Escolar Documentos
Profissional Documentos
Cultura Documentos
Documentos Digitais
Organizao
Avisos
Aulas
Slides em Ingls
Apresentados previamente no IEEE CVPR
Workshop on Vision of the Unseen (WVU),
2008, Anchorage, Alaska
Organizao
Mascaramento de Informaes (Information
Hiding)
Summary
Steganography
LSB insertion/modification
FFTs and DCTs
Summary
Steganalysis
Aural
Structural
Statistical
Summary
Steganography
Hiding scenario
10
Steganography
11
Steganography
12
Steganography
12
Steganography
Compression
12
Steganography
Compression
Filtering
12
Steganography
Compression
Filtering
Conversions
12
Steganography
Compression
Filtering
Conversions
MSB-based techniques
12
Steganography techniques
LSB insertion/modification
13
Steganography techniques
LSB insertion/modification
14
Steganography techniques
2. Block tweaking
3. Coefficient selection
4. Wavelets
15
Steganography techniques
2.
3.
4.
5.
16
Steganography techniques
JSteg
17
Steganography techniques
18
Steganography techniques
Outguess
19
Steganography techniques
20
Steganography techniques
21
Steganography techniques
Coefficient selection
22
Steganography techniques
Wavelets
23
Steganography techniques
Kerckhoffs Principle
Destruction of the original
Statistical profiling
24
Steganography techniques
Structural profiling
Split the information
Compaction
25
Steganalysis
26
Steganalysis
27
Steganalysis
Steganalysis attacks
1. Aural
2. Structural
3. Statistical
28
Statistical Steganalysis
Analysis
29
Statistical Steganalysis
Analysis
30
Statistical Steganalysis
Analysis
31
Statistical Steganalysis
Analysis
Probability of hiding
32
Statistical Steganalysis
Analysis
Low-order statistics
33
Statistical Steganalysis
RS Analysis (RS)
34
Statistical Steganalysis
RS Analysis (RS)
35
Statistical Steganalysis
RS Analysis (RS)
36
Statistical Steganalysis
RS Analysis (RS)
Identity function
37
Statistical Steganalysis
RS Analysis (RS)
38
Statistical Steganalysis
RS Analysis (RS)
Apply the functions over the groups for M and M masks. Classify them as
Regular.
Singular.
Unusable.
39
Statistical Steganalysis
RS Analysis (RS)
It holds that
Statistical hypothesis
40
Statistical Steganalysis
The I(n)s GE is
41
Statistical Steganalysis
42
Statistical Steganalysis
43
Statistical Steganalysis
44
Statistical Steganalysis
3.
Find
4.
5.
GE(0) is based on
45
Statistical Steganalysis
46
Statistical Steganalysis
QMF decomposition
A. Rocha, 2012 Anlise Forense de Documentos Digitais
47
Statistical Steganalysis
48
Statistical Steganalysis
49
Statistical Steganalysis
50
Statistical Steganalysis
51
Statistical Steganalysis
52
Statistical Steganalysis
53
Statistical Steganalysis
Supervised learning
Training set of stego and clean images
LDA and SVMs
54
Statistical Steganalysis
55
Statistical Steganalysis
IQMs
Multivariate regression analysis (ANOVA)
Exploits Steganographic schemes artifacts
56
Statistical Steganalysis
IQMs
1. Mean absolute error
2. Czekznowski correlation
3. Image fidelity
4. HVS error
5. etc
57
Statistical Steganalysis
y1
y2
yN
58
Statistical Steganalysis
59
Statistical Steganalysis
Four stages
1. Randomization process
2. Feature regions selection
3. Statistical descriptors analysis
4. Invariance
60
Statistical Steganalysis
Let X be a Bernoulli RV
Transformation T(I,p)
61
Statistical Steganalysis
{Oij }
i = 0 . . . n,
j = 1 . . . r.
= {O01 , . . . , Onr }.
i = 0 . . . n,
j = 1 . . . r,
k = 1 . . . m.
dijk
d0jk
"
i = 0 . . . n,
j = 1 . . . r,
k = 1 . . . m.
62
Statistical Steganalysis
Randomization stage
63
Statistical Steganalysis
64
Statistical Steganalysis
65
Statistical Steganalysis
Invariance stage
66
Statistical Steganalysis
Classification stage
67
Statistical Steganalysis
68
69
EzStego
Stego Online
Mandelsteg
Stealth
70
White Noise
S-Tools
Hide and Seek
JSteg
Outguess
71
Camaleo
www.ic.unicamp.br/~rocha/sci/stego
A. Rocha, 2012 Anlise Forense de Documentos Digitais
72
Interesting
research topics
73
Steganography
74
Steganography
75
Steganography
Good IQMs
Public key systems
Multiple embeddings with no interference
76
Steganalysis
Blind detection
Very small embedding detection
Adaptive techniques
Hidden content recovery
77
Conclusions
78
Conclusions
79
Conclusions
80
Conclusions
Nowadays...
Applications
Research opportunities
81
Conclusions
...
A. Rocha, 2012 Anlise Forense de Documentos Digitais
82
Steg in
real world
83
Obrigado!