Sunday, August 31, 2008

An Implementation of Key-Based Digital Signal Steganography

Author: Toby Sharp

Information Hiding Workshop 2001
Pittsburgh, PA, USA, April 25–27, 2001

Spring LNCS 2137, pp. 13-26, 2001

Abstract
A real-life requirement motivated this case study of secure covert communication. An independently researched process is described in detail with an emphasis on implementation issues regarding digital images. A scheme using stego keys to create pseudorandom sample sequences is developed. Issues relating to using digital signals for steganography are explored. The terms modified remainder and unmodified remainder are defined. Possible attacks are considered in detail from passive wardens and methods of defeating such attacks are suggested. Software implementing the new ideas is introduced, which has been successfully developed, deployed and used for several years without detection.

在談論這篇論文所使用的嵌入技術之前, 必須要先弄清楚 Pseudo-Random Sequence Generator 的運作方式。作者運用一個 Linear Feedback Shift Register (LFSR) 及使用傳訊者(sender) 和接收者(receiver) 所共同擁有的 stego-key 來建立與初始化這個 LFSR, 產生一連串的擬隨機序列。

使用 LFSR 所產生的擬隨機序列, 就可以決定要將訊息嵌入到 cover signal 的哪些 samples 之中, 作者稱造訪次序(visiting order) 為 sample sequence。假設 cover signal 一共有 P 個 samples, 令 t = log2(P), 因此我們就可以用 LFSR 所產生的 t 個位元來代表一個數字 k , 所以, 下一個要造訪的就是第 k 個 sample。作者在論文中還提到: 如果已經嵌入 x 位元, 剩下 (P-x) samples, 因此只要使用 t' = log2(P-x) 個擬隨機位元就可以決定下一個要造訪的 sample 了。

由上面的討論我們知道 sample sequence 是和 stego-key 值相關的, stego-key 不同, 所造訪的次序就不相同。除了和 stego-key 相關, 為了讓 sample sequence 也與 cover signal 及 embedded data相關, 作者還將所造訪的 sample value 的 Most significant Bit (MSB) 及 Least Significant Bit (LSB) 分別取出, 做為下一個擬隨機次序的前兩個位元。 而 MSB 所代表的就是 sample value, LSB 所代表的就是 embedded data。

這篇論文最重要的核心嵌入技術描述在 p. 15 的最後一段:
When a sample is visited, its data value is modified so that its least significant bit (LSB) is equal to the next bit of the secret data. The LSBs are not simply replaced; instead the whole sample value is incremented or decremented if the LSBs differ. This avoids the "pairs of values" statistical attack introduced in [9]. At each sample, one operation bit is taken from the generator and, if required, is used to determine whether to increment or decrement the sample value.
很可惜地, 論文中提到的隱藏工具 Hide, 網路上已經找不到下載點了。A. WestfeldIHW 2002 年所提出的論文 "Detecting Low Embedding Rates" 中有一張執行的初始畫面(Fig. 6),

 
在本篇論文的 Fig.4 則是展示使用者介面。 
 
 

Monday, August 11, 2008

Steganography in Cuil

From StegoRN

今天在 天下知識網Podcasting 聽到一篇文章 "為什麼全世界媒體都在報導這個網站?" 原來在介紹一個新的搜尋引擎 Cuil,...



我特地搜尋了 steganography 這個關鍵字, 搜尋結果的頁面排版還包含相關圖片, 感覺還真的不錯。仔細看搜尋結果, 包含的範圍似乎還蠻廣的, 各代表類型都有, 大家可以去試試看。

Sunday, August 03, 2008

LaTeX

由於 PSIVT 2009 並不鼓勵使用 MS Word 排版論文投稿, 因此我們開始準備將論文用 LaTeX 來編輯。雖然, 自己還在當博士生的時代, 曾經用 LaTex 寫過論文, 不過至少也是 6 年多前的陳年舊事了。以前用的系統, 早就老舊不堪, 也換了電腦。因此, 兩天前我開始在網路上搜尋, 準備重新建立 LaTex 的論文編輯環境。

最早搜尋到的一篇正體中文文章是我們互動媒體實驗室的新成員 小葉老師 在博士生時代 (2003) 所寫的 LaTeX 快速入門教學, 小葉老師推薦 WinShell + MiKTeX, 因此, 問題解決了一半, 直接上網搜尋這兩個套裝軟體的相關訊息, 開始研究。

以下是一些會使用到的相關軟體的網站:

MiKTeX is an up-to-date TeX implementation for the Windows operating system...

WinShell is a free multilingual integrated development environment (IDE) for LaTeX and TeX...

Ghostscript, Ghostview and GSview

CTAN: the Comprehensive TeX Archive Network



網路上還有一些寫得很不錯的中文文章, 值得推薦給大家:

1. 大家來學 LaTeX , by 李果正 Edward G.J. Lee

2. tw.bbs.comp.tex FAQ

PSIVT 2009: The 3rd Pacific-Rim Symposium on Image and Video Technology 2009

The 3rd Pacific-Rim Symposium on Image and Video Technology 2009
Tokyo, Japan, January 13th - 16th, 2009
Official Website: http://psivt2009.nii.ac.jp/

PSIVT 2009 is the continuation of a series of successful events in Hsinchu, Taiwan in 2006 and Santiago, Chile in 2007.
The symposium provides a forum for presenting and exploring the newest research and development in image and video technology by discussing the possibilities and directions in this field, and a place where both academic research and industrial activities are presented and meet for mutual benefit.

Main Themes
1. Image Sensors and Multimedia Hardware
2. Graphics and Visualization
3. Image and Video Analysis
4. Recognition and Retrieval
5. Multi-view Imaging and Processing
6. Computer Vision Applications
7. Video Communications and Networking
8. Multimedia Processing
 Image and video watermarking, steganalysis, steganography,
 multimedia content analysis, multimedia feature extraction, etc.

Important Dates:
Submission Deadline: August 11, 2008
Notification: September 22, 2008
Camera-ready Submission: beginning of October, 2008
Symposium: January 13–16, 2009

Call for papers