Uploaded on:
Slide 1

Part 1 3 : Steganography and Watermarking One of the most essential property of (advanced) data is that it is on a fundamental level simple to create and convey boundless number of its duplicates. This may undermine the music, film, book and programming ventures and along these lines it brings an assortment of critical issues concerning the insurance of the scholarly and generation rights that severely should be tackled. The way that a boundless number of flawless duplicates of content, sound and video information can be wrongfully created and circulated requires to study methods for inserting copyright data and serial numbers in sound and video information. Steganography and watermarking bring an assortment of essential methods how to cover up imperative data in an imperceptible and additionally irremovable path in sound and video information. Steganography and watermarking are primary parts of the quick creating territory of data concealing . IV054 Steganography and Watermarking

Slide 2

IV054 INFORMATION HIDING SUBDISCIPLINES Covert directs , particularly in working frameworks and systems. They are correspondence ways that were neither composed nor expected to exchange data by any means, however are utilized that way. These channels are commonly utilized by dishonest projects to hole data to their proprietor while performing administration for another program. Obscurity is discovering approaches to stow away meta substance of the message (for instance the sender or potentially the beneficiaries of the message). Obscurity is need when making on-line voting or to conceal access to some pages, or to shroud sender. Steganography - secured composing – from Greek stegan-x graf-ein Watermarking - unmistakable computerized watermarks furthermore indistinct (undetectable, transparent,....) watermarks . Steganography and Watermarking

Slide 3

IV054 COVERT CHANNELS Covert channels are correspondence ways that were neither planned nor expected to exchange data by any stretch of the imagination, however are utilized that way, utilizing substances that were not proposed for such utilize . Such diverts regularly happen in multilevel working frameworks in which security in view of accessibility of a few levels of security. Illustration . Let A be a procedure fit to compose on a harddisk and B be a procedure of a lower security level that can\'t read information from that harddisk, however has an entrance to the comparing record designation table. All that makes a potential cover direct in which prepare A can transmit data to B by composing this data utilizing names of documents and their size on harddisk what can the procedure B read utilizing the record portion table to which B has a get to. Steganography and Watermarking

Slide 4

IV054 STEGANOGRAPHY as opposed to WATERMARKING Differences amongst steganography and watermarking are both unobtrusive and fundamental. The primary objective of steganography is to shroud a message m in some sound or video (cover) information d , to acquire new information d\' , for all intents and purposes unclear from d , by individuals, in a manner that a busybody can\'t identify the nearness of m in d\' . The fundamental objective of watermarking is to conceal a message m in some sound or video (cover) information d , to get new information d\' , for all intents and purposes unclear from d , by individuals, in a manner that a meddler can\'t expel or supplant m in d\' . It is likewise frequently said that the objective of steganography is to conceal a message in coordinated correspondences and the objective of watermarking is to shroud message in one-to-numerous interchanges . In a matter of seconds, one can say that cryptography is in regards to ensuring the substance of messages, steganography is about disguising its extremely presence. Steganography strategies typically don\'t have to give solid security against expelling or alteration of the shrouded message. Watermarking techniques need to be exceptionally powerful to endeavors to evacuate or alter a shrouded message. Steganography and Watermarking

Slide 5

IV054 APPLICATIONS of STEGANOGRAPHY To have secure mystery correspondences where cryptographic encryption techniques are not accessible. To have secure mystery correspondence where solid cryptography is outlandish. At times, for instance in military applications, even the learning that two gatherings convey can be of vast significance. The medicinal services, and particularly therapeutic imaging frameworks, may especially profit by data concealing procedures. Steganography and Watermarking

Slide 6

IV054 APPLICATIONS of WATERMARKING A prevalent use of watermarking procedures is to give a proof of responsibility for information by installing copyright articulations into video or picture computerized items. Different applications include: Automatic observing and following of duplicate compose material on WEB. (For instance, a robot scans the Web for checked material and accordingly recognizes potential unlawful issues.) Automatic review of radio transmissions: (A robot can "tune in" to a radio station and search for imprints, which show that a specific bit of music, or notice , has been communicate.) Data enlargement - to include data for the advantage of people in general. Fingerprinting applications (with a specific end goal to recognize conveyed information) Actually, watermarking has as of late developed as the main innovation to tackle the above imperative issues. All sort of information can be watermarked: sound, pictures, video, organized content, 3D models, display movement parameters, … Steganography and Watermarking

Slide 7

IV054 Steganography/Watermarking versus Cryptography The motivation behind both is to give mystery correspondence. Cryptography shrouds the substance of the message from an aggressor, yet not the presence of the message. Steganography/watermarking even conceal the very presence of the message in the conveying information. Thus, the idea of breaking the framework is diverse for cryptosystems and stegosystems (watermarking frameworks) . A cryptographic framework is broken when the aggressor can read the discharge message. Breaking of a steganographic/watermarking framework has two phases: -The assailant can recognize that steganography/watermarking has been utilized; -The aggressor can read, change or expel the shrouded message. A steganography/watermarking framework is considered as unreliable as of now if the identification of steganography/watermarking is conceivable. Steganography and Watermarking

Slide 8

IV054 FIRST STEGANOGRAPHIC METHODS Ancient Chinese composed messages on fine silk, which was then crunched into a minor ball and canvassed in wax. The ambassador then gulped the chunk of wax. In the sixteenth century, the Italian researcher Giovanni Porta depicted how to disguise a message inside a hard-bubbled egg by making an ink from a blend of one ounce of alum and a half quart of vinegar, and afterward utilizing ink to compose on the shell. The ink infiltrated the permeable shell, and left the message on the surface of the solidified egg whites, which could be perused just when the shell was evacuated. Extraordinary "inks" were imperative steganographic apparatuses notwithstanding amid Second World War. Amid Second World War a method was produced to shrivel photographically a page of content into a speck short of what one millimeter in breadth, and after that conceal this microdot in a clearly harmless letter. (The primary microdot has been seen by FBI in 1941.) Steganography and Watermarking

Slide 9

IV054 HISTORY of MICRODOTS In 1857, Brewster recommended concealing mystery messages "in spaces not bigger than a full stop or little speck of ink". In 1860 the issue of making little pictures was understood by French picture taker Dragon. Amid Franco-Prussian war (1870-1881) from assaulted Paris messages were sent on microfilms utilizing pigeon post. Amid Russo-Japanese war (1905) infinitesimal pictures were covered up in ears, nostrils, and under fingernails. Amid First World War messages to and from spies were lessened to microdots, by a few phases of photographic diminishment and after that stuck on top of printed periods or commas (in harmless cover materials, for example, magazines). Steganography and Watermarking

Slide 10

IV054 FIRST STEGANOGRAPHY BOOKS An assortment of strategies was utilized as of now as a part of Roman circumstances and after that in 15-16 century (extending from coding messages in music, and string bunches to imperceptible inks). In 1499 Johannes Trithemius, opat from Würzburg, composed 3 out of arranged 8 books "Steganographia". ??{Description of letters-words and systems+methods reminding telepathy.} In 1518 Trithemius printed 6 books, 540 pages, on cryptography and steganography. Books\' title: Polygraphiae . This is Trithemius\' most famous work. It incorporates an advanced arrangement of steganography, and in addition heavenly attendant enchantment. It likewise contains an amalgamation of the art of information, the specialty of memory, enchantment, a quickened dialect learning framework, and a technique for sending messages without images or messenger.???? In 1665 Gaspari Schotti distributed the book "Steganographica", 400pages. (New presentation of Trithemius.) Steganography and Watermarking

Slide 11

IV054 TRITHEMIUS Born on February 2, 1462 and considered as one of the fundamental scholarly of his time. His book STEGANOGRAPHIA was distributed in 1606. In 1609 catholic church has put the book on the rundown of taboo books (to be there for over 200 years). His books are clouded by his solid faith in mysterious forces. He characterized witches into four classes. He settled production of the world at 5206 B.C. He depicted how to perform clairvoyance. Trithemius kicked the bucket on December 14, 1516. Steganography and Watermarking

Slide 12

IV054 GENERAL STEGANOGRAPHIC MODEL A general model of a cryptographic framework has as of now developed. Figure 1: Model of steganographic frameworks Steganographic calculations are all in all in light of supplanting clamor segment of an advanced question with a to-be-concealed message. Kirchoffov standard holds additionally for steganography. Security of the framework ought not be founded on stowing away inserting calculation, but rather on concealing the key. Steganography and Watermarking

Slide 13


View more...