Steganography and Digital Watermarking

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
(Applications)
(Applications)
Line 53: Line 53:
Since the emergence of the Internet, digital distribution of media and documents has vastly increased and is constantly increasing every year. On this note, the distribution of copyright material has always been a concern for people trying to protect their work and this is where digital watermarking can become useful. Those who are worried of people eavesdropping on their conversations by email, important documents being read, or video chat being seen by others can use steganographic techniques to protect themselves. In order to know what applications these techniques can be used for, it is best to know the different ways of implementing the techniques. Steganography and digital watermarking can be broken down into four different subcategories in which the existence of the technique is either known or unknown to the public along with the original file.  
Since the emergence of the Internet, digital distribution of media and documents has vastly increased and is constantly increasing every year. On this note, the distribution of copyright material has always been a concern for people trying to protect their work and this is where digital watermarking can become useful. Those who are worried of people eavesdropping on their conversations by email, important documents being read, or video chat being seen by others can use steganographic techniques to protect themselves. In order to know what applications these techniques can be used for, it is best to know the different ways of implementing the techniques. Steganography and digital watermarking can be broken down into four different subcategories in which the existence of the technique is either known or unknown to the public along with the original file.  
-
<center>[[Image:sandwtable.png]]<center>
+
<center>[[Image:sandwtable.png]]</center>
Covert watermarking is embedding a watermark related to the recipient of each copy of the file, but unaware that the watermark exists. Thus, if the file is leaked to third parties, the recipient who leaked the file can be traced. Covert steganography is embedding data unrelated to the original work. An overt watermark is when the presence of the watermark is known to others besides the creators, whether visually or told of the watermark. Overt steganography is similar to covert steganography in terms of the hidden information is unrelated to the signal in which it is embedded in. However with overt steganography, the information is only hidden to certain parties but visible to others, example timestamps.  
Covert watermarking is embedding a watermark related to the recipient of each copy of the file, but unaware that the watermark exists. Thus, if the file is leaked to third parties, the recipient who leaked the file can be traced. Covert steganography is embedding data unrelated to the original work. An overt watermark is when the presence of the watermark is known to others besides the creators, whether visually or told of the watermark. Overt steganography is similar to covert steganography in terms of the hidden information is unrelated to the signal in which it is embedded in. However with overt steganography, the information is only hidden to certain parties but visible to others, example timestamps.  

Revision as of 02:48, 9 April 2009

Steganography with a watermarked background.

Steganography and Digital Watermarking are both forms of information hiding where the context can be viewed as keeping the information a secret or making the information subtle respectively. Both these methods have been around for a long time, at least several centuries, however they have only gained worldwide popularity in the digital world since roughly the mid 1990s. With new technologies constantly emerging, these two methods have been used to prevent theft, prevent plagiarism, track, and hide secrets among other things. There is not one standard way of implementing these techniques and each version differs from one another. Thus, with the vast amount of applications these techniques can be applied to, many companies have made software to create and detect both techniques.

Contents

What is Steganography?

Steganography is the method of concealing the message and its very existance is a secret and only known to the person(s) who placed it. Historical steganography involved dissapearing inks and masking letters to hide the information.


While modern steganography, information hiding involves hiding data in digital media where by slightly altering the media causes a message to be embedded without anyone noticing any loss to the actual media file. Since steganography is a form of "security through obscurity", where it protects the messages and the known parties through secrecy, it is often combined with cryptography so that even if the message is found, it still cannot be read.






What is Digital Watermarking?

Digital watermarking is the process of embedding a symbol of some sort into the media file to distinguish the file from others. The embbeded watermark is meant to be permenant and follows a process in which there is alterations to the media file. Digital watermarking can be hidden or seen in plain sight by other parties.


Deciding on whether to use visible/invisible watermarking depends on the function of the media file, but with either technique, when the media file is copied the digital watermark gets copied as well. Digital watermarks are designed in such a way that they do not restrict the media file or change the media file in such a way it detracts the quality. Its main purpose is to detect misuse and act as a form of signature from the owner.





History

The word steganography was derived from the Greek words steganos, which means "covered", and graphia, which means "writing". The first recorded entry of the use of steganography is in the story of Herodotus and his slaves. Where he shaved the heads of his slaves and tattooed secret messages on their scalps. He would than let their hair grow back to hide the message and send his slaves to deliver the messages to other leaders. Since than, many early proposed steganographic techniques have been created from hiding messages in jewelery, to modifying letter strokes and sizes, and placing a mask over text. Many of these techniques are still used today and were used during World War I and II.

Other techniques that were more sophisticated that were used as well during the wars were microdots, which were microscopic images that were shrunk to resemble tiny specs of dirt. These microdots were placed on a person or in a letter and were used to transmit vital information or locations. From this moment and with the emergence of the Internet, steganographic techniques began increasing. Due to the amount of computer networks and digitalized media, covert steganography became favorable to communicate between parties. There have been many uses of steganography, good and bad, in which they provide an extra layer of security for businesses but could also be used by criminals for illegal means.


The word watermark is thought to have been derived from the German word wassermarke and is termed as the marks were thought to have resembled the effects of water on paper. Watermarking first began in Italy in 1282 where wired patterns were created during paper production which left designs in the paper once it molded. The purpose is unclear as to why watermarking was done back than. However in the eighteenth century, paper made in Europe and America using watermarking technology was to ensure trademarks, track when the paper was created, indicate size of the sheets, and prevent counterfeiting.

Counterfeiting especially, caused watermarking technology to rapidly increase as there were those attempting to stop counterfeiters and those attempting to remove or copy the watermarks. From the basic imprints on paper, watermarks moved onto color where dyed ink was inserted into the paper during the molding process. The next advancement was to create a raise in the paper causing a slight bump on the surface, which is commonly seen on paper currency today. Finally, the idea of digital watermarking appeared between in 1979, where Szepanski discussed a machine that could be used on documents which would place a pattern for anti-counterfeiting purposes. In 1988, Holt described a way of embedding an identification code in an audio signal and the term digital watermark first appeared. It was only until 1995 that the world became vastly interested in the idea of digital watermarks. From then on, many papers were released discussing ways of implementing digital watermarks and companies ranging from the music industry to business software began using this technique for security and protection.


Applications

Since the emergence of the Internet, digital distribution of media and documents has vastly increased and is constantly increasing every year. On this note, the distribution of copyright material has always been a concern for people trying to protect their work and this is where digital watermarking can become useful. Those who are worried of people eavesdropping on their conversations by email, important documents being read, or video chat being seen by others can use steganographic techniques to protect themselves. In order to know what applications these techniques can be used for, it is best to know the different ways of implementing the techniques. Steganography and digital watermarking can be broken down into four different subcategories in which the existence of the technique is either known or unknown to the public along with the original file.

<center>Image:sandwtable.png

Covert watermarking is embedding a watermark related to the recipient of each copy of the file, but unaware that the watermark exists. Thus, if the file is leaked to third parties, the recipient who leaked the file can be traced. Covert steganography is embedding data unrelated to the original work. An overt watermark is when the presence of the watermark is known to others besides the creators, whether visually or told of the watermark. Overt steganography is similar to covert steganography in terms of the hidden information is unrelated to the signal in which it is embedded in. However with overt steganography, the information is only hidden to certain parties but visible to others, example timestamps.

Knowing the subcategories allows for the following possible applications for both steganography and digital watermarking. Some applications may use both techniques depending on the function required.

Steganography

Some applications of steganography are:

  • Protection of Data Alteration - "Digital Certificates" act as a way of protecting data by embedding the information.
  • Confidential Communication - Where steganographic techniques could provide a way of communicating between two parties without others knowing.
  • Media Database Systems - Use of embedded messages in files to quickly identify them.
  • Access Control - Using access keys to extract content from a steganographic file.


Digital Watermarking

Some applications that use digital watermarking are:

  • Broadcast Monitoring - Identifying where and when the media files are being broadcast by looking at the embedded watermarks.
  • Owner Identification - The embedded watermark will identify the owner of the media files as a way of copyright protection.
  • Transaction Tracking - Track media files that were illegally distributed or to determine the route the file took.
  • Content Authentication - The embedded watermarks can add as signatures where the information can be used to authenticate the originality of the file.
  • Copy Control - Watermarks can be used in recording equipment to determine what content may or may not be copied.
  • Device Control - Watermarks can be used to make devices react a certain way and display certain content.
  • Legacy Enhancement - Watermarks can be used to improve functionality of existing systems.

Companies all over the world have been creating software programs to be used for the above applications. Commonly used programs for steganography are Steganos, Stego Suit, and Stealthencrypt. Software used for digital watermarking are Visual Watermark, Ais Watermark, and WatermarkIt. Encryption methods and watermarking schemes offer others the satisfaction of knowing that their data has an extra layer of protection from prying eyes.

Properties

Both methods can be illustrated by properties depending upon the application and the role each method will play. However, the properties that apply to one method are different to the other as each method have different priorities. Below are the common properties commonly associated with the two methods.

Properties of Steganographic Systems

Some properties of steganography are:

  • Security - The ability to resist attacks whether passive, active, or malicious.
  • Embedding Capacity - The maximum number of bits that can be hidden in a given media file.
  • Blind or Informed Extraction - Whether the other party has a copy of the original file.
  • Embedding Efficiency - The number of secret message bits embedded/unit distortion.
  • Statistical Undetectability - The probability of detecting a steganographic technique based off assumptions.
  • False Alarm Rate - The probability that an algorithm will detect and report the presence of a secret message when there is none.
  • Stego Key - Used with a publicly known algorithm to embed a secret message into the media file.


Properties of Watermarked Systems

Some properties of digital watermarking are:

  • Robustness - The ability of the watermark to survive processing of content.
  • Security - The ability of the watermark to prevent attacks or removal.
  • Embedding Effectiveness - The probability that the embedder will successfully embed the watermark in a random media file.
  • Fidelity - The perceptive quality of a watermarked content.
  • Data Payload - The amount of information that can be carried in the watermark.
  • Cipher and Watermark Keys - Ciphers to control message encryption and watermark keys to control embedding and detection.
  • False Positive Rate - The rate in which the watermark will be falsely detected in unwatermarked files.
  • Modification and Multiple Watermarks - The possibility of changing the watermark or embedding multiple watermarks.
  • Cost - The cost required to embed the watermark into the digital file.


Models and Techniques

Steganography and digital watermarking are two different techniques, however they both share similar qualities. Both techniques follows the same basic model in which two inputs (a signal and the original file) go into an embedder. The signal corresponds to the digital watermark or the secret message and the embedder function contains an algorithm that will produce a watermarked file. The output from the embedder is than transmitted or recorded. The recorded file is than sent to a third party in which the possibility of a modification, whether malicious or not, could arise. The recorded file, modified or not, is than sent as input to a detector in which the algorithm tries to determine if the signal is present. If it is, the watermark or secret message can usually be extracted depending on the properties.

Basic life-cycle model

How Steganography Works

Hidden Message in the Image.















How Digital Watermarking Works

File with both covert and overt watermarks.












Countermeasures

Countermeasures or detection techniques against covert steganography or watermarking requires the use of the light spectrum, magnification lenses, chemical mixtures, search algorithms, and others are used to determine if a file has been embedded with either these techniques. The use of the light spectrum, and chemical mixtures can only be used for hard copy works of the media files in question. Magnification lenses can be used on both hard copies and digital copies to magnify the image to a size where the watermarked or hidden message can be found. Search algorithms can be done by hand, however it can be quite difficult and is usually done by computers and is the most likely used form of detection. As there are companies creating software to protect secret messages and embed watermarks into files, there are also companies creating software to remove and detect encoded files.

In steganography, the detection of steganographic messages is called steganalysis where the algorithm takes the original file and compares it to the file that is thought to have the secret message. However this only works if a known clean copy of the original is available. In digital watermarking, the technique of watermark detection, informed detection, is used to find invisible watermarks. Watermark detection can follow the same principle algorithm that steganalysis goes through by obtaining the original work and comparing it with one that is believed to have the invisible watermark. Another way of detecting invisible watermarks is by blind detection, where the detecting algorithm is provided with limited information of the original work to find the watermark.


References

  1. Wayner, Peter. Disappearing cryptography. Published by Morgan Kaufmann, 2002.
  2. http://plus.maths.org/latestnews/may-aug06/steg/Pixels.jpg
  3. http://enterpriseinnovator.com/index.php?articleID=14174&sectionID=25


See Also


External Links


--Ganv 20:14, 7 April 2009 (EDT)

Personal tools