 message bits: m 1 , m 2 Decoder ˆ m 1 = x 1 ⊕ x 3 ˆ m 2 = x 2 ⊕ x 3 Encoder m 1 = x 1 ⊕ x 3 and m 2 = x 2 ⊕ x 3 : no change m 1 � = x 1 ⊕ x 3 and m 2 = x 2 ⊕ x 3 : change x 1 m 1 = x 1 ⊕ x 3 and m 2 � = x 2 ⊕ x 3 : change x 2 m 1 � = x 1 ⊕ x 3 and m 2 � = x 2 ⊕ x 3 : change x 3 Averange number of changes: 3 / 4 per two bits Compare to F4 (and others): 1 per two bits Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 54 / 62

  67. Steganography in JPEG F3 – 4 – 5 Example Matrix embedding n = 3 coefficients (LSB): x 1 , x 2 , x 3 k = 2 message bits: m 1 , m 2 Decoder ˆ m 1 = x 1 ⊕ x 3 ˆ m 2 = x 2 ⊕ x 3 Encoder m 1 = x 1 ⊕ x 3 and m 2 = x 2 ⊕ x 3 : no change m 1 � = x 1 ⊕ x 3 and m 2 = x 2 ⊕ x 3 : change x 1 m 1 = x 1 ⊕ x 3 and m 2 � = x 2 ⊕ x 3 : change x 2 m 1 � = x 1 ⊕ x 3 and m 2 � = x 2 ⊕ x 3 : change x 3 Averange number of changes: 3 / 4 per two bits Compare to F4 (and others): 1 per two bits Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 54 / 62

  68. Steganography in JPEG F3 – 4 – 5 Matrix coding Longer codewords (larger n ) saves more e.g. k = 9; n = 511: change ≈ 1 / 9 pixels per message bit Matrix embedding based on coding theory We will return to coding theory and matrix coding later Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 55 / 62

  69. Steganography in JPEG F3 – 4 – 5 Statistics-aware embedding Outguess 0.2 Modify unused coefficients Mimick original statistic Tune for every statistic used in known analysis techniques OutGuess 0.2 Embedding as OutGuess 0.1. Modify selected unused coefficients to correct histogram Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 56 / 62

  70. Steganography in JPEG F3 – 4 – 5 Statistics-aware embedding Outguess 0.2 Modify unused coefficients Mimick original statistic Tune for every statistic used in known analysis techniques OutGuess 0.2 Embedding as OutGuess 0.1. Modify selected unused coefficients to correct histogram Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 56 / 62

  71. Steganography in JPEG F3 – 4 – 5 Statistics-aware embedding Outguess 0.2 Modify unused coefficients Mimick original statistic Tune for every statistic used in known analysis techniques OutGuess 0.2 Embedding as OutGuess 0.1. Modify selected unused coefficients to correct histogram Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 56 / 62

  72. Steganography in JPEG F3 – 4 – 5 Statistics-aware embedding Outguess 0.2 Modify unused coefficients Mimick original statistic Tune for every statistic used in known analysis techniques OutGuess 0.2 Embedding as OutGuess 0.1. Modify selected unused coefficients to correct histogram Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 56 / 62

  73. Steganography in JPEG F3 – 4 – 5 Statistics-aware embedding Outguess 0.2 Modify unused coefficients Mimick original statistic Tune for every statistic used in known analysis techniques OutGuess 0.2 Embedding as OutGuess 0.1. Modify selected unused coefficients to correct histogram Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 56 / 62

  74. Steganography in JPEG F3 – 4 – 5 Statistics-aware embedding Outguess 0.2 Modify unused coefficients Mimick original statistic Tune for every statistic used in known analysis techniques OutGuess 0.2 Embedding as OutGuess 0.1. Modify selected unused coefficients to correct histogram Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 56 / 62

  75. Steganography in JPEG F3 – 4 – 5 Combinations Statistics-aware Matrix Coding More advanced code allows a choice of coefficient to modify Use choice to mimick original statistical distribution Known as Wet Paper Codes Based on Dirty Paper Codes by Costa 1983. Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 57 / 62

  76. The JPEG toolbox Outline Overview 1 Image Representation 2 Alternatives to RGB The blockwise DCT domain 3 Compression Downsampling Quantisation Source Coding Steganography in JPEG 4 Into the compressed domain JSteg and OutGuess 0.1 Steganalysis F3 – 4 – 5 The JPEG toolbox 5 Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 58 / 62

  77. The JPEG toolbox JPEG Toolbox Reading a JPEG image » im = jpeg_read ( ’Kerckhoffs.jpg’ ) im = image_width: 180 image_height: 247 image_components: 3 image_color_space: 2 jpeg_components: 3 jpeg_color_space: 3 comments: {} coef_arrays: {[248x184 double] [128x96 double] [128x96 quant_tables: {[8x8 double] [8x8 double]} ac_huff_tables: [1x2 struct] dc_huff_tables: [1x2 struct] optimize_coding: 0 comp_info: [1x3 struct] progressive_mode: 0 » Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 59 / 62

  78. The JPEG toolbox JPEG Toolbox JPEG data » Xy = im.coef_arrays{im.comp_info(1).component_id} ; » whos Xy Name Size Bytes Class Attributes Xy 248x184 365056 double » Q = im.quant_tables{im.comp_info(1).quant_tbl_no} Q = 6 4 4 6 10 16 20 24 5 5 6 8 10 23 24 22 6 5 6 10 16 23 28 22 6 7 9 12 20 35 32 25 7 9 15 22 27 44 41 31 10 14 22 26 32 42 45 37 20 26 31 35 41 48 48 40 29 37 38 39 45 40 41 40 » Dr Hans Georg Schaathun The DCT domain and JPEG Spring 2008 60 / 62

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend