New information technology: “steganographic fingerprinting”..
UKOV Vyacheslav Sergeevich,
Candidate of Technical Sciences
NEW INFORMATION TECHNOLOGY: “STEGANOGRAPHIC FINGERPRINTING”
The article is a continuation of a series of publications on the problems of steganographic protection [1-3]. Based on the results of a comparative analysis of software products offered by the market and distributed on the Internet, the features, modern capabilities and development trends of the promising information technology of steganographic fingerprinting are considered.”
It is often said that “new is well forgotten old”. Today this proverb has received a continuation: “implemented using new technology”. We are especially convinced of this almost daily, using the achievements of modern information technologies (IT).
One of the most pressing problems of IT is the task of highly reliable protection of information, in particular, protection from unauthorized access to it. The development of such network technology areas as e-commerce, electronic banking and many others depends on its solution today. Everything rests on the task identification of a person. And the best biometric identifier has long been considered a “fingerprint”, especially since it can be put even by a person who cannot sign.
“Fingerprint” is the best signature for intellectuals!
The achievements of modern information technologies have breathed new life and new content into the science of dactyloscopy. Dactyloscopy from Greek – the study of fingerprints or literally: “relating to the observation of fingers”. The integration of digital dactyloscopy and computer steganography technology has made it possible to create an amazing tool for protecting information, digital documents and multimedia products (text, graphic, video and audio files) steganographic dactyloscopy”, the main purpose of which is to create identifiers — hidden digital markers (LDM) or, as they are also conventionally called, digital fingerprints”. The main tasks solved by LDM are shown in Fig. 1.
Fig. 1. Main tasks of hidden digital markers
Based on the tasks to be solved, the following main requirements are imposed on the SCM:
- secrecy (absence of unmasking factors) [1];
- noise immunity [4];
- protection from destructive influences of third parties [3].
Recently, SCMs have been actively used in the following applications:
- blocking unauthorized users' access to audio information in networks and on media;
- control of advertising in radio and television broadcasting;
- identification of the speaker;
- encryption of audio recordings, etc.
So where are these “fingers”?
How are hidden digital marker technologies implemented? How are digital “fingerprints” formed? Where are they located? The answer to these questions is briefly presented in Fig. 2.
Fig. 2. Basic technologies of hidden digital markers
The analysis shows that all modern digital marking methods use computer steganography methods, broadband signals and elements of noise theory. However, not all existing computer steganography methods can be used to form the SCM. For example, the method using the least significant bits (LSB method), although it allows hiding information, does not meet the requirements for noise immunity, since when the marked image is distorted or compressed using lossy schemes, the hidden information (label) is lost [3].
Therefore, modern steganographic systems use the principle of hiding a mark, which is a narrow-band signal, in a wide frequency range of the marked image. This principle is implemented using two different algorithms and their possible modifications. In the first case, information is hidden by phase modulation of the information signal (carrier) with a pseudo-random sequence of numbers. In the second, the available frequency range is divided into several channels and transmission is performed between these channels (Fig. 2).
It should be noted that the mark is some additional noise relative to the original image, but since noise is always present in the signal, its slight increase due to the introduction of the mark does not produce any visible distortions. In addition, the mark is scattered throughout the original image, as a result of which it becomes more resistant to cutting.
When using ICE technology(Fig. 2) digital identification signals are periodically embedded throughout the entire length of the recording in narrow “cuts” made in the spectrum of the audio signal being processed. As a result, it is impossible to extract even a small unmarked fragment from the recording. Attempts to remove the coding signals simply result in the destruction of the recording. This system is designed to work with both analog and digital signals, and the ICE identification codes are preserved both during signal digitization and during its transmission in compressed form.
VEC Technologyis based on a similar principle of embedding identification codes, but only in the field of digital images. This task turned out to be more difficult. It is important that the magnitude of the embedded signals be below the threshold of perception, and the signals themselves could be repeated many times within the image, any fragment of which must be marked. Codes embedded in the image (usually 16-bit) are preserved during compression/decompression operations, during data transmission using a modem, and also during image conversion from digital to analog and back. VEC codes are preserved even when the image is compressed using the JPEG method with a degree of 10:1.
Similar to JPEG and MPEG technologies, the VEC algorithm systematically modifies pixel values by dividing the image into blocks and then applying a Fourier transform. In this case, the information used to identify the material is masked by image details that function as “noise”, but is restored by the inverse Fourier transform. The more details an image contains, the higher the density of identification codes embedded in it can be.
During the process, the image may undergo various transformations, both intentional and unintentional. In particular, it may be compressed, including using lossy compression algorithms. Naturally, the immutability of the mark under such transformations is only achievable if it is placed in large areas across the entire image.
What's better?
At present, a fairly large number of software products have been developed that provide for the embedding of hidden digital markers into multimedia files. The main comparative characteristics of marking programs are presented in Table 1.
Table 1. Comparative characteristics of marking programs
Program name (developer) |
Purpose |
Principle of |
Features |
Note |
SURESIGN (SIGNUM TECHNOLOGIES) |
Embedding hidden information about copyright and the procedure for using digital data | The fingerprint system is based on digital steganography technology. Hidden information is embedded in the transmitted digital data stream (graphics, audio and video files) | The flexibility and reliability of the technology makes it possible to use it in a variety of areas related to the transmission of digital information. The hidden recording technology is completely invisible to the human senses (sight and hearing) | Working with color tables SMYK, Lab, RGB, grayscale and indexed color |
MULTIMEDIA PROTECTION PROTOCOL (FRAUNHOFER — GESELLSCHAFT IIS) |
The Media Protection Protocol (MPP) is designed to protect digital recordings from piracy | Allows the distribution of digital audio and video, managing the commercial use of these materials (for example, calculating the amount of royalties) | To extract copyright information from compressed multimedia data, it is not necessary to decompress them | Can store and transmit additional information, such as TSRC, as well as information about the author, duration, etc. |
CRYPTOLOPE (IBM) |
Comprehensive electronic copyright management system | The first distributed technology that provides the basic components for the security, protection, management, delivery, tracking and sale of digital content in the Internet and Intranet environment using Java | Digital content can be of any kind: from simple texts to video | System composition: CRYPTOLOPE BUILDER creates encoded “objects” with digital content and rules for its use; CRIPTOLOPE CLEARING CENTER – manages the exchange of encryption keys; CRIPTOLOPE PLAYER – an application for launching and interacting with “objects” |
@TTRIBUTE (NETRIGHTS, LLS) |
To reduce the risks of content copyright holders who decide to distribute their materials on the Internet or via other electronic means and media | The essence of the system is to attach pages with information about the property to the author's content — text, photos or video clips. Then these «glued» pages travel inseparably across servers and WEB-sites | The system allows a potential buyer to familiarize themselves with the content in detail before paying for it | An open, object-oriented system based on ACTIVEX technology. Versions for WINDOWS 95 and MACINTOSH have been developed. |
PICTUREMARC (DIGIMARC CORP.) |
Creating digital “watermarks” to protect graphic images (packages) | It is a plug-in module (PLUG-IN) for major graphic packages such as ADOBE PHOTOSHOP and CORELDRAW (at least 256×256 pixels) | The most advanced technology in terms of marketing, which allows a fairly wide range of transformations for images with embedded watermarks” | Working with color tables CMYK, Lab, RGB, grayscale and indexed color. Marking is an irreversible process, once a mark is placed, it does not change and cannot be removed |
TIGERMARK (INFORMIX AND NEC) |
A digital watermark system based on TIGERMARK (NEC) and INFORMIX UNIVERSAL SERVER (INFORMIX) technologies is designed for distributing audio and video materials via the Internet. | TIGERMARK is embedded as a signal in the media stream and cannot be etched out of there without obvious loss of quality | It fits very well with streaming data transmission technologies | The system operates as a universal IMAGE DATABLADE – a module for INFORMIX UNIVERSAL SERVER and provides media providers with all the necessary conditions: database, server and copyright management |
ARGENT (THE DICE COMPANY) |
The system is designed to provide media publishers with a powerful and intelligent means of protecting their copyrights when distributing products in networks and on other digital media | A three-channel technology is used to embed a “watermark” in the protected object | It differs from other similar technologies by its encoding features | The digital label contains information about the copyright, distribution rules, and the copyright holder |
GIOVANNI (BLUE SPIKE, INC) |
The technology is designed to protect image files in networks and on various media with a digital label | Combines the architecture of a secret key and the algorithm of the counter signal (EMBEDDED SIGNALLING ALGORITM), which determines its similarity with the ARGENT technology | A more simple-to-use commercial product than, for example, the ARGENT technology | For MACINTOSH and WINDOWS platforms |
PIXELTAG (MITMEDIA LAB) |
PIXELTAG technology is similar to PICTUREMARC (DIGIMARC) | Hidden information is encoded by the brightness value of pixels, which determines the durability of the digital mark during transformations (NIFF to JPEG conversion, format change, digitalization, scanning) | The system does not require the original image to extract the hidden message | When a digital watermark is detected, the user immediately receives all the necessary information for contacting the owner or author of the image (E-MAIL, URL) |
INVISIBLEINK | For the protection and identification of digital image collections | Uses SSSIPT (SOPHISTICATED SPREAD SPECTRUM IMAGE PROCESSING TECHNIQUES) technology, which processes digital material to embed the INVISMARK digital mark. | The digital mark cannot be separated from the image | The INVISMARK digital mark is an invisible, indelible fingerprint” |
EIKONAMARK (ALPHA TEC LTD) |
Protecting digital information and copyright using a digital watermark” | The system transforms the copyright owner's identification number into an invisible digital mark and inserts it into the image body. | Using EIKONAMARK technology, the watermark is easy to detect without additional search in the database. | The program for WINDOWS 3.X/95, convenient for those who do not use PHOTOSHOP. Working with color tables CMYK, RGB, etc. |
JK_PGS (SWISS FEDERAL INSTITUTE OF TECHNOLOGY) |
Software for embedding a digital tag in an image and searching for information in already tagged images | There are programs for WINDOWS, SGI, SUN, LINUX | ||
MUSICODE (ARIS TECHNOLOGIES) |
For protecting audio files and copyrights to them | The system embeds inaudible, “indelible”, easily recoverable copyright information into the audio file | Digital “copyright watermarks” can withstand numerous analog manipulations and transformations | The system provides radio broadcasting of audio information with digital marks without distorting the recording itself |
SISCOP (MEDIASEC TECHNOLOGIES, LLS) |
Speech signal analysis and processing to combat illegal use and distribution of confidential and copyright information | It is an online service that allows the owner of the information to insert a durable digital label with copyright data into digital images or video data | Protection of confidential and copyright information is ensured by marking technology, tracking and confirmation of unauthorized use | |
LAZUR, LAZUR-M (NOVO) |
Analysis and processing of speech signals | Placing steganographic markers in the speech signal (“fingerprints”) that identify the speaker (“speech signature” technology) | In addition to “fingerprints,” the system provides: — processing of analysis results; — restoration of speech intelligibility; — assessment of the quality of protection |
OS WINDOWS 98/NT, processor – Pentium 120, processing format – 16-bit PCM with a sampling frequency of 6 – 16 kHz, input/output – “Sound Blaster-16” |
For those readers who would like to become more familiar with the results of the practical implementation of the new information technology of steganographic fingerprinting (SD technology) and specific characteristics of the programs, Table 2 provides information sources of materials on the Internet.
Table 2. Information sources of materials on SD technology
Program name |
Email address |
SURESIGN | signumtech |
MMR | iis.fhg.de/amm/techinf/iprmmp |
CRYPTOLOPE | research.ibm/imageapps/watermark.html |
@TTRIBUTE | netrights |
PICTUREMARC | digimarc |
TIGERMARK | informix/informix/bussol/iusdb/databld/dbtech/sheets/tiger.htm |
ARGENT | digital-watermark |
GIOVANNI | bluespike |
PIXELTAG | media.mit.edu |
INVISIBLEINK | signafy/sig/html/over.html |
EIKONAMARK | alphatecltd |
JK_PGS | ltsepfl.ch/~kutter/watermarking/jkpgs.html |
MUSICODE | musicode |
SISCOP | mediasec/products/index.html |
LAZUR | novocom.ru |
Analysis of the materials presented in Tables 1, 2 shows that the most typical digital fingerprint program is the “SureSign” system, developed by SIGNUM TECHNOLOGIES. Its main area of application is copyright protection, verification of the reliability and authenticity of materials in such applications as secret documentation and electronic commerce. This system includes several service programs based on the patented FBI (FINGERPRINTING BINARY IMAGES) technology and allowing to embed, define and read “fingerprint” regardless of the content of the transmitted object.
The system consists of two independent parts:
- SureSign Writer – for forming a label;
- SureSign Detector – for detecting a label.
The SCM must include the user (author) identification number and the document number. If necessary, a visible logo with adjustable transparency can be additionally embedded. And to prevent “fingerprints” from turning into typos, the following restrictions have been introduced into the SureSign system:
- the image size must be more than 100 KB;
- the image size in JPEG format must be more than 50 KB;
- the compression must be no more than 10 times.
What's over the horizon?
Information technologies continue to develop rapidly, so the trends of further development are visible even to the naked eye. For example, the analysis of the characteristics and features of the SureSign system leads to the possibility of its integrationwith a biometric identification device, in particular, with the most advanced fingerprint identification device on the market. Moreover, modern computers are already equipped with such identification devices (Tables 3, 4). In this case, the new integrated system would be able to provide highly reliable user (author) authorization and protect the object from falsification. In this case, the “steganographic fingerprinting technology” used could literally be written without quotation marks.
Table 3. Modern biometric fingerprint identification tools”
Name |
Manufacturer |
Supplier on the Russian market | Biosign | Note |
“SACcat” | SAC Technologies | Mascom | Finger skin pattern | Computer attachment |
“Secure Touch” | Biometric Access Corp. | Biometric Access Corp. | Fingerprint pattern | Computer attachment |
“BioMouse” | American Biometric Corp. | American Biometric Corp. | Fingerprint pattern | Computer attachment |
“Fingerprint Identification Unit” | Sony | Information security | Finger skin pattern | Computer attachment |
“Secure Keyboard Scanner” | National Registry Inc. | National Registry Inc. | Finger skin pattern | Computer attachment |
“Delsy Dactochip” | Elsis, NPP Electron (Russia), Opak (Belarus), P&P (Germany) | Elsis | Finger skin pattern | Computer attachment |
”BioLink U-Match Mouse”;
“SFM-2000A Mouse” |
BioLink Technologies | “Biometric systems” | Finger skin pattern | Standard mouse with built-in scanner |
Biometric computer information security system “Dacto” | OJSC “Chernigov Radio Equipment Plant” | OJSC “Chernigov Radio Equipment Plant” | Biologically active points and papillary lines of the skin | Separate block |
Table 4. Main technical characteristics of biometric identification means by “fingerprint”
Model (company) |
Probability of unauthorized access, % |
Probability of false blocking, % |
Identification time (throughput), s |
FingerScan (Identix) |
0.0001 |
1.0 |
0.5 |
TouchSafe (Identix) |
0.001 |
2.0 |
1 |
TouchNet (Identix) |
0.001 |
1.0 |
3 |
U.areU. (Digital Persona) |
0.01 |
3.0 |
1 |
FIU (Sony, I/O Software) |
0.1 |
1.0 |
0.3 |
BioMause (ABC) |
0.2 |
— |
1 |
Cordon (Russia) |
0.0001 |
1.0 |
1 |
DS-100 (Russia) |
0.001 |
— |
1-3 |
Veriprint 2100 (Biometric ID) |
0.01 |
0.001 |
1 |
Dakto (Russia) |
0.000001 |
0.01 |
5 |
Currently, both in Russia and abroad, work on creating new biometric security tools and searching for new biometric technologies is developing intensively. Good promising results have been achieved in the field of contactless (remote) biometric identification. Work is also underway to create technical identification tools that use such individual characteristics as DNA code, cardiogram characteristics, smell, gait, etc. However, these tools still have a number of disadvantages (instability of results, low reliability, complexity of implementation, etc.) and are not yet ready for widespread implementation, but intensive work continues.
The analysis shows that the modern capabilities of biometric technologies already today provide the necessary requirements for identification reliability, ease of use and low cost of equipment. The implementation of biometric attachments to computers at prices of about 100 dollars and below provides good prerequisites for significant activation of new electronic technologies, including electronic commerce. Thus, the analysis has clearly shown that integration of biometric technology, cryptography and steganography already today allows us to implement the most reliable methods of information protection and is one of the most promising trends for the coming years.
Another relevant direction of development of the considered technology of digital marking and biometric identification is use as stegokey of compressed biometric fingerprint information. Analysis of the operation of technical identification tools listed in Table 3 shows that almost all of the tools presented use an operating algorithm based on scanning the finger pattern, digitizing the results, compressing the data to several dozen bytes, and then encrypting the results. The resulting file does not allow an intruder to restore the true fingerprint” and can be used as a digital user identifier and steganographic key.
In connection with the widespread use of digital photography and color printing, one of the promising areas for protecting the copyrights of producers of color images and their prints is the method of steganographic protection based on print bitmap encoding technology[5]. This protection can be implemented on the basis of a licensed supply of an electronic copy of the product. The copy verification algorithm is based on the registration of fingerprint bitmaps, visual comparison of the original fingerprint and the suspicious copy, confirmation of authorship using the hidden message extracted from the bitmap and making a decision on the license violation.
It is known that to date, steganographic methods have not yet provided a mathematically proven guaranteed protection of information, so it is quite natural that another direction for the possible improvement of the information technology of steganographic fingerprinting arises”: integrationdocument marking systems and cryptographic protection systems, which will allow achieving guaranteed protection of hidden information. Therefore, this technology is of great interest not only for copyright protection, but also for the protection of information and documents, especially when transmitted over public communication channels. But that's another story.
Literature
1. Ukov V.S., Romantsov A.P. Computer steganography yesterday, today, tomorrow.//Special equipment, 1998, 5.
2. Ukov V.S., Romantsov A.P. Assessment of the secrecy level of multimedia steganographic channels for storing and transmitting information.//Special equipment, 1999, No. 6.
3. Ukov V.S. Steganographic technologies for protecting documents, copyrights and information.//Special technology, 2000, No. 6.
4. Steganography. Thematic issue of the journal.//Information protection. Confidential, 2000, No. 3.
5. Arkhipov O.P. et al. Steganography in PRN files.//Information protection. Confidential, 2002, No. 2.