Bauman Moscow State University Department of «Science and Management» Department of «Information Security» T.M. Volosatova , N.V. Chichvarin . Steganography in CAD Electronic textbook Tutorial on subjects «Detection and identification signals», «Development of CAD» Moscow (C) 2012 MSTU. 2 UDC 621.391 Reviewers: Prof. E. Gordeev . PhD A. Voronov. TM Volosatova , NV Chichvarin . Steganography in CAD . Tutorial on subjects «Detection and identification signals», «Development of CAD». Electronic textbook . - BMSTU 2012, pp.48 . The manual representation basic materials and questions in the section «Steganography and steganalysis», discipline «detection and identification signals»: computer steganography methods , techniques and digital funds containers and theoretical aspects of steganalysis - data discovery hidden in containers. For teachers of engineering faculty and students . Recommended NMS BMSTU. Electronic textbook Volosatova Tamara Chichvarin Nicolai « Steganography in CAD» © 2012 BMSTU Steganography in CAD/CAM/PLM. Contents. 3 Steganography in CAD Contents Introduction………………………………………………………………………………………..1 Physical steganography.............................................................................................................7 Digital steganography. ..............................................................................................................8 Network ..................................................................................................................................10 Printed .....................................................................................................................................11 Digital Text .............................................................................................................................11 Using Sudoku puzzles. ............................................................................................................12 Additional terminology. ................................................................................................................12 Countermeasures and detection/ ....................................................................................................12 Applications. ..................................................................................................................................13 Use by terrorists. .....................................................................................................................14 Alleged use by intelligence services. ......................................................................................16 Distributed Steganography. ....................................................................................................16 2. Algorithms for digital steganography .....................................................................................20 2.1. Algorithms for embedding data in the spatial domain ...........................................................20 3. Embedding data to transformation fields algorythm .................................................................26 3.1 Embedding data in a discrete cosine transformation coefficients ...........................................28 3.2 Koch algorithm ........................................................................................................................28 3.3. Benham algorithm ..................................................................................................................29 3.4 Podilchuk algorithm ................................................................................................................29 3.5 Hsu algorithm ..........................................................................................................................30 3.6 Cox algorithm ..........................................................................................................................30 3.7 Barni algorithm ........................................................................................................................31 3.8 Additive algorithms .................................................................................................................31 3.8.1 Algorithms based on the linear data embedding ..................................................................31 3.10 The algorithm Chaya (Chae) .................................................................................................33 Steganography in CAD/CAM/PLM. Contents. 4 3.11 The algorithm Kandar (Kundur) ............................................................................................34 4. A choice of a method of embedding of DWM (digital watermark) in the image-container .....36 4.1. The methods using as containers audiofiles ...........................................................................37 4.2 Broadband coding. ...................................................................................................................38 4.3 Phase coding. ...........................................................................................................................38 4.4 The echo-coding ......................................................................................................................39 4.5 Noise replacement. ..................................................................................................................39 5.The market overview of steganography software.......................................................................44 6. Statement of the problem of detection of hidden messages. ...................................................47 Appendix . .....................................................................................................................................53 Abbreviations: DCT - discrete cosine transformation, DWM - digital watermarks, MDCT – modified discrete cosine transformation, IS – information Security, CALS – continuous Acquisition and Life-cycle Support, CEH – digital watermarks, COP – computer steganography, PDU – protocol Data Unit. Introduction. In modern conditions for the creation of competitive products required to provide integrated management of the processes of design, production, delivery and support, including all participants in the product lifecycle. Required for this informational support continuous product lifecycle , as a rule, based on the strategy implemented CALS, which has become widespread in industrialized countries and recommended for use by Russian enterprises Ministry of Economy of the Russian Federation. Centralization of all information about a new product , a large number of both internal and external users of CALS, other risk factors require special attention to the problem of safety management , which is part of the more general problem of information security. In the context of the economic slowdown, it is tempting to reduce the cost of IS within the overall cost reduction. Nevertheless, according to the report KPMG [5], the majority of Steganography in CAD/CAM/PLM. Contents. 5 organizations plan to increase budgets for IB next year , which proves how increased attention over the past few years to information risk management. Important role in solving the problems of information security is given to the international standard ISO17799 (it should be noted the importance of the integration of the standard with the legal framework of the state in the field of information security [2]). Russian companies are also guided by " RD Technical Commission of Russia: Automated systems. Protection against unauthorized access to information». Classification of the requirements for the protection of information and other documents considered in particular in [1]. The result of implementing the standard ISO17799 - Information Security Management System . Its purpose - to reduce losses associated with the violation of information security. In some cases, the scale of the loss can be such that the company faces bankruptcy. An example may serve as an irreplaceable loss CALS- project high-tech products with a long development cycle. Speaking on the practical application of the standard ISO17799, should bear in mind three factors hindering its immediate use. First, the standard recommendations in many cases are quite common. Secondly, in the organization, as a rule, there is a certain system processes, which need to integrate security management process. Theme 1. Steganography: the terminology, the historical review and classification of methods and tools. Questions for self-examination and discussion at the workshop. 1) The historical methods of hiding data. 2) The difference and similarity of steganography cryptography. 3) Theoretical frameworks reflect the terminology used. Literature to explore themes. 1. Gribunin V.G. Binding I.N., Turintsev I.V. Digital Steganography. M.: SOLON-Press, 2002. – 272 pp. 2. Rotation scale and translation invariant spread spectrum digital image watermarking. IEEE Int. Conf. on Image Processing, 1998. P. 4. 3. Pereira S., Joseph J., Deguillaume F. Template Based recovery of Fourier-Based Watermarks Using log-polar and Log-log Maps. IEEE Int. Conf on Multimedia Computing and Systems, 1999. P. 5. Steganography in CAD/CAM/PLM. Contents. 6 Steganography. (From Wikipedia, the free encyclopedia) Steganography is the science of encoding hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. It is a form of security through obscurity. The word «steganography» is of Greek origin and means «concealed writing». It combines the Greek words «steganos» (στεγανός), meaning «covered or protected», and graphei (γραφή) meaning «writing.» The first recorded use of the term was in 1499 by Johannes Trithemius in his «Steganographia», a treatise on cryptography and steganography, disguised as a book on magic. Generally, the hidden messages will appear to be (or be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages — no matter how unbreakable — will arouse interest, and may in themselves be incriminating in countries where encryption is illegal. Thus, whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message. Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. For example, a sender might start with an innocuous image file and adjust the color of every 100th pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it. History of steganography When Herodotus mentions two examples in his Histories. «Demaratus» sent a warning about a forthcoming attack to Greece by writing it directly on the wooden backing of a wax tablet before Steganography in CAD/CAM/PLM. Contents. 7 applying its beeswax surface. Wax tablets were in common use then as reusable writing surfaces, sometimes used for shorthand. In his work Polygraphiae Johannes Trithemius developed his so-called «Ave-Maria-Cipher» with which one can hide information in a Latin praise of God. «Auctor Sapientissimus Conseruans Angelica Deferat Nobis Charitas Potentissimi Creatoris» Physical steganography Steganography has been widely used, including in recent historical times and the present day. Known examples include: Hidden messages within wax tablets — in ancient Greece, people wrote messages on the wood, then covered it with wax upon which an innocent covering message was written. Hidden messages on messenger's body — also used in ancient Greece. Herodotus tells the story of a message tattooed on the shaved head of a slave of Histiaeus, hidden by the hair that afterwards grew over it, and exposed by shaving the head again. The message allegedly carried a warning to Greece about Persian invasion plans. This method has obvious drawbacks, such as delayed transmission while waiting for the slave's hair to grow, and the restrictions on the number and size of messages that can be encoded on one person's scalp. In the early days of the printing press, it was common to mix different typefaces on a printed page due to the printer not having enough copies of some letters otherwise. Because of this, a message could be hidden using 2 (or more) different typefaces, such as normal or italic. During World War II, the French Resistance sent some messages written on the backs of couriers using invisible ink. Hidden messages on paper written in secret inks, under other messages or on the blank parts of other messages. Messages written in Morse code on knitting yarn and then knitted into a piece of clothing worn by a courier. Jeremiah Denton repeatedly blinked his eyes in Morse Code during the 1966 televised press conference that he was forced into as an American prisoner of war by his North Vietnamese captors, spelling out the word: «T-O-R-T-U-R-E». This confirmed for the first time to the U.S. Military (naval intelligence) and Americans that American POWs were being tortured in North Vietnam. Messages written on envelopes in the area covered by postage stamps. Steganography in CAD/CAM/PLM. Contents. 8 During and after World War II, espionage agents used photographically produced microdots to send information back and forth. Microdots were typically minute, approximately less than the size of theperiod produced by a typewriter. World War II microdots needed to be embedded in the paper and covered with an adhesive, such as collodion. This was reflective and thus detectable by viewing against glancing light. Alternative techniques included inserting microdots into slits cut into the edge of post cards. During WWII, Velvalee Dickinson, a spy for Japan in New York City, sent information to accommodation addresses in neutral South America. She was a dealer in dolls, and her letters discussed the quantity and type of doll to ship. The stegotext was the doll orders, while the concealed «plaintext» was itself encoded and gave information about ship movements, etc. Her case became somewhat famous and she became known as the Doll Woman. Cold War counter-propaganda. In 1968, crew members of the USS Pueblo intelligence ship held as prisoners by North Korea, communicated in sign language during staged photo opportunities, informing the United States they were not defectors, but were captives of the North Koreans. In other photos presented to the US, crew members gave «the finger» to the unsuspecting North Koreans, in an attempt to discredit photos that showed them smiling and comfortable. Digital steganography. Image of a tree with a steganographically hidden image. The hidden image is revealed by removing all but the two least significant bits of each color component and a subsequent normalization. The hidden image is shown below. Steganography in CAD/CAM/PLM. Contents. 9 Image of a cat extracted from the tree image above. Modern steganography entered the world in 1985 with the advent of the personal computers being applied to classical steganography problems. Development following that was very slow, but has since taken off, going by the large number of steganography software available: Concealing messages within the lowest bits of noisy images or sound files. Concealing data within encrypted data or within random data. The data to be concealed are first encrypted before being used to overwrite part of a much larger block of encrypted data or a block of random data (an unbreakable cipher like the one-time pad generates ciphertexts that look perfectly random if one does not have the private key). Chaffing and winnowing. Mimic functions convert one file to have the statistical profile of another. This can thwart statistical methods that help brute-force attacks identify the right solution in a ciphertext-only attack. Concealed messages in tampered executable files, exploiting redundancy in the targeted instruction set. Pictures embedded in video material (optionally played at slower or faster speed). Injecting imperceptible delays to packets sent over the network from the keyboard. Delays in keypresses in some applications (telnet or remote desktop software) can mean a delay in packets, and the delays in the packets can be used to encode data. Changing the order of elements in a set. Content-Aware. Steganography hides information in the semantics a human user assigns to a datagram. These systems offer security against a non-human adversary/warden. Steganography in CAD/CAM/PLM. Contents. 10 Blog-Steganography. Messages are fractionalized and the (encrypted) pieces are added as comments of orphaned web-logs (or pin boards on social network platforms). In this case the selection of blogs is the symmetric key that sender and recipient are using; the carrier of the hidden message is the whole blogosphere. Modifying the echo of a sound file (Echo Steganography). Secure Steganography for Audio Signals. Image bit-plane complexity segmentation steganography Including data in ignored sections of a file, such as after the logical end of the carrier file. Making text the same color as the background in word processor documents, e-mails, and forum posts. Network All information hiding techniques that may be used to exchange steganograms in telecommunication networks can be classified under the general term of network steganography. This nomenclature was originally introduced by Krzysztof Szczypiorski in 2003. Contrary to the typical steganographic methods which utilize digital media (images, audio and video files) as a cover for hidden data, network steganography utilizes communication protocols' control elements and their basic intrinsic functionality. As a result, such methods are harder to detect and eliminate. Typical network steganography methods involve modification of the properties of a single network protocol. Such modification can be applied to the PDU (Protocol Data Unit), to the time relations between the exchanged PDUs, or both (hybrid methods). Moreover, it is feasible to utilize the relation between two or more different network protocols to enable secret communication. These applications fall under the term inter-protocol steganography. Network steganography covers a broad spectrum of techniques, which include, among others: Steganophony - the concealment of messages in Voice-over-IP conversations, e.g. the employment of delayed or corrupted packets that would normally be ignored by the receiver (this method is called LACK - Lost Audio Packets Steganography), or, alternatively, hiding information in unused header fields. WLAN Steganography – the utilization of methods that may be exercised to transmit steganograms in Wireless Local Area Networks. A practical example of WLAN Steganography is the HICCUPS system (Hidden Communication System for Corrupted Networks) Steganography in CAD/CAM/PLM. Contents. 11 Printed Digital steganography output may be in the form of printed documents. A message, the plaintext, may be first encrypted by traditional means, producing a ciphertext. Then, an innocuous covertext is modified in some way so as to contain the ciphertext, resulting in the stegotext. For example, the letter size, spacing, typeface, or other characteristics of a covertext can be manipulated to carry the hidden message. Only a recipient who knows the technique used can recover the message and then decrypt it. Francis Bacon developed. Bacon's cipher as such a technique. The ciphertext produced by most digital steganography methods, however, is not printable. Traditional digital methods rely on perturbing noise in the channel file to hide the message, as such, the channel file must be transmitted to the recipient with no additional noise from the transmission. Printing introduces much noise in the ciphertext, generally rendering the message unrecoverable. There are techniques that address this limitation, one notable example is ASCII Art Steganography [17]. Digital Text Unicode steganography uses lookalike characters of the usual ASCII set to look normal, while really carrying extra bits of information. If the text is displayed correctly, there should be no visual difference from ordinary text. Some systems, however, may display the fonts differently, and the extra information would be easily spotted. Alternately, hidden (e.g., control) characters, and redundant use of markup (e.g., empty bold, underline or italics) can add embedded within a body of text to hide information that wouldn't be visually apparent when displayed, but can be discovered by examining the document source. HTML pages can contain code for extra blank spaces and tabs at the end of lines, as well as different colours, fonts and sizes, which will not be visible when displayed. A more trivial example is white text on a white background, which can be revealed by «selecting». One such method is based on the non-printing Unicode characters Zero-Width Joiner (ZWJ) and Zero-Width Non-Joiner (ZWNJ). These characters are used for joining and disjoining letters in Arabic, but can be used in Roman alphabets for hiding information because they have no meaning in Roman alphabets, and because they are «zero-width» and thus not displayed. The embedding of ZWJ in the cover-text represents «1» and the embedding of ZWNJ represents «0». Groups of characters can be used to represent the letters A (giving it the code “0”, and thus Steganography in CAD/CAM/PLM. Contents. 12 represented by ZWNJ) to Z (giving it the code «1011», and thus represented by ZWJ,ZWNJ,ZWJ,ZWJ). These character groups can be inserted between each character of the cover-text, thereby hiding a message. Using Sudoku puzzles. This is the art of concealing data in an image using Sudoku which is used like a key to hide the data within an image. Steganography using sudoku puzzles has as many keys as there are possible solutions of a Sudoku puzzle, which is 6.71×1021. This is equivalent to around 70 bits, making it much stronger than the DES method which uses a 56 bit key. Additional terminology. In general, terminology analogous to (and consistent with) more conventional radio and communications technology is used; however, a brief description of some terms which show up in software specifically, and are easily confused, is appropriate. These are most relevant to digital steganographic systems. The pay low is the data to be covertly communicated. The carrier is the signal, stream, or data file into which the payload is hidden; which differs from the «channel» (typically used to refer to the type of input, such as «a JPEG image»). The resulting signal, stream, or data file which has the payload encoded into it is sometimes referred to as the package, stego file, or covert message. The percentage of bytes, samples, or other signal elements which are modified to encode the payload is referred to as the encoding density and is typically expressed as a number between 0 and 1. In a set of files, those files considered likely to contain a payload are called suspects. If the suspect was identified through some type of statistical analysis, it might be referred to as a candidate. \ Countermeasures and detection/ Detection of physical steganography requires careful physical examination, including the use of magnification, developer chemicals and ultraviolet light. It is a time-consuming process with obvious resource implications, even in countries where large numbers of people are employed to spy on their fellow nationals. However, it is feasible to screen mail of certain suspected individuals or institutions, such as prisons or prisoner-of-war (POW) camps. During World War II, a technology used to ease monitoring of POW mail was specially treated paper that would Steganography in CAD/CAM/PLM. Contents. 13 reveal invisible ink. An article in the June 24, 1948 issue of Paper Trade Journal by the Technical Director of the United States Government Printing Office, Morris S. Kantrowitz, describes in general terms the development of this paper, three prototypes of which were named Sensicoat, Anilith, and Coatalith paper. These were for the manufacture of post cards and stationery to be given to German prisoners of war in the US and Canada. If POWs tried to write a hidden message the special paper would render it visible. At least two US patents were granted related to this technology, one to Mr. Kantrowitz, U.S. Patent 2,515,232, «Water-Detecting paper and Water-Detecting Coating Composition Therefor», patented July 18, 1950, and an earlier one, «Moisture-Sensitive Paper and the Manufacture Thereof», U.S. Patent 2,445,586, patented July 20, 1948. A similar strategy is to issue prisoners with writing paper ruled with a water-soluble ink that «runs» when in contact with a water-based invisible ink. In computing, detection of steganographically encoded packages is called steganalysis. The simplest method to detect modified files, however, is to compare them to known originals. For example, to detect information being moved through the graphics on a website, an analyst can maintain known-clean copies of these materials and compare them against the current contents of the site. The differences, assuming the carrier is the same, will compose the payload. In general, using extremely high compression rate makes steganography difficult, but not impossible. While compression errors provide a hiding place for data, high compression reduces the amount of data available to hide the payload in, raising the encoding density and facilitating easier detection (in extreme cases, even by casual observation). Applications. Usage in modern printers. Main article: Printer steganography. Steganography is used by some modern printers, including HP and Xerox brand color laser printers. Tiny yellow dots are added to each page. The dots are barely visible and contain encoded printer serial numbers, as well as date and time stamps. Steganography in CAD/CAM/PLM. Contents. 14 Example from modern practice. The larger the cover message is (in data content terms—number of bits) relative to the hidden message, the easier it is to hide the latter. For this reason, digital pictures (which contain large amounts of data) are used to hide messages on the Internet and on other communication media. It is not clear how commonly this is actually done. For example: a 24-bit bitmap will have 8 bits representing each of the three color values (red, green, and blue) at each pixel. If we consider just the blue there will be 28 different values of blue. The difference between 11111111 and 11111110 in the value for blue intensity is likely to be undetectable by the human eye. Therefore, the least significant bit can be used (more or less undetectably) for something else other than color information. If we do it with the green and the red as well we can get one letter of ASCII text for every three pixels. Stated somewhat more formally, the objective for making steganographic encoding difficult to detect is to ensure that the changes to the carrier (the original signal) due to the injection of the payload (the signal to covertly embed) are visually (and ideally, statistically) negligible; that is to say, the changes are indistinguishable from the noise floor of the carrier. Any medium can be a carrier, but media with a large amount of redundant or compressible information are better suited. From an information theoretical point of view, this means that the channel must have more capacity than the «surface» signal requires; that is, there must be redundancy. For a digital image, this may benoise from the imaging element; for digital audio, it may be noise from recording techniques or amplification equipment. In general, electronics that digitize an analog signal suffer from several noise sources such as thermal noise, flicker noise, and shot noise. This noise provides enough variation in the captured digital information that it can be exploited as a noise cover for hidden data. In addition,lossy compression schemes (such as JPEG) always introduce some error into the decompressed data; it is possible to exploit this for steganographic use as well. Steganography can be used for digital watermarking, where a message (being simply an identifier) is hidden in an image so that its source can be tracked or verified (for example, Coded Anti-Piracy), or even just to identify an image. Use by terrorists. When one considers that messages could be encrypted steganographically in e-mail messages, particularly e-mail spam, the notion of junk e-mail takes on a whole new light. Coupled with the «chaffing and winnowing» technique, a sender could get messages out and cover their tracks all at once. Steganography in CAD/CAM/PLM. Contents. 15 An example showing how terrorists may use forum avatars to send hidden messages. This avatar contains the message «Boss said that we should blow up the bridge at midnight» encrypted with mozaiq using «växjö» as password. Rumors about terrorists using steganography started first in the daily newspaper USA Today on February 5, 2001 in two articles titled «Terrorist instructions hidden online» and «Terror groups hide behind Web encryption». In July the same year, an article was titled even more precisely: «Militants wire Web with links to jihad». A citation from the article: «Lately, al-Qaeda operatives have been sending hundreds of encrypted messages that have been hidden in files on digital photographs on the auction site «eBay.com". Other media worldwide cited these rumors many times, especially after the terrorist attack of 9/11, without ever showing proof. The Italian newspaper Corriere della Sera reported that an Al Qaeda cell which had been captured at the Via Quaranta mosque in Milan had pornographic images on their computers, and that these images had been used to hide secret messages (although no other Italian paper ever covered the story). The USA Today articles were written by veteran foreign correspondent Jack Kelley, who in 2004 was fired after allegations emerged that he had fabricated stories and sources. In October 2001, the New York Times published an article claiming that al-Qaeda had used steganography to encode messages into images, and then transported these via e-mail and possibly via USENET to prepare and execute the September 11, 2001 terrorist attack. The Federal Plan for Cyber Security and Information Assurance Research and Development, published in April 2006 makes the following statements: «...immediate concerns also include the use of cyberspace for covert communications, particularly by terrorists but also by foreign intelligence services; espionage against sensitive but poorly defended data in government and industry systems; subversion by insiders, including vendors and contractors; criminal activity, primarily involving fraud and theft of financial or identity information, by hackers and organized crime groups...». «International interest in R&D for steganography technologies and their commercialization and application has exploded in recent years. These technologies pose a potential threat to national Steganography in CAD/CAM/PLM. Contents. 16 security. Because steganography secretly embeds additional, and nearly undetectable, information content in digital products, the potential for covert dissemination of malicious software, mobile code, or information is great». «The threat posed by steganography has been documented in numerous intelligence reports». Moreover, an online «terrorist training manual», the «Technical Mujahid, a Training Manual for Jihadis» contained a section entitled «Covert Communications and Hiding Secrets Inside Images». By early 2002, a Cranfield University MSc thesis developed the first practical implementation of an online real-time Counter Terrorist Steganography Search Engine. This was designed to detect the most likely image steganography in transit and thereby provide UK Ministry of Defence Intelligence Staff a realistic approach to «narrowing the field», suggesting that interception capacity was never the difficulty but rather prioritising the target media. Alleged use by intelligence services. In 2010, the Federal Bureau of Investigation revealed that the Russian foreign intelligence service uses customized steganography software for embedding encrypted text messages inside image files for certain communications with «illegal agents» (agents under non-diplomatic cover) stationed abroad. Distributed Steganography. There are distributed steganography methods, including methodologies that distribute the payload through multiple carrier files in diverse locations to make detection more difficult. For example the U.S. Patent 8,527,779 by cryptographer William Easttom (Chuck Easttom) Methods of computer steganography The results of a comparative analysis of methods for COP are shown in Table 1. Steganographic Brief description of methods the methods Limitations 1.Methods of using the special properties of computer data formats Steganography in CAD/CAM/PLM. Contents. Benefits 17 Margins are 1.1. Methods of expanding in many The low degree of using earmarked for multimedia formats, they secrecy, the transfer of the expansion of are filled with zero small amounts of fields of computer information and are not information limited data formats considered program Ease of use 1.2. Methods of special formatting of text files: 1.3.1. Methods of using the known displacement of words, sentences, paragraphs These methods are based on the change of lines and placement of words in a sentence that is provided by inserting extra spaces between words Acrostic - a special 1.2.2. Methods case of this method (for for selecting certain example, the initial positions of letters letters of each line form (zero code) a Message) 1.2.3. Methods of using the special properties of the field formats are not displayed on the screen 1. The weak performance of the method, the transfer of small amounts of information 2. The low degree of secrecy Ease of use. There is a published software implementation of this method 1.The weak performance of the Easy of use. Has published the Methods based on the use of special "invisible", hidden fields for the organization of footnotes and references (eg, use a black font on a black background) 1.3. Methods The information of hiding places in is usually stored in the Steganography in CAD/CAM/PLM. Contents. 18 the unused floppy disks unused places GMD (e.g., zero-track) method, the transfer of small amounts of information 2. The low degree of secrecy 1.4.Methods of simulating the functions (mimicfunction) The method is based on the generation of text and is a generalization of the acrostic. For the secret message is generated meaningful text, hiding the message 1.5. Methods for removing an identifying header file Concealed message is encrypted and the result identifies the header is removed, there is a need to leaving only the advance pass the encrypted data. The information to the receiver knows in recipient advance of the transfer of messages and is missing a title 1. The weak performance of the method, the transfer of small amounts of information 2. The low degree of secrecy software implementation of this method The resulting text is not suspicious for monitoring network Easy of implementation (White Noise Storm, S-Tools), ensure the implementation of this method with the given algorithm 2. Methods of using redundant audio and visual information 3.1. Methods of using the redundancy of digital photography, digital audio and digital video Digital samples contain very little useful information. They filled more information does not affect the quality of experience that allows you to hide confidential information Due to the introduction of additional information distorted the statistical characteristics of digital streams. To reduce the signs of compromise requires correction of the statistical characteristics Steganography in CAD/CAM/PLM. Contents. Ability to transfer a large amount of hidden information. The possibility of copyright protection, the latent image of the brand, registration numbers, etc. 19 As can be seen from Table 1, the first direction based on the use of special properties of computer data formats, rather than redundancy itself the data. Special properties of selected formats, taking into account protection of concealed message from the immediate listening, viewing or reading. Based on the analysis of materials, we can conclude that the main direction Steganography is the use of computer and audio visual redundancy Information. As the preliminary analysis, the use of steganography methods for solving is possible in principle. However, all The methods have the following disadvantages: The set of possible implementations is countable, and of course, that allows for a simple brute-force attack methods, although it requires considerable computational cost. Not all implementations are consistent with the possibility of hardware implementation. Theme 2. Computer steganography: classification, benchmarking methods and tools. Questions for self-examination and discussion at the workshop. 1) Structure of steganography. 2) Comparative analysis of the basic methods and tools of computer steganography. 3) The study of open-source products. Literature to explore themes. 1. Gribunin V.G. Binding I.N., Turintsev I.V. Digital Steganography. M.: SOLON-Press, 2002. – 272 pp. 2. Lin Ch-Y., Chang Sh.-F. Distortion Modeling and Invariant Extraction for Digital Image Print-and Scan Process. International Symposium on Multimedia Information Processing, 1999. P. 10. 3. Lin Ch-Y., Chang Sh.-F. Public Watermarking Surviving General Scaling and Cropping: An Application for Print-and-Scan Process. Multimedia and Security Workshop at ACM Multimedia, 1999. Steganography in CAD/CAM/PLM. Contents. 20 2. Algorithms for digital steganography 2.1. Algorithms for embedding data in the spatial domain The advantage of these algorithms embedded in the spatial domain is the fact that data is introduced in the original image, and there is no need to perform computationally cumbersome linear transformations of images. Data implemented by manipulating the brightness and color components. Most of the algorithms embedded in the spatial domain lata images based on the use of broadband signals. The basic idea behind the use of steganography is that the data is embedded in the noise signal of low power. Since the signal of low power, the data used to protect noiseresistant codes. 2.1.1 The algorithm Kutter Kutter algorithm assumes that the image has RGB encoding. Embedding is performed in the blue channel, since the blue color of the system least sensitive of human vision. - embedded bits, - container, - pseudo-random position in the which the attachment. The secret bits embedded in the blue channel by modifying the brightness Where - constant, which determines the energy of the embedded signal. Its value depends on the of the scheme. The more , the higher the robustness of investing, but the greater his visibility. Removing the bit carried by the recipient without his original image, that is blind. To do so runs the prediction value the original, unmodified pixel based on the values of its neighbors. Also, there is a modification of this algorithm, which for assessment using pixel values of several Steganography in CAD/CAM/PLM. Contents. 21 pixels located in the same column and the same line. In this case, the assessment has the form: Where ( - the number of pixels from the top (bottom, left, right) of the estimated pixel ). So in the process of embedding each bit of CEH was repeated times, we get cr estimates one bit. The secret is a bit after averaging the difference between estimates pixel and its real value The sign of this difference determines the value of embedded bits. This algorithm does not guarantee the faithful always determine the value of the secret bits both as a function of extracting bits is not the inverse function embedded. Algorithm is robust to many of the known attacks: low-pass filtering image, its compression, in accordance with the algorithm of JPEG, cutting edges. 2.1.2. Algorithm Bruyndonckx To improve the immunity applies Code Bose-Chaudhuri-Hokvingema (BCH). Implementation is carried out by modifying 8x8 block of luminance pixels. The process of embedding is carried out in three stages: Classification of pixels within the block into two groups with approximately uniform brightness. Split each group into categories defined by this grid. Modification of medium brightness values of each category in each group. In the classification there are two types of blocks: blocks with contrast and noise units with distinct differences of brightness. In blocks of the second type of zone different brightness do not have to lie close to each other, not must contain an equal number of pixels. Moreover, some pixels in general can not belong to any one zone. In the first type of blocks classification is particularly difficult. Steganography in CAD/CAM/PLM. Contents. 22 To perform the classification of the brightness values are sorted in ascending order. Further is the point at which the slope of the tangent to the resulting curve is maximal. This point is the boundary separating the two zones in the event that the slope of greater than a certain threshold. Otherwise, the pixels are divided equally between the zones. To sort by category to the pixel blocks are superimposed masks are different for each zone and each block. Purpose is to provide a mask of secrecy implementation. The set of pixels was divided into five subsets: two bands, two category, and the pixels not belonging to any zone (for the blocks of the first type). - the average brightness for the pixels of the two zones and categories. Embedding a bit CEH (option) and the equality of brightness values in the each zone is provided by: and CEH extraction algorithm is the inverse algorithm implementation. At the same time calculated the average values of brightness, and there are differences 2.1.3. Algorithm Langelaar This algorithm also works with blocks of 8x8. First, it creates pseudorandom mask of zeros and ones of the same size subunit value, and and In addition, each block is divided into two , depending on the mask. For each subunit calculates the average brightness . Next, choose a threshold , and a bit of CEH is built as follows: If this condition is not fulfilled, it is necessary to change the brightness values of pixels subunit . To remove the bits of CVD calculated average luminance subblocks - , Steganography in CAD/CAM/PLM. Contents. . The 23 difference between them to determine the required bits: 2.1.4. Algorithm Pitas In this algorithm, the CEH is a two dimensional array of bits the size of image, and the number of units it is equal to the number of zeros. There are several versions of the algorithm proposed Pitasom. Initially proposed to incorporate bits of CVD in each pixel of the image, but then wisely decided to use for this target blocks of 2x2 or 3x3 pixels, which makes the algorithm more robust to compression or filtering. CEH is added to the image: . In the case of a detector block for the introduction of CEH calculates the average brightness value of the block. Hence it is possible to uneven implementation of CEH in pixels, that is, the value of . Thus it is possible to obtain CEH is optimized by the criterion of robustness to the procedure of the compression algorithm JPEG. To do this 8x8 block elements are calculated in advance, "capacity" of each pixel (taking into account DCT quantization matrix, and JPEG). Then CEH implement in accordance with the calculated capacity. This optimization is done once and for all, and found the mask is applied for each image. 2.1.5. Algorithm Rongen In this algorithm, as well as in the algorithm Pitas, CVD is a two-dimensional matrix of ones and zeros to be approximately equal to their number. The pixels in the that you can implement one (ie robust to distortion), are defined in the the basis of a characteristic function (the characteristic pixels). This function can be computed locally, based on analysis of adjacent pixels. Characteristic pixel is approximately one hundredth of the total, so not all CVD unit is incorporated into these positions. To increase the number of characteristic of pixels, if necessary, is proposed to small predistortion image. The detector finds the values of the characteristic pixel, and compares with the best of him CEH. If the image does not contain CEH, then the characteristic pixels of ones and zeros will be roughly equal. 2.1.6. The algorithm PatchWork Steganography in CAD/CAM/PLM. Contents. 24 The algorithm Patchwork is a statistical approach. Initially pseudo-random manner on the basis of two key selected pixel. Then the brightness of one of them is increased by a value (from 1 to 5), the value of brightness of the other - is reduced to the same value. Further, this process is repeated large number of times (~ 10000) and is the sum of all differences. By value this amount is judged on the presence or absence of CVD in the image. The values of selected pixels in each step - и , the increment - . The sum of the differences of pixel values. Expected value (the sum of the difference of pixel values in an empty container) is close to zero for sufficiently large n. Expected value will be more . is a Gaussian distribution. In detektor accordance with the key value is checked and if it is significantly different from zero, the decision on the presence of data. To improve the robustness algorithm instead of individual pixels, you can use blocks, or patches (hence the name of the algorithm). Patchwork algorithm is sufficiently resistant to compression operations image, its truncation, change the contrast. The main drawback of the algorithm is its instability to affine transformations, i.e., rotate, translate, scale. Another disadvantage is the low bandwidth. Thus, the The basic version of the algorithm for the transmission of a bit of a hidden message requires 20,000 pixels. 2.1.7. Algorithm Bender Bender's algorithm is based on copying blocks of randomly selected texture area to another, which has similar statistical characteristics. It leads to the appearance of the image is completely identical blocks. These blocks can be be found as follows: Analysis of the autocorrelation function stego and finding the peaks. Shift the image in accordance with these peaks and subtracting the image from its shifted copy. Steganography in CAD/CAM/PLM. Contents. 25 The difference in locations of pirated units should be close to zero. Selects a threshold value and smaller than this threshold in absolute value are considered to be the desired blocks. Since copies of the blocks are identical, they vary in the same transformation the entire image. If we make the block size is sufficiently large, then the algorithm will resistant to most of distortion. Algorithm is robust to filtering, compression, image rotation. The main drawback of the algorithm is the complexity of finding an exceptional area, the blocks of which may be substituted without any noticeable degradation in image quality. But addition, this algorithm as the container can be used just enough texture images. 2.1.8. Method of LSB LSB (Least Significant Bit, LSB) - the essence of this method is to replace the least significant bits in the container (images, audio or video) to the obscure bits. The difference between empty and filled containers should not be perceptible to human senses. The method is as follows: Suppose there are 8-bit grayscale image. 00h (00000000b) denotes the color black, FFh (11111111b) - white. In total there are 256 levels . Also assume that the message consists of a byte - for example, 01101011b. By using two low-order bits in the descriptions of pixels, we need 4 pixels. For example, they are black. Then the pixels that contain a hidden message will appear as follows: 00000001 00000010 00000010 00000011. Then change the color of pixels: the first - 1/255 second and third - to 2/255 and the fourth - 3/255. Such gradations, besides that invisible to humans, might not appear when using low-quality output devices. LSB methods are unstable for all kinds of attacks and may be used only in the absence of noise in the data channel. Detection of LSB-encoded stego carried out by the anomalous characteristics of the distribution range of values of bits of digital signal samples. All methods of LSB are usually additive. Theme 3. Digital steganography: the terminology, classification and comparative analysis methods and tools. Questions for self-examination and discussion in seminars. 1) The historical methods of hiding data. Adopted terminology. 2) Theoretical principles of digital steganography based on the terminology used. 3) Comparative analysis of the means of digital steganography. Literature to explore themes. Steganography in CAD/CAM/PLM. Contents. 26 1. Gribunin V.G. Binding I.N., Turintsev I.V. Digital Steganography. M.: SOLON-Press, 2002. – 272 pp. 2. Kutter M. Watermarking Resisting to Translation, Rotation, and Scaling. Signal Processing Laboratory, 1998. P. 10. 3. Kutter M. Digital Signature of Color Images using Amplitude Modulation. Signal Processing Laboratory, 1997. P. 9. 4. Herrigel A., Pereira S., Petersen H. Secure Copyright Protection Techniques for Digital Images. International Workshop on Information Hiding, 1998. P. 22. 5. Ramkumar M. Data Hiding in Multimedia – Theory and Applications. New Jersey Institute of Technolog, 1999. P. 70. 6. Bender W. Applications for Data Hiding. IBM Systems Journal, 2000. P. 22. 7. Chae J., Manjunath B. A Robust Data Hiding Technique using Multidimensional Lattices. Proc. IEEE Conference on Advances in Digital Libraries, 1998. P. 8. 8. Chae J., Manjunath B. A Technique for Image Data Hiding and Reconstruction without Host Image. Proceedings of the SPIE - The International Society for Optical Engineering. 1999, P. 9. Cuche E., Marquet P., Spatial filtering for zero-order and twin-image elimination in digital offaxis holography. Applied Optics V.39, 2000. P. 4070–4075 3. Embedding data to transformation fields algorythm Real images are not realey random processes with even magnitude distribution. It is well known fact which is being used in compression algorythms, that most of the energy of the image is concentrated in the bottom of the spectrum. That's why one need to decompose the image to subbands. Stegomessage is mixed to the subbands of the image. Low frequency subbands contain most of the energy, thus having a noisy nature. High frequency are more exposed to different processing algorythms, whether it is compressing or Low Pass Filtration. Thus the best candidate for message embedding is middle frequency subbands of the image spectrum. Typical image noise distribution and image frequency spectrum processing is shown on Fig.3 Steganography in CAD/CAM/PLM. Contents. 27 Fig.3. Image noise and processing noise versus frequency Processing noise appears as a result of transformant coefficients quantization. It can be treated as reduction of correlation between the original image transformant coefficients and quantizated coefficients. For example at high levels of compression a situation can occur, when full subbands are discarded. I.e. in general noise dispersion in this subbands is infinite. There is a reduction of correlation between subband coefficients before and after quantization. To achieve acceptable results one need to average the processing noise level over many images. Transformations may be sorted by achieved gainings from encoding [13], single, Adamar's, Haar's, DCT, Wavelet. Gaining from encoding is refered to as a level of transformation coefficients dispersions redistribution. The greatest advantage gives Karhunen-Loeve transformation (KLT), the smallest - the expansion in the basis of a single pulse (ie, no conversion). The transformations that have high values of the gains from coding such as DCT, wavelet-transformation, characterized by dramatically uneven distribution of the variances of the coefficients of subbands. High-frequency subbands not suitable for investment because of the large noise processing, and bass - because of the high-noise images. So you have to be limited midranges bands in which the image noise is approximately equal to the noise processing. Since these bands a bit, then the bandwidth stegokanala small. In the case of conversion of lower gains from coding, such as Hadamard or Fourier series, there are more blocks in which the image noise is approximately equal to the noise processing. Consequently, the capacity of the above. Therefore, to increase the capacity of steganographic channel is better to use a lower conversion gain from coding, poorly suited for compression of signals. The effectiveness of the wavelet-transformation and DCT for image compression due to the fact that they are well modeled in the image processing mid-frequency request, separated by «significant» part of «insignificant». Hence, they are more appropriate to apply in the case of the active offender, as a modification of significant factors could lead to an unacceptable distortion of Steganography in CAD/CAM/PLM. Contents. 28 the image. In applying the transformation to the low values of the gains from coding violations there is a risk investments, because the conversion factors are less sensitive to modifications. Fig.4. Block of pixels (8x8) with the location of the DCT coefficients. 3.1 Embedding data in a discrete cosine transformation coefficients When we use this method, the container is divided into blocks of 8x8 pixels. DCT is applied to each block, resulting in a matrix of dimension 8x8 DCT coefficients. The coefficients are denoted by , where the - block number, 3 - the position of the coefficient within the block. If the block is scanned in a zigzag manner (as it is in JPEG), the coefficients are denoted by . The coefficient in the upper left corner is usually called the DC-coefficient. It contains information about the brightness of the entire block. The other coefficients are called ACcoefficients. Sometimes it runs monetary policy of the entire image, rather than individual units. Next, we consider some of the algorithms for implementing DCT in the field of DWM. 3.2 Koch algorithm In this algorithm in a block of 8x8 by embedding 1 bit of DWM. We describe two implementations of this algorithm can be selected pseudorandomly two or three DCT coefficients. We consider the variation of the algorithm with two selectable coefficients. Embedding information in the following manner: for the transferring of 0-bit is necessary to ensure that the difference between the absolute values of the coefficients would be greater than Steganography in CAD/CAM/PLM. Contents. 29 some positive value, and for the transferring of the 1-bit of this difference is less than some negative value: 3.3. Benham algorithm This algorithm is an improved version of the previous one. Improvements carried out in two directions: to embed all the blocks are not used, but only «suitable» for this, within a block are selected for embedding not two, but three coefficients, which reduces distortion. Suitable for building information blocks are images that are not too smooth, nor does it contain a small number of circuits. For the first type of blocks is characterized by the vanishing of the high-frequency coefficients, for the second type - very large values of several low-frequency coefficients. These features are the cut-off criterion of unsuitable units. When embedding a bit DWM pseudorandomly selected three coefficients DCT block. If you want to invest 1, the coefficients vary so much (if required) that the third factor was less than each of the first two, if you want to embed a 0, it is more than the others. In the event that such a modification would lead to degradation of the image is too large, the coefficients do not change, and this block is simply not used. Changing the three factors instead of two, and even more so the rejection of the changes in the case of unacceptable distortion reduces the error introduced by the DWM. The decoder will always be able to determine the block in which DWM is not built by repeating the analysis performed in the coder. 3.4 Podilchuk algorithm This algorithm requires the presence of the source image from a detector in the detection of a DWM. Embedded data simulated real random process with normal distribution, unit variance and zero mean. For each DCT coefficient is determined by the threshold value, above which the change could lead to degradation of the image. This threshold depends on the position of the coefficient in the matrix (i.e., the frequency range over which it is responsible). In addition, the threshold is due and the properties of the image: contrast and brightness of the block. Embedding is as follows: if the absolute value of the coefficient is less than the threshold, it does not change. Otherwise, it is added to the product of the threshold values and the values of DWM. When it detects a DWM, first the coefficients of the original image are subtracted from the corresponding coefficients of the modified image. Then calculated the correlation coefficient, and established the fact of a DWM. Steganography in CAD/CAM/PLM. Contents. 30 3.5 Hsu algorithm In this algorithm, the decoder DWM also requires the original image. However, the decoder determines not the fact of DWM, and distinguishes built-in data. As the DWM appears black and white image is half the size of the container. Before embedding the image subjected to random permutations. DWM is embedded in the mid-DCT coefficients (the fourth part of the total). These coefficients are located along the second diagonal DCT. For embedding DWM bit coefficient in the it is necessary to find the sign of the difference of the coefficient of the current block and the corresponding coefficient from the previous block: If you need to build 1, the coefficient change so that the sign of the difference was positive, if 0 - so that the sign of the difference was negative. There are a number of improvements to the basic algorithm. First, instead of the values of the coefficients, you can use their absolute values. Second, instead of the coefficient of the previous block, you can use DC-coefficient of the current block. It also takes into account the process of quantization of the coefficients: Another improvement of this algorithm is the sorting order in which blocks of the DWM are arranged in descending order in which the number of units. The blocks of the original image and the container are arranged in descending order of variances. After that holds the corresponding embedding data. This algorithm is not robust with respect to the JPEG-compression. 3.6 Cox algorithm This algorithm is robust to many signal processing operations. Detection of integrated DWM it is done using the original image. Insertion data represent a sequence of real numbers with zero mean and unit variance. For investment information using multiple AC-DCT coefficients of images with the greatest vigor. The author suggests three ways to embed DWM according to the following expressions: The first version can be used when energy is comparable to the energy DWM modifiable factor. Otherwise, either DWM will not robust or distortion is too large. Therefore, it is to embed the information is possible only with a slight change in the range of energy values of the Steganography in CAD/CAM/PLM. Contents. 31 coefficients. When it detects a DWM performs the reverse operation: compute DCT original and modified images, found the difference between the coefficients of the highest magnitude. 3.7 Barni algorithm This algorithm is an improvement of the Cox algorithm, and it also holds monetary policy of the entire image. It is no longer required detection of the source image, that is, the scheme blind. To embed a DWM are not used most AC-coefficients, and average in size. As the DWM performs an arbitrary bit string. The selected coefficients are modified as follows: Then the inverse DCT is performed and produced an additional processing step: the original and modified images are combined with weighting coefficients: Here, for the textured areas (in which the human eye is very sensitive to the added noise) and in the homogeneous regions. The value of is not for every pixel individually, and for non- overlapping blocks of fixed size. For example, as expedient to use the normalized variance of the blocks. In the DWM detector computed the correlation between the modified image and DWM, 3.8 Additive algorithms Algorithms for additive introduction of information are in a linear modification of the original image, and its recovery in the decoder is the correlation methods. In this DWM is usually added to the image container, or «fusion» in it. 3.8.1 Algorithms based on the linear data embedding In the additive methods of implementing the DWM is a sequence being implemented in the selected subset of samples of the original image commonly used expression for the embedding of information in this case: where- weighting factor, - a modified pixel. Another way to embed the watermark was proposed by Cox: Steganography in CAD/CAM/PLM. Contents. of length , which is . The main and most 32 or, with the using logarithms of the coefficients For installation in accordance with the first formula, DWM in the decoder can be found as: Here, extracting the mean a counts of the resulting image, whether or not containing CEH . After compared with the original CEH. With that as a measure of identity watermark value is the correlation coefficient sequences: This value varies in the range [-1, 1]. Values close to unity, indicate that the extracted sequence are most likely to match the built-in data. Therefore, in this case, it is concluded that the analyzed image contains a watermark. In the decoder can be installed a certain threshold, (here - default standard deviation), which determines the probability of errors of the first and second kind, when detecting DWM. The coefficient can not be permanent, and adaptively change according to the local properties of the original image. This makes the watermark more robust (resistant to removal). To increase the robustness of the implementation of the algorithms used in many broadband signals. At the same information bits can be repeated many times, are encoded using the correction code, or these may be applied to any other conversion, after which they are modulated with a Gaussian pseudo-random sequence. This sequence is a good model of the noise present in real images. At the same time synthetic images (created on the computer) do not contain noise and are difficult to seamlessly integrate a sequence. To extract the embedded information in the additive embedding scheme is usually necessary to have a CEH source image that is strong enough limits the scope of such methods. There are also blind extraction methods CEH [15], compute the correlation sequence of the coefficients of the resulting image : Steganography in CAD/CAM/PLM. Contents. with all 33 Then, the resulting value of the correlation coefficient is compared with some threshold of detection The main disadvantage of this method is that the image itself, in this case is regarded as a noise signal. There is a hybrid approach (half-blind scheme), when the information about the original image is available in the retrieval of information, but do not know the actual original image. The correlation method can only detect the presence or absence of DWM. For all the same bits of information needed to test all possible sequences, which is extremely computationally complex task. 3.9 Algorithms based on the merger of the CEH and the container If instead of a sequence of pseudorandom numbers is embedded in the image another image (eg company logo), the corresponding algorithms are called algorithms implementing the merger. The size of messages being introduced much smaller than the original image. Before embedding, it can be encrypted or transformed in some other way. Such algorithms have two advantages. First, you can prevent a distortion of the hidden message, because people will still be able to recognize it. Secondly, the presence of an embedded logo is a more convincing proof of ownership than the presence of a pseudo-random numbers. 3.10 The algorithm Chaya (Chae) The algorithm is implemented in black and white image (logo), up to 25% of the size of the original image. Before embedding the one-level decomposition is performed as an original image and logo with the Haar filter. The wavelet coefficients of the original image are denoted as wavelet coefficients of the logo - , and . The modifications are all conversion factors. First, the coefficients of each sub-band as the original image and the logo is represented by 24 bits (of which one bit is assigned to the sign). Since the size of the logo is 4 times smaller than the original image, it is necessary to increase the number of its coefficients. For this purpose, the following steps. Denote by A, B, and C, respectively, senior, middle and low bytes of the 24 - bit representation of the logo. High byte of each of these numbers represents, respectively, A, B, or C, Steganography in CAD/CAM/PLM. Contents. 34 the other two bytes are filled with zeros. Then, the advanced four unit factors logo. He then added to the element-wise 24-bit version of the original image The resulting value is displayed back to the original scale based on the minimum and maximum values of the coefficient of subband. After that is the inverse discrete VI. To remove the CEH used inverse formula This algorithm makes it possible to hide a fairly large amount of data in the original image up to a quarter of the size of the original image. 3.11 The algorithm Kandar (Kundur) Also, as in the algorithm, Chaya, and implemented the original images are of the wavelet transform. Used to embed all the coefficients of detailed subbands. Many of these factors is divided into non overlapping blocks of size are denoted , where and . The blocks and , respectively, the location factor and the level of resolution. The watermark is added to the elements of the original image as follows: – where where scale factor, calculated by the formula: – weighting matrix, which determines the frequency sensitivity of the system view of the person, - operator of the DFT. Thus, the algorithm uses a fairly complex model of human of view. For detection in the detector can be used as the calculation correlation function, and visual comparison. 3.12 Algorithms based on the quantization By quantization we mean the process of mapping a large (possibly infinite) set of values with a finite set of numbers. It is clear that this is accompanied by a decrease of information due to its distortion. The quantization is used in compression algorithms. There are scalar and vector quantization. In vector quantization, as opposed to a scalar, the map is not of a single frame, and their combination (vector). From information theory it is known that vector quantization on the Steganography in CAD/CAM/PLM. Contents. 35 effective scalar degree of compression, having a greater complexity. In steganography are used both types of quantization. In the encoder quantizer entire range of the original set is divided into intervals and each interval representing the number of his chosen. This number is a code word and the quantizer is usually the centroid of the interval of quantization. The set of code words is called a workbook quantizer. All values that fall in this interval are replaced by the encoder to the corresponding code word. In the decoder, the number of accepted matches a certain value. Quantization interval is usually referred to as quantizer step. Embedding data using the quantization refers to non-linear methods. Transmitted message has limited power to perform its stealth requirements. Interference is the original signal and another Gaussian noise - noise processing (quantization). Encoder source signal is known, the decoder has to retrieve CVD without the knowledge of both components of the noise. There are numerous methods to improve Costas (to combat the noise), consisting in the use of structured quantizers (eg, lattice or a tree). Most preferably, the introduction of information in the spectral region of the image. If this linear methods are used, then the embedding CEH produced in the middle of the band. This is because the energy of the image is concentrated mainly in the low-frequency (LF) region. Consequently, the detector CEH in this area there is a loud noise of the signal. In the highfrequency (RF) fields of the noise has a large amount of processing, such as compression. In contrast to the linear and nonlinear circuits embedded information can be used bass region, since the power being introduced CEH does not depend on the amplitude ratios. This is explained by the fact that the non-linear algorithms to hide the correlation detector is not used, the coefficients of small and large amplitude are treated equally. Section 4. Classification and comparative analysis of methods and means of embedding data into various containers. Questions for self-examination and discussion in seminars. 1) adopted terminology. 2) Theoretical principles of steganography based on the terminology used. 3) Comparative analysis of the means of embedding data in a variety of containers. Literature to explore themes. 10. Gribunin V.G. Binding I.N., Turintsev I.V. Digital Steganography. M.: SOLON-Press, 2002. 272 pp. 11. Kutter M. Watermarking Resisting to Translation, Rotation, and Scaling. Signal Processing Laboratory, 1998. P. 10. Steganography in CAD/CAM/PLM. Contents. 36 12. Kutter M. Digital Signature of Color Images using Amplitude Modulation. Signal Processing Laboratory, 1997. P. 9. 13. Herrigel A., Pereira S., Petersen H. Secure Copyright Protection Techniques for Digital Images. International Workshop on Information Hiding, 1998. P. 22. 14. Ramkumar M. Data Hiding in Multimedia – Theory and Applications. New Jersey Institute of Technolog, 1999. P. 70. 15. Bender W. Applications for Data Hiding. IBM Systems Journal, 2000. P. 22. 16. Chae J., Manjunath B. A Robust Data Hiding Technique using Multidimensional Lattices. Proc. IEEE Conference on Advances in Digital Libraries, 1998. P. 8. 17. Chae J., Manjunath B. A Technique for Image Data Hiding and Reconstruction without Host Image. Proceedings of the SPIE - The International Society for Optical Engineering. 1999, P. 18. Cuche E., Marquet P., Spatial filtering for zero-order and twin-image elimination in digital offaxis holography. Applied Optics V.39, 2000. P. 4070–4075 4. A choice of a method of embedding of DWM (digital watermark) in the image-container Embedding of DWM is possible thanks to peculiarity of system of perception of the person. It is well known that images possess big psychovisual redundancy. The eye of the person is similar to the low-frequency filter therefore especially imperceptible there are distortions in high-frequency area of a range of spectrum. For negotiation of influences of a printing-down and scan-out the most successful there were the methods which have received the name of the modulations methods of the image-container, and modulation can be carried out both in frequency [2-5], and in spatial areas of the image [7,8]. For compensation of geometrical distortions such as shift, turn and change of scale of the image is used the polar logarithmic system of coordinates with a corner and logarithmic radius on axes of coordinates [3] or is applied transformation of Mellinga [2] invariant to turn and scale. In case introduction of DWM in frequency area of modulation are exposed peak components of a complex range of the image container [3] . For this purpose previously is made calculation peak and phase partials components of transformation of Fourier. For a characterization of consequences of the geometrical distortions connected with casual turn, shift or scale change, in the image-container, except DWM, the imagetemplate [9] is built in. In case introduction of DWM in spatial area the signal of DWM is built in by modulation of the initial image-container, and extraction DWM (demodulation) is carried out by means of a linear filtration of the image [7]. If the image is color, a signal of DWM takes root by updating of values of pixels into Blue channel the RGB of the image [8]. Updating is carried Steganography in CAD/CAM/PLM. Contents. 37 out either addition, or subtraction depending on value of the introduced bit of DWN of brightness of the image-container. 4.1. The methods using as containers audiofiles For reliable concealment of data in the acoustic channel the system of concealment must reply the following requirements: to be resistant to everywhere used algorithms of compression with losses not to bring in a signal distortions perceived by human hearing not to bring appreciable changes in container statistics De facto a standard format of sound files at the moment is the MP3 format. Therefore, work not defiant suspicions of stegosystem in the acoustic channel should be based on this format. MP3 - the full name MPEG 1 Layer 3 - a format of coding of the sound files, entering into a standard of coding of a image information of MPEG 1. Basic feature of a format is compression with losses: after packing and unpacking of the sound file by means of MP3 result isn't a bit-by-bit copy of the original. Over again, when coding insignificant components are purposefully excluded from a packed signal. At preservation of acceptable quality, a MP3 allows to compress sound data in ten and more times. It is reached by the accounting of features of human hearing, including effect of masking of a weak signal of one range of frequencies more powerful signal of the next range when it takes place, or a powerful signal of the previous frame causing temporary falling of sensitivity of an ear to a signal of the current frame (minor sounds are removed which aren't heard by a human ear because of existence during this or previous moment of another, louder ). It is considered as inability of the majority of people to distinguish signals, on capacity lying below a certain level, a miscellaneous for different frequency ranges. This process is called as adaptive coding and allows to save on the least significant from the point of view of perception the person sounding details. Extent of compression (therefore and quality), is defined by width of a data flow set at coding - bitrate. As well as in the considered case of introduction of information in images, algorithms of introduction in audiofiles place hidden data or in an uncompressed signal before its compression, or it is direct in the compressed signal - as a rule, in entropic compressed coefficient of transformation. Some methods as use for concealment not an audiosignal as that, and various features and office information of files-containers. Steganography in CAD/CAM/PLM. Contents. 38 Let's consider at first algorithms of concealment of data in an uncompressed sound stream. 4.2 Broadband coding. In a signal is added modulated by the message the noise with amplitude slightly above a masking limit . Advantage of this scheme is effectiveness performance and high capacity, a shortcoming - heard distortions brought in a signal. At concealment of one bit in sequence of coefficient the target sequence is calculated as follows: where - casual binary sequence, - threshold of audibility of i subband , - the hidden bit. For calculation of a threshold of audibility the can be used psychoacoustic model containing in a format of coding of a MP3, or any other . Thus, the method allows to operate psychoacoustic nature of distortions brought in a signal. For extraction of the hidden bit from sequence of coefficient is used function of correlation of the accepted coefficient and initial casual sequence. It should be noted that because of unreliability of extraction this method demands use of codes of correction of mistakes. It leads to reduction as speed, and capacity of a method. 4.3 Phase coding. In this method that fact is used that the human ear perceives not values of a phase, but only their difference. The signal breaks into segment, values of a phase on the first segment are used for coding of the hidden message, value of phases of other segment so that the difference of phases between segment remained invariable. For coding of values of phases, on a crowd of phases is allocated the set of evenly distributed values corresponding to bits 0 and 1. Value of a phase is replaced with the next value corresponding to the demanded bit. The difference of values in a set depends on frequency of a strip, and varies from sensitive strips to on on high-frequency strips. For coding of one bit of the hidden message is used a certain sequence of changes of phases, various for coding 0 and for coding 1. For extraction of the hidden message the following Steganography in CAD/CAM/PLM. Contents. function of detection is used: 39 where - amplitude and the phase i-go of the received signal. - expected sequence of phases in the process of coding bit 1. - expected sequence of phases in the process of coding bit 0. and - the next to the values of phases corresponding 1 and 0. If , the bit of the hidden message is accepted equal 1, differently 0. Method provides high efficiency of coding by criterion of the signal/noise, however its capacity of the relation is insignificant, and makes from 8 to 32 bits a second. 4.4 The echo-coding. Uses non-uniform intervals between an echo-signals for coding of sequence of values. When overlapping a number of restrictions be observed condition of obscurity for human perception. The echo is characterized by three parameters: initial amplitude, extent of attenuation, delay. At achievement of a certain threshold between a signal and an echo they mix up. In this point of people can't distinguish these two signals. It is difficult to define existence of this point, as it depends on quality of initial record and the listener. As a rule, the delay about one thousand second that is quite acceptable for the majority of records and listeners is used. Two various delays are used at zero and unit coding. These both delays should be less, than a threshold of sensitivity of an ear of the listener to a received echo. 4.5 Noise replacement. In this method that fact is used that the human ear perceives not so much a form, how many energy of noise. As in the MP3 format is completely coded the form noisy frequency subband , data subband can be used for concealment of data. The entrance signal is transformed to frequency area by means of the modified discrete cosine transformation (MDKP) used in a MP3. At concealment of one bit in sequence of coefficient, the target sequence is calculated as follows: где - Random binary sequence, Steganography in CAD/CAM/PLM. Contents. 40 When extracting the hidden bits, as in the case of wideband coding using the correlation function of the coefficients and adopted the original random sequence. As proposed to use the noisy bands with frequencies above 5 kHz. It should be noted that the method is stable with respect to the MP3 compression, since the algorithm MP3 encoding does not change the signs of the coefficients MDKP. Capacity method ranges from 20 to 60 bits per second. The method also quite simple to implement, because it is based on widely implemented on different platforms MDKP algorithm, which is a part MP3 encoder. In general, methods of hiding data in an uncompressed audio stream are a number of serious disadvantages: Possible visibility when listening; Limited bandwidth; Implementation complexity. Introduced into the signal unnatural distortion in the signal, such as white noise a certain amplitude, discrete phase of the signal, etc., can be high probability of finding the specific methods of detection. Thus, the algorithms are more promising to reveal more details 'Directly into the compressed MP3 stream'. At the current time is invited to a series of algorithms that use the data to hide proprietary information MP3, the most famous of these is the ability to 'mp3stego'. This algorithm modifies MP3 encoding process, so that the LSB official fields frame MP3, for example, the volume of information within the main frame coincide with the current bit obscure. The features of the method are almost unnoticeable when listening; high complexity of implementation and slow work, as it is necessary to complete the entire MP3 encoding process, the capacity of 50 bits per second. It should be noted that the information entered in the Service lead to changes discrepancies in the results of these methods with the results of the standard Encoder MP3. Such changes can be detected with high probability the enemy. As a faster alternative, we proposed a method of concealment data using a particular format MP3 - interframe gaps. Steganography in CAD/CAM/PLM. Contents. 41 The data stream consists of MP3 frames - plots the data encoding 26ms audio signal. Each frame contains a 4-byte header containing a synchronizing word and service information. Service information includes, in particular, the version format, stereo mode and bitrate. These values uniquely determine the frame size. The number of bytes needed to compress the sound with a given quality depends on the characteristics of a particular sound. Thus, the difficult to compress signal sections with more detail requires more bytes than the simple ones. On this basis, MP3 allows for storage of compressed data frame in the remaining unoccupied bytes the previous frame. In order to properly positioned in the frame header specifies the offset to the beginning of the data. Tag end of the data itself is not, decoding stops at the end extracting the required number of cosine transform coefficients. Any information between the end of one frame and the beginning of the next data the frame is ignored decoder, respectively, that is where you can place hidden data. To do this, the frame size increases by increasing its bit rate by one level, for example, 128kbits / c up to 160kbit / c. This method does not introduce any distortion in the sound-box, easy, fast has a large bandwidth (about 20% of the container). However, knowing concealment algorithm is easy to detect the presence of hidden information, based on from the fact that the standard MP3 stream is no «extra» bytes. Thus, the method can be used only when needed rapid transfer of large amount of information and is not expected serious opposition the enemy. The most resistant to the discovery of a method for concealing errors in the quantization MP3 of the coefficients. MP3 encoding is built in a classic case of compression with losses, which consists of three steps: Convert the signal to a lot of information about the signal was concentrated in a small number of coefficients. In the MP3 used a modified discrete cosine transform. Quantization, that is, dividing the coefficients obtained for certain values and then rounding the result to the nearest whole number. At this stage there is a loss of information. The values of the quantization of dividers to MP3 evaluated on the basis of a given bit rate and the psychoacoustic model that determines the maximum allowable noise level. The entropy of lossless compression. In MP3 compression is used with static Huffman codes. Obtained during the quantization integer coefficients can be directly used for hiding data, eg by embedding in the least significant bit. This, however, introduces considerable noise in the Steganography in CAD/CAM/PLM. Contents. 42 output signal and with high probability can be detected. Can be used to conceal only part of the coefficients, choosing them as to minimize the distortion introduced. Since the modified rate differs from the original by not more than 1, minimizing the total deviation from the original signal is reduced to the selection coefficients with the fractional part is close to 0.5. In addition, to maintain the structure stream of compressed data, the coefficients are selected, the modification which does not change size of the encoding of speech, in particular, are discarded with zero coefficients value. There is a problem decoding at the receiver - decoder has no information about what factors are used to hide, that is, message should be presented as a function of the decoder to a known vector of bits all the coefficients, as used, or not. Using this as a multiplication by a function common to the sender and receiver given by secret key matrix, a system of linear algebraic equations, which the sender solves for the vector-bit coefficients. Do not be modifying factors determine the values of some variables. Maximally possible size of the message, in which the system has a solution tends to the number of modifiable factors in the increase of the number thus, the method allows no loss of capacity used to hide arbitrary elements of the container. Structure of entropy coding in MP3 imposes additional restrictions on permissible to modify the coefficients. The coefficients in the one block divided into three groups, each of which is packaged with a separate Huffman table. The first two groups are packed in pairs as follows: in the flow written code from the table corresponding to the pair, after which the sign bits are written each sample. Numbers greater than the maximum for the table are coded as the maximum possible count, plus the number of bits determined by the table, written after the code that contains the number added to the value. The last block of coefficients is encoded fours with the possible values coefficients -1, 0, 1. The length of blocks contained in the overhead frame that allows us to calculate the number of zero values of samples at the end of the frame. Changes in the coefficients of the last block, ie, replacement of -1 and 0, 0 and 1, will change the size of the compressed coefficient (because of the appearance or disappearance sign bit), which in turn can lead to structural damage of MP3 files - information will be more or less than the allocated space for it in the frame. From the coefficients of the first two blocks of modifications to be no more than one factor in the pair, and the need to retrofit a pair of code size coincided with the size of the source code. Steganography in CAD/CAM/PLM. Contents. 43 Typically, this condition is satisfied for codes large numbers. Percentage of available coefficients decreases rapidly with decreasing bit rate, as more coefficients are coded zero or close to zero values. These limitations lead to a screening of about 85% of the appropriate coefficients. Maximum permissible deviation of the fractional part of the coefficient of 0.5 is defined based on size of the message, which should hide in the container so that the number of available coefficients were close to the maximum message size. In order to achieve acceptable levels of performance of the method, MP3 stream is divided on the staff of the same size. The number of frames in the groups selected in order that the number of modifiable factors they had about the same. In each group, hiding SLAE is solved independently. Thus, the despite the fact that while the Gauss method in each group is proportional to the cube the number of equations, the total time increases linearly with the number of factors used. However, each group must contain a certain the number of bits of the service, which recorded the length of the message in this group. Hence the smaller the group, (and faster method), the more bits spent on the service information. This method of protection from high throughput detection provides the ability to order a half per cent of the container. It is well suited for situations where the expected counter-informed enemy. Theme 5. Steganalysis: the terminology, the basic theoretical aspects. Questions for self-examination and discussion in seminars. 1) adopted terminology. 2) Theoretical propositions steganalysis based on accepted terminology. 3) Example histogram steganalysis. Literature to explore themes. 1. Mitchell T. Machine Learning. "— McGraw-Hill, 1997. 2. Farid H., Lyu S. Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines // Information Hiding. "— 2002. "— pp. 340–354. 3. Farid H., Lyu S. Steganalysis using color wavelet statistics and one-class support vector machines // Security, Steganography, and Watermarking of Multimedia Contents. "— 2004. — pp. 35–45. Steganography in CAD/CAM/PLM. Contents. 44 4. Cristianini N., Shawe-Taylor J. An introduction to support vector machines and other kernel-based learning methods. "— Cambridge University Press, 2000. "— March. 5. Schoelkopf B., Sung K., Burges C. et al. Comparing Support Vector Machines with Gaussian Kernels to Radial Basis Function Classifiers: Tech. rep.: Massachusetts Institute of Technology, 1996. 6. Bedi C., Goyal H. Qualitative and Quantitative Evaluation of Image Denoising Techniques// International Journal of Computer Applications. — 2010. — October. — Vol. 8, no.14. — pp.31–34. 7. Pevný T., Fridrich J. Merging Markov and DCT Features for Multi-Class JPEG Steganalysis // Proceedings SPIE, Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents IX. "— Vol. 6505. "— 2007. 8. Pevný T., Bas P., Fridrich J. Steganalysis by subtractive pixel adjacency matrix // Trans. Info. For. Sec. "— 2010. "— June. "— Vol. 5. "— pp. 215–224. 5.The market overview of steganography software Blindside is an application of steganography that allows one to conceal a file, or set of files within a standard computer image. The new image looks identical to the human eye, but can contain up to 50k or so of secret data. The hidden files can also be password encrypted, to prevent unauthorised access to their data. DataMark Technologies currently market four digital steganography products StegComm for confidential multimedia communication, StegMark for digital watermarking of digital storage media, StegSafe for digital storage and linkage and StegSign for e-commerce transactions. Each software product is packaged into a Standard version and a Professional version. While the Standard versions cater to the general needs of our customers, additional security and accessibility features are found in Professional versions. Digital Picture Envelope is a program you can make your secret data imperceptible to any human eyes. So, you can store/send it very safely in/through your computer. Actually, it can embed your secret data in a vessel image (we call it a "dummy" image, or a "picture envelope") without changing the visual quality of the dummy image.It does not change even the file size. If you want to see the secret data, you can easily restore it from the secret- embedded dummy image. Steganography in CAD/CAM/PLM. Contents. 45 The program gifshuffle is used to conceal messages in GIF images by shuffling the colourmap, which leaves the image visibly unchanged. gifshuffle works with all GIF images, including those with transparency and animation, and in addition provides compression and encryption of the concealed message. Hide4PGP is a freeware program distributed as source code in ANSI C and precompiled executables for DOS (any version but 1.x - is there one outside the museum?), OS/2 (Warp and up), and the Win32 console (9x and NT). It's purpose is to hide any data in a way that the viewer or listener does not recognize any difference. InThePicture Encrypt Files & Messages into redundant space in Windows Bitmap (BMP) image files. Invisible Secrets hides your private data into innocent looking files, like pictures, or web pages. It also features: strong encryption algorithms; a locker that allows you to password protect certain applications; a password management solution and a realrandom password generator; a shredder that helps you destroy beyond recovery files, folders and internet traces; the ability to create self-decrypting packages; secured password transfer. JPHIDE and JPSEEK are programs which allow you to hide a file in a jpeg visual image. There are lots of versions of similar programs available on the internet but JPHIDE and JPSEEK are rather special. The design objective was not simply to hide a file but rather to do this in such a way that it is impossible to prove that the host file contains a hidden file. Given a typical visual image, a low insertion rate (under 5%) and the absence of the original file, it is not possible to conclude with any worthwhile certainty that the host file contains inserted data. As the insertion percentage increases the statistical nature of the jpeg coefficients differs from "normal" to the extent that it raises suspicion. Above 15% the effects begin to become visible to the naked eye. Of course some images are much better than others when used a host file - plenty of fine detail is good. A cloudless blue sky over a snow covered ski paradise is bad. A waterfall in a forest is probably ideal. P3Stego will hide information in MP3 files during the compression process. The data is first compressed, encrypted and then hidden in the MP3 bit stream. Although MP3Stego has been written with steganographic applications in mind it might be used as a copyright marking system for MP3 files (weak but still much better than the MPEG copyright flag defined by the standard). Any opponent can uncompress the bit stream and recompress it; this will delete the hidden information -- actually this is the only attack we know yet -- but at the expense of severe quality loss. Steganography in CAD/CAM/PLM. Contents. 46 NICETEXT is a package that converts any file into pseudo-natural-language text OutGuess is a universal steganographic tool that allows the insertion of hidden information into the redundant bits of data sources. The nature of the data source is irrelevant to the core of OutGuess. The program relies on data specific handlers that will extract redundant bits and write them back after modification. In this version the PNM and JPEG image formats are supported. In the next paragraphs, images will be used as concrete example of data objects, though OutGuess can use any kind of data, as long as a handler is provided. Scramdisk is a program that allows the creation and use of virtual encrypted drives. Basically, you create a container file on an existing hard drive which is created with a specific password. This container can then be mounted by the Scramdisk software which creates a new drive letter to represent the drive. The virtual drive can then only be accessed with the correct passphrase. Without the correct passphrase the files on the virtual drive are totally inaccessible. The program snow is used to conceal messages in ASCII text by appending whitespace to the end of lines. Because spaces and tabs are generally not visible in text viewers, the message is effectively hidden from casual observers. And if the built-in encryption is used, the message cannot be read even if it is detected. SteganoGifPaletteOrder Hiding data into the palette of a GIF file. Steganos hides secret information in sound, image, and text files. This sensitive data is being encrypted beforehand. That way files can be sent over the Internet without being discovered by a third party. Stego Hide and recover encrypted data in your GIF files StegParty is a system for hiding information inside of plain-text files. Unlike similar tools currently available it does not use random gibberish to encode data -- it relies on small alterations to the message, like changes to spelling and punctuation. Because of this you can use any plain-text file as your carrier , and it will be more-or-less understandable after the secret message is embedded. wbStego is a tool that hides any type of file in bitmap images, text files, HTML files or Adobe PDF files. The file in which you hide the data is not optically changed. It can be used to exchange sensitive data securely or to add hidden copyright information to the file. TextHide Software to hide any data in unsuspicious text in order to store or communicate secrets (textual steganography). Steganography in CAD/CAM/PLM. Contents. 47 6. Statement of the problem of detection of hidden messages. The vast majority of methods for detection of hidden data is based on an analysis of the characteristics of the probability distribution of the container elements. This allows you to predict the enemy's actions in solving the problem of detection of hidden data. The following is a mathematical model of the basic most probable enemy action, based on the provisions of detection theory. Adoption of a solution enemy hidden in the target data carrier is not performed on a single value of a quantity characterizing the contents of the media, and throughout the carrier, i.e. based on a sample consisting of N values of the implementation that makes better use of a priori information and to receive the greater good than the more significant sample size N. Thus, the task of the enemy on the development of detection methods can be interpreted as an optimization problem: P обн - probability of detection, Pлт – false alarm where a collection of empty containers, the function of hiding data - detection, F(I) = 1 if the decision is "YES" F(I) = 0 if the decision is "NO" We write the function of detection by assessing: - The threshold score. Since the containers are used as sources of excess real signal, the contents of the container can be divided into signal and "noise", where the noise is understood sampling noise, quantum noise, etc. the distortions introduced in the "ideal" signal. In the case of non-volatile media as containers for the noise we mean the unused blocks of the file system. Imagine the container as Steganography in CAD/CAM/PLM. Contents. 48 I = L +G Where - the container without the noise, - noise is present in the container. Then Where - the weight of the corresponding estimates. It is clear that with increasing resources enemy, particularly the number of empty containers available, estimation is improved: Besides the introduction of hidden data in the signal-to-container could result in «visible» outside observer distortions. Accordingly, based on the results of the analysis and of a hidden data channel practicable algorithms for data hiding place hidden in the noise of the data container: Thus, the optimal method for detection of hidden data is constructed based on the following algorithm of detection: Select the noise parameters from the provided container for analysis using the selected method of isolating the noise N, The decision is "YES" or "NO" depending on the evaluation of hidden data in the selected noise Consequently, the task of developing a detection method can be represented as a function of searching for an optimal evaluation and optimal allocation function Noise The task of constructing a noise estimation is the task of classification. According to its interpretation in the present case is required to construct an algorithm which assigns to the noise obtained from the presented analysis for the container to one of two classes - the class of noise containing hidden data or class of noises that do not contain hidden data. The object in this case, Steganography in CAD/CAM/PLM. Contents. 49 noise can be represented as a vector consisting of separate noise characteristics. The algorithm uses the sample selection, which consists of a set of empty and full containers. Application 1 PROGRAM for the discipline «Steganography in CAD/CAM/PLM». 1. Goals and objectives of the discipline: Familiarize students with various methods of steganography, used for hiding the project documentation in CAD/CAM/PLM during the data exchange within secure channels of communication and on peripheral storage devices. Main group of methods to be studied consists of the following group methods: • Classical steganography has been widely used, including in recent historical times and the present day. • Computer steganography - the branch of the classical steganography based on the characteristics of computing platform.( hiding data in unused fields of file formats, the substitution of characters in file names etc). • Digital steganography - the branch of the computer steganography, based on the data hiding within digital objects of the analog origin, i.e. multimedia objects (image, video stream, etc) Hiding data on various storage devices and in different channels of communication. 2. The study of this discipline is based on the following knowledge: - Mathematical analysis. (Fourier series and integrals, discrete spectral transforms, the theory of functions of complex variable theory of differential equations,special functions, - Linear Algebra. (The algebra of logic, algebra, fuzzy logic) - Probability theory (the theory of stochastic processes) 1. - Requirements for the results of the development of disciplines: 3. As a result, the discipline the student must: to know: • Elements of the theoretical foundations of classical steganography. • Elements of the theoretical foundations of computer steganography - hiding data in unused fields of file formats, the substitution of characters in file names, text steganography, the transmission of data within secure channels, etc. • Elements of the theoretical foundations of digital steganography - hiding data in digital objects with the analog nature, that is, the multimedia objects (images, videos, sounds). Steganography in CAD/CAM/PLM. Contents. 50 To be able to: • study new methods of embedding of the stego message into different containers on their own. • Assess the reliability of different implementations of steganography techniques possess. • Skills of the assessment of the subsystem’s ability to protect a data from an unauthorized access in various communication channels. • Skills of development of the software and the hardware complexes to protect the external storage devices from the unauthorized access and copying. 4. The volume of disciplines and types of training activities Type of school work Class work (total) Hours (Total) 52 Including: lectures 34 Workshops (as part of the complex) 18 Home work (total) Summary*) Type of certification (test, exam) 92 The total labor output ratio hours 92 test Note: Seminars are held in the conjunction with lectures. Lectures and seminars form complexes. *) The student must defend his summary during the colloquium. 5. Contents of discipline. The content of the complexes of discipline The name of the complex The theoretical foundations of computer steganography. Steg’s preparation Theoretical Foundations of digital steganography Сontent of the complex The methods of the data and signals concealing at the physical level. Special types of signal modulation. Special encoders and decoders. Scrambling in the channels of communication. Methods of optical, acoustic and radio holography. Formulation and solution of inverse problems in optics, acoustics, and radio. Theoretical Foundations of digital steganography methods based on the data hiding within digital objects of the analog nature. Steganography in CAD/CAM/PLM. Contents. Volume 10 20 12 51 Theoretical Foundations Mathematical methods for detection and of Steganalysis identification of stego into different containers 6. The content of the workshop (held in parallel with the lectures) 10 The discipline complex Software implementation of the spatial signal processing techniques. Software implementation of methods for solving the inverse problem. Software implementation of simulation methods of the messages embedding into different containers in computer steganography Software implementation of simulation methods of the messages embedding into different containers in digital steganography Software implementation of methods for steganalysis 7. Dining assignments for seminars means MathCAD 1. Workshop number 1. Determination of functions and definition of derivatives I). Find function values at x = 1. II). Find the derivatives of the function. 1. f ( x) 2 f ( x) 3 5 1 2 x 4 7; 4 3 5 2x x 4 5 1 7 x 6 2; 7 3 5 6x x 3. f ( x) 3x 2 1 3 1; 7 3 2 7x x III) Steganography methods. 1. Method LSB. 2. Hiding data in an image by Cutters. 3. Research on the influence of noise on the concealment method Cutters. 4. Steganography images using Patchwork. 5. Steganography sound method Patchwork. 6. Research on the influence of noise on the concealment method LSB. Educational-methodical and informational support disciplines: a) The basic literature http://www.cl.cam.ac.uk/~fapp2/steganography/ http://www.demcom.com/english/steganos/ Steganography in CAD/CAM/PLM. Contents. 52 http://eprint.iacr.org/2005/305 http://www.topreferats.ru/comp/6636.html http://www.signumtech.com b)Further Reading 1.Pereira S., Joseph J., Deguillaume F. Template Based recovery of Fourier-Based Watermarks Using log-polar and Log-log Maps. IEEE Int. Conf on Multimedia Computing and Systems, 1999. P. 5. 1. Lin Ch-Y., Chang Sh.-F. Distortion Modeling and Invariant Extraction for Digital Image Print-and Scan Process. International Symposium on Multimedia Information Processing, 1999. P. 10. 2. Lin Ch-Y., Chang Sh.-F. Public Watermarking Surviving General Scaling and Cropping: An Application for Print-and-Scan Process. Multimedia and Security Workshop at ACM Multimedia, 1999. 3. Pereira S., Thierry P. Fine Robust Template Matching for Affine Resistant Image Watermarks. IEEE Trans. on Image Processing, 1999. - P. 12. 4. Kutter M. Watermarking Resisting to Translation, Rotation, and Scaling. Signal Processing Laboratory, 1998. P. 10. 5. Kutter M. Digital Signature of Color Images using Amplitude Modulation. Signal Processing Laboratory, 1997. P. 9. 6. Herrigel A., Pereira S., Petersen H. Secure Copyright Protection Techniques for Digital Images. International Workshop on Information Hiding, 1998. P. 22. 7. Anderson R., Needham R., Shamir A. The Steganographic File System// Proceedings of the Second International Workshop on Information Hiding. — «Springer-Verlag, 1998.» — Pp. 73–82. 8. McDonald A., Kuhn M. StegFS: A Steganographic File System for Linux // In Information Hiding. "— 1999. "— Pp. 462–477. 9. Varun S., Shibin K. Magikfs – The Steganographic Filesystem On Linux // http://magikfs.sourceforge.net. 10. Chetan G. Dissecting NTFS Hidden Streams// http://www.forensicfocus.com/dissecting-ntfs-hidden-streams. Steganography in CAD/CAM/PLM. Contents. 53 11. Guillaume T. A few thoughts about steganography// http://www.guillermito2.net/stegano/ideas.html. 12. FIPS publication 197 Advanced Encryption Standard. — Federal Information Processing Standards Publ., 2001. 13. Fruhwirth C. New Methods in Hard Disk Encryption// http://clemens.endorphin.org/nmihde/nmihde-A4-os.pdf. Appendix Check lists. 1. A comparison of cryptographic capabilities and methods of steganography to hide data transmission channels transmit messages. 2 . What are the differences and similarities of methods of computer and digital steganography. 3 . Analyze vulnerabilities steganographic system based on its structural scheme. 4 . Analyse the "possibilities" of Eve in an attempt to identify the correspondence of Alice and Bob . 5 . Identify capacity constraints successfully hide data in images. 6. Contrast can be successfully hide data files containing images and audio files in digital steganography algorithms discussed . 7. Are there fundamental ( teoretichiskie ) constraints on development , the development of new methods of digital steganography. 8. Are there fundamental limitations in the development and the development of new methods of computer steganography. 9. Assess vulnerabilities in applications directories FAK stegosystem Steg FS. 10 . Determine fundamentally original method of digital steganography from those described in the manual . The comparative analysis of these methods by " originality ." 11. Determine the fundamental differences in the formulation of cryptanalysis and steganalysis . Steganography in CAD/CAM/PLM. Contents.