Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Encryption Security

Encrypt Information In Images Without Distortion 236

Nomikos writes "C|Net reports: Researchers have created a new way to encrypt information in a digital image and extract it later without any distortion or loss of information. A team of scientists from Xerox and the University of Rochester said that the technique, called reversible data hiding, could be used in situations that require proof that an image has not been altered."
This discussion has been archived. No new comments can be posted.

Encrypt Information In Images Without Distortion

Comments Filter:
  • Signed Hash (Score:4, Insightful)

    by notestein ( 445412 ) on Wednesday October 23, 2002 @10:40PM (#4518887) Homepage Journal
    How is this better than a signed hash of the image?
  • Re:Signed Hash (Score:2, Insightful)

    by sharph ( 171971 ) <sharp@sauropod.org> on Wednesday October 23, 2002 @10:47PM (#4518918) Homepage
    Of course I could be completely wrong...but...

    If you resize the image, you get a different hash, but with this, you still get the authentication. And then when you have portions of the image changed you can tell what portions are changed... From what I can tell this is just a special "image hashing" and not Steganography at all.

    Of course, I could be completely wrong.
  • Huh? (Score:1, Insightful)

    by Anonymous Coward on Wednesday October 23, 2002 @10:49PM (#4518926)
    WTF is this supposed to prove?
  • Wow! Stupid Idea! (Score:2, Insightful)

    by wahay ( 12517 ) on Wednesday October 23, 2002 @10:51PM (#4518938) Homepage
    Ok. so we have a picture, which we then sign with a certificate of some sort. So far, so good. You can verify the picture.

    But what do we do next? We corrupt our picture with the signature, tossing it's bits into the picture as noise, and degrading the picure for all the people who open it. Except for the chosen few who have the (proprietary? patented? expensive?) program which chan detect the signiture, read it, and (WOO HOO!) XOR it out of the picture.

    This is not an exciting improvement over "gpg -s".
  • by intuition ( 74209 ) on Wednesday October 23, 2002 @10:51PM (#4518939) Homepage
    This is steganography with the original image hidden in the steganography as well. Hence the term, "reversible data hiding." That way, not only does the current image hold the data you are sending, but you get a copy of the original image (before steganography) as well.

    The fact that every poster so far hasn't seen this fact, is a disturbing reminder of what the average poster on slashdot has become.

    does anyone have any suggestions as to where to go next?

  • by Crag ( 18776 ) on Wednesday October 23, 2002 @10:53PM (#4518951)
    "For instance, a digital camera that carries the new algorithms could be used to gather forensic evidence for use later in a courtroom. Any subsequent manipulations of the pictures could be detected, and the area where they occurred could be pinpointed."

    Whatever the camera is doing at the scene of the crime could be faked in a lab. Even if each camera has its own PGP/GPG key, the picture is only as reliable as the security of the camera and the key.

    What they should do is have the crime scene photographer and his superior digitally sign the images at the crime scene. This would remove the image format from the equation and make the data and the image as secure as the keys of the people involved.
  • Pointless? (Score:2, Insightful)

    by interiot ( 50685 ) on Wednesday October 23, 2002 @11:03PM (#4519014) Homepage
    This seems pointless to me. The image that the common person sees isn't undistorted. To reverse the distortion in the image, you have to run the special program that extracts the hidden data and the original image data as well. If they're planning on everyone having this program that undistorts the image, why don't they just create a new format that's simply {raw image} + {extra data}, and you can run a program that spits out two files from that. If they're planning on having limited usage of the undistorting program to specific people, why don't the authors of the image send two separate files specifically to the intended audience?

    Does anyone know of a good use for this?

  • by wirelessbuzzers ( 552513 ) on Wednesday October 23, 2002 @11:07PM (#4519037)
    Although I don't really see the point. It's not really worth much as steg as far as I can see, and if the data you change are redundant anyway, you might as well compress them out unless you want to do steg. Silly.
  • by Anonymous Coward on Wednesday October 23, 2002 @11:07PM (#4519038)
    While this approach has many potentially socially useful applications (e.g., getting data out of censorship regimes without getting caught), it also has a more sinister application.

    If you can "watermark" (not sure if that is technically the right term for what these folks are proposing) something in such a way that it is undetectable to the viewer, then that implies that you can attach a unique ID to any given file -- which is exactly what SDMI attempted to do (and failed, thanks to Prof. Felten's work at Princeton).

    But didn't Felten's paper essentially demonstrate that this sort of perfect information hiding was essentially impossible theoretically? If so, then the Xerox/Rochester guys are wrong. If not, then Felten's paper is wrong and it is possible to insert permanent SDMI-style watermarks in files. I sure hope it's the former and not the latter.

    Perhaps this new approach only has to do with psychovisual tricks and not psychoacoustic stuff -- in which case I suppose they could both be right. Anyone more knowledgeable about this care to comment?

    -Garth M.

  • Re:New? (Score:4, Insightful)

    by the eric conspiracy ( 20178 ) on Wednesday October 23, 2002 @11:13PM (#4519071)

    I've had that technique for years. It's called a checksum.

    All a checksum does is provide a playground for anyone with a little Linear Algebra background.

    Now if you are talking about message digests based on hash function, like SHA or HMAC you are on firmer ground.

  • This is great! (Score:5, Insightful)

    by seanadams.com ( 463190 ) on Wednesday October 23, 2002 @11:22PM (#4519117) Homepage
    Researchers have created a new way to encrypt information in a digital image and extract it later without any distortion or loss of information.

    So, if I can add some information to an image without any loss of information in the original, then I don't see any reason why I couldn't use this technique repeatedly, ad inifinitum, on the resulting image. Therefore, they have created a way to turn any one of my pr0n jpegs into an unlimited storage device.

    This really changes everything we thought we knew about computer science and information theory. What an incredible discovery!
  • Re:Signed Hash (Score:5, Insightful)

    by packeteer ( 566398 ) <packeteer AT subdimension DOT com> on Wednesday October 23, 2002 @11:35PM (#4519183)
    Thats where the encryption comes in. The watermark can only be reversed on the correct machine. Think like pgp, only the person you want to can read the email you send. They plan to work this into hardware. They would probably give the hardware a unique key and have the picture creator encrypt so only that key can open it. This way if you say wany a secure presentation you can set it so only the one projector in the white house can read it without the watermark.
  • by goombah99 ( 560566 ) on Wednesday October 23, 2002 @11:53PM (#4519259)
    It's amazing no one is seeing why this is useful.

    Lots of people have suggested digitally signing the image. you that would work. But is it simpler? no. now I have to cart around two images, one people can look at in a computer browser and one "signed one" for evidence. I have to make sure I keep one associated with the other at all times. Yes of course I could decode the signed image when I wanted to view it but that's not a general purpose solution. If I make it act and smell like a jpeg or gif then I can easilty treat it as a single file that all existing image viewers can view. Only when I really want the perfect images and the signature do I have to use my special program.

    In fairness I will note that any image format, e.g. jpeg, that has the capabilit to associated additional infomation with an image, also would make a sutiable means of taking care of this. Though possibly not in a robust manner since some programs tinker with the text info in jpegs.

    Now as for whether the camera should do the embedding or embedding should be done afterwards, it makes more sense to let the camera do the embedding if it can. A simple Jpeg pops out and were done.

    Now about information theory not allowing this. that's piffle. proof by construction. First assume that all uncompressed real world images are compressible. compress it how you wish, lossy or losslessly. there is now room informationwise to squeeze in a small watermark.

  • Steganography (Score:5, Insightful)

    by Chris Burke ( 6130 ) on Thursday October 24, 2002 @12:04AM (#4519293) Homepage
    Well, you can blame the editor, but it's really the article's fault. What they're really talking about is lossless steganography, which is a neater trick. The idea is to hide data in a standard (eg. GIF) image, and be able to extract that data while at the same time preserving the entire image. For the applications they talk about (watermarking), the hidden information is encrpyted, which may be why that word showed up.

    I'm curious about their claims. Do they claim to be able to hide the data in an existing image format without image loss? For formats like GIF, it'd be tough, because compressed data (by design) lacks the redundant bits Information Theory demands before you can start cramming extra bits of data into the same space. They certainly wouldn't be able to guarantee that the image was without quality loss before removing and correcting for the watermark. ;)

    So I guess I'm not sure what they're claiming.

    Though I think for the applications they are stating, actual hiding of the data isn't the point. You don't care if people know that there is some data hidden in the image, you only care that they can't read it or forge it. It'd be much easier then, because you could make a new file format. Shit, all you'd have to do is take a .PNG, stick an encrpyted md5 sum at the back, and call it (S)ecurePNG.

    Which isn't a bad idea, actually... You could do some of the things they talked about.

    For digitizing contracts, both parties would put an md5 sum encrpyted with their private keys in the image of the contract. Anyone (e.g. the Court) can read the md5 sums and verify that a copy of the contract is legitimate.

    For verifying forensics photos, the camera they used would have to encrypt all the photos it takes with a private key (the Courts, again?) not known to the police officers who do the work. I think this is unworkable.

    The only problem with both of these ideas is that they are only worth as much as you can trust that the private keys have not been compromised. If you're going to be convicting people on the basis of signed police photos, you'd better be damn sure that the police couldn't have possibly discovered the private key hidden in the camera's hardware.

    But like I said, this doesn't involve hiding data in a photograph. I'm just wondering what the -purpose- of the steganography was actually supposed to be. Why is it important that the information be -concealed-?
  • Misleading title. (Score:4, Insightful)

    by KFury ( 19522 ) on Thursday October 24, 2002 @12:11AM (#4519326) Homepage
    The title "Encrypt information in images without distortion" is really misleading. It suggests (err, states) that the sego process doesn't change the image. It certainly does. The only interesting bit is that it's reversable.

    So while it's not lossy in the final analysis, and the original version can be reclaimed, it does actually distort the image, while the hidden message is contained within.
  • by Effugas ( 2378 ) on Thursday October 24, 2002 @01:30AM (#4519656) Homepage
    Yes, I originally thought it was impossible.

    Then I sat down, and realized what's going probably on here (the CNet article didn't specify, and I didn't think to track down the original work. Foo on me. So I'm pulling this out of my proverbial ass.)

    Perfectly random images are indeed impossible to add data to without creating some form of irreversable distortion. Suppose you had a "remove transformation" mask embedded in the included transform. This mask itself would take information, which would then need to be added to the transform, which would increase the size of the transform, thus necessitating a bigger mask, ad nauseum. So you could never embed the reversal instructions.

    However, photographs are not perfectly random. Along the light wavelengths that nature selected for humans to sense, significant patterns exist -- edges, gradients, shapes, and so on. Though precise intensities eventually hit perfect randomness at absolute sensitivity, digital photographs (even without JPEG) quantize imagery into 8 bits per channel -- 24 bits total. So those patterns we see actually create significant regions of reduced entropy -- less information in the image than there is otherwise room for.

    And that's the key -- because once there's extra capacity, we can embed both some message and the means to remove that message in the extra space. Then it's just a matter of using one of a thousand ways to share the secret across all the low entropy regions of the image, and you're done.

    No, it doesn't violate information theory. Yes, it's mildly cool. No, it's nothing like a public key steganographic system -- there's nothing inherent about the system that prevents unauthorized removal, or even unauthorized addition of the watermark. But it's a useful adjunct -- concievably, it'd be at the heart of a watermarking system that fingerprinted audio and video in low-entropy segments, then removed the fingerprint before it hit the d/a converter.

    I'm pretty sure the strategy extends to floating point representations as well, though there's likely much less compressability due to noisy capture circuitry and higher raw entropy in the signal.

    Yours Truly,

    Dan Kaminsky
    DoxPara Research
    http://www.doxpara.com
  • by Cato the Elder ( 520133 ) on Thursday October 24, 2002 @03:46AM (#4520052) Homepage
    The point isn't to hide the data you're encrypting in, it's to be able to recover the original image. With a naive steganography scheme, you lose information in the original image. This is bad, if for instance, the encrypted information is a time/date/id stamp and the image is a crime scene photo--you could obscure important evidence.
  • by Anonymous Coward on Thursday October 24, 2002 @10:47AM (#4522066)

    If you make your $ from pr0n, this would be a godsend. Hackers -> distorted image. Paid accounts -> good image. Simple as that. AND puts the processing burden on the user's PC.

Intel CPUs are not defective, they just act that way. -- Henry Spencer

Working...