6 - Steganography and Watermarking Flashcards

1
Q

Desired properties of steganography

A

Imperceptibility
Security
Capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Exploiting the image format

A

Insert secrets after EOF f.ex or in the least significant bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Adding a key protection

A

Shifting or use a random interval to spread the secret message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Steganography techniques

A

Substitution methods
Transform method techniques
Distortion techniques
Cover generation methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of steganalysis

A

Targeted

Blind

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Structural detection

A

method based on inspection of file properties/contents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Statistical detection

A

using histograms to see repetitive trends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Visual detection

A

detecting by viewing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Watermarking

A

Imperceptible
Inseparable from the work its embedded it
Remains embedded even during transformation
Can be visible or invisible
Robustness is the main issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Steganography

A

Capacity desired for message is large
Always invisible
Dependent on file format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Checksum embedding

A

Recover the watermark by applying a checksum function to each pixel of auth image and check LSBs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Watermarking attacking methods

A

Removal attacks - remove watermark completely
Geometrical attacks - distort watermark
Cryptographic attacks - aim at cracking the security methods
Protocol attacks - aim at cracking the algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Difficulties associated with watermarks for investigators

A

They cant be detected
False watermarks can be detected
Unauthorized detection of the watermarks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly