Statistical Models for Steganography - uni

Download Report

Transcript Statistical Models for Steganography - uni

Statistical models for
Secure Steganography
Systems
N.Muthiyalu Jothir
Media Informatics
7/18/2015
DRM Seminar
1
Agenda
Introduction
 Steganography
 Information theory
 Security Model
 Limitations
 Conclusion

7/18/2015
DRM Seminar
2
Introduction

“Steganography is the art and science of
writing hidden messages in such a way
that no one apart from the intended
recipient knows of the existence of the
message”

“Covered or Hidden Writing”
7/18/2015
DRM Seminar
3
Steganography Vs Cryptography

Steganography is the dark cousin of
cryptography, the use of codes.

Cryptography  Privacy

Steganography  Secrecy
7/18/2015
DRM Seminar
4
Digital Still Images

Larger the cover message – Easier to hide
message

For example: a 24-bit bitmap image will have 8
bits representing each of the three color values
(R,G,B)

Watermarking, Fingerprinting etc.
7/18/2015
DRM Seminar
5
Information Theory

“The fundamental problem of
communication is that of reproducing at
one point either exactly or approximately a
message selected at another point.”
-C.E. Shannon, 1948
7/18/2015
DRM Seminar
6
Information Theory …cont

According to Shannon, the entropy of a random variable X with
probability distribution PX and alphabet ‫ א‬is defined as

indicates the amount of information contained in x, i.e., the number of
bits needed to code x.

For example, in an image with uniform distribution of gray-level
intensity, i.e. Px = 1/256, then the number of bits needed to code each
gray level is 8 bits. The entropy of this image is 8.
7/18/2015
DRM Seminar
7
…cont

Information  "only infrmatn esentil fo
understandn mst b tranmitd."

The amount of information, or uncertainty, output
by an information source is a measure of its
entropy.

In turn, a source's entropy determines the
amount of bits per symbol required to encode
the source's information.
7/18/2015
DRM Seminar
8
Relative Entropy

Let p and q be two probability distributions on a
common alphabet X. Relative entropy / Kullback
Leibler “distance” between p and q is defined as

D(p || q) is a measure of the inefficiency of assuming
that the distribution is q when the true distribution is p.
7/18/2015
DRM Seminar
9
Security Model : Proposed

An information-theoretic model

Presence of passive adversaries

“Simmons' Prisoners‘ Problem"

“Hypothesis” testing problem
7/18/2015
DRM Seminar
10
Active adversaries

Presence of hidden message is known
Publicly

E.g., Watermarking and Fingerprinting.
7/18/2015
DRM Seminar
11
Scenario with Passive Adversaries

Players  Alice and Bob

Passive Adversary  Eve

“Cover Text, C”  Original, unaltered message

“Stegotext, S”  Transformed message using
Secret Key.
7/18/2015
DRM Seminar
12
Hypothesis testing
Eve, the decision maker
7/18/2015
DRM Seminar
13
Model

The security of a steganographic system is
quantified in terms of the relative entropy
D(PC | PS) (or discrimination) between PC
and PS.

D(PC | PS) = 0  stego system is perfectly
secure
7/18/2015
DRM Seminar
14
Security System
7/18/2015
DRM Seminar
15
Observations

H(S / CEKR) = 0  Certainty

H(E) > 0  Uncertainty

H(E / SK) = 0  Certainty
7/18/2015
DRM Seminar
16
…cont

Alice is inactive  she sends cover text C

Active  S is a concatenation of multiple
messages from Alice

The probability distributions of cover text
(Pc) are assumed to be known to all
parties
7/18/2015
DRM Seminar
17
Security Definition

Definition 1 :
A stegosystem as defined previously with cover
text C and stegotext S is called Є – secure
against passive adversaries if
D(PC|PS) ≤ Є

If Є = 0, the stegosystem is called perfectly
secure.
7/18/2015
DRM Seminar
18
Eve's decision process
Binary partition (C0, C1) of the set C of
possible cover texts
 Alice is active if and only if the observed
message ‘c’ is contained in C1.
 Type II error  Eve fails to detect

 Probability

β
Type I error  Eve accuses Alice when
she is inactive.
 Probabilty
7/18/2015
ά. Assumed to be zero.
DRM Seminar
19
Theorem

The stegosystem that is Є-secure against
passive adversaries, satisfy
d(ά, β) ≤ Є

In particular, if ά = 0, then
β = 2-Є
7/18/2015
DRM Seminar
20
…cont

In a perfectly secure system,
D(PC|PS) = 0  PC = PS;
Thus, Eve can obtain no information about
whether Alice is active by observing the
message.
7/18/2015
DRM Seminar
21
External Information Influence

The modified stegosystem with external
information Y , cover text C, and stegotext
S is called Є - secure against passive
adversaries if
D(PC|Y |PS|Y ) ≤ Є
7/18/2015
DRM Seminar
22
One-time pad

Security  The stegotext distribution is close to the
cover text distribution without knowledge of the key.

Cover text C is a uniformly distributed n-bit string

The key generator chooses the n-bit key K

S=e
7/18/2015
K and Bob can decode by computing e = S
DRM Seminar
K
23
Security of One Time Pad




Uniformly distributed in the set of n-bit strings and
therefore D(PC|PS) = 0.
Perfect steganographic security
One-time pad system is equivalent to the basic scheme
of visual cryptography
But,
Wardens never allow random messages  Drawback
7/18/2015
DRM Seminar
24
Universal Data Compression

Traditional data compression techniques
Huffman coding
 require a priori knowledge about the distribution of the
data


Universal data compression algorithms
Lempel and Ziv
 source statistics are unknown a priori or vary with time

7/18/2015
DRM Seminar
25
Willems' Repetition algorithm
Parameters  block length L and delay D
 Binary source X producing {Xt} = X1, X2,…
with values in {0,1}.
 Source output is divided into blocks Y1,
Y2… of length L
 Encoding of a block Yt operates by
considering


7/18/2015
Repetition time, the length of the interval since its last
occurrence.
DRM Seminar
26
…cont

Repetition time is encoded using the following
code

where || denotes the concatenation of the bit
strings.
7/18/2015
DRM Seminar
27
The Modification for Information
Hiding

Information hiding takes place if the encoder
or the decoder encounters a block y such that
ty ≥ 1/ρ

If this is the case, bit j of the message m is
embedded in y’ according to
7/18/2015
DRM Seminar
28
Limitations

Embedding distortion DEmb can be large for
the same secure statistics

Future work by Joachim and Bernd,
address the above issue.
7/18/2015
DRM Seminar
29
Conclusion
A security model has been proposed
 Forms the basis for the hypothetical
testing scenario
 Security of the Steganography system
depends on the relative entropy between
C and S.

7/18/2015
DRM Seminar
30
References
1.
Christian Cachin, “An Information - Theoretic Model for
Steganography”, Cambridge, 1998.
2.
Joachim, Bernd, “A Communications Approach to
Image Steganography”, Proceedings of SPIE, Jan
2002.
7/18/2015
DRM Seminar
31
Thank You…
7/18/2015
DRM Seminar
32