Steganography Ryan Albright.

Slides:



Advertisements
Similar presentations
Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
Advertisements

Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
An Introduction to Steganography
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
Khan, Mohammed Minhajuddin
1 Adnan Gutub Computer Engineering King Fahd University of Petroleum & Minerals Saudi Arabia A Novel Arabic Text Steganography Method Using Letter Points.
Security 3 Distributed Systems Lecture # 16. Overview Steganography Digital Watermarking.
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
Steganography Rayan Ghamri.
One possible way to encode information in text is print it in two slightly different typefaces. The secret message is decoded by ignoring one of the typefaces.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
 Wisegeek.com defines Data Compression as:  “Data compression is a general term for a group of technologies that encode large files in order to shrink.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
The Keys to the Kingdom Understanding Covert Channels of Communication Russ Rogers CEO Security Horizon, Inc. Co-Founder securitytribe.com.
evidence. Safety To stay safe on the internet there are many points you need to follow. The first point is to change your password regularly, you.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic.
CS 5888C5 8S A PRODUCTION JONATHAN ERDMANHEAD TROJAN MANN WARM PILL SNOTPORTMAN WILLS ETHNIC URCHINSERIC HUTCHINS STEPHEN LIANGA PENIS LENGTH.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
STEGANOGRPAHY [APPLICATION – I]
Reza Mohammadi Shiraz University Of Technology
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Steganography. Outline What is Steganography? History Steganography used nowadays? Terms Steganography methods Steganography Available Software Steganalysis.
Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Area Of Study 2 Information And Communications Technology(ICT)
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Information Hiding Nattawat Laksanawisit At National Chi Nan University.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
Section 8.1 Create a custom theme Design a color scheme Use shared borders Section 8.2 Identify types of graphics Identify and compare graphic formats.
LOGO Searching the Web CHAPTER 2 Eastern Mediterranean University School of Computing and Technology Department of Information Technology ITEC229 Client-Side.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
Topic 10a Introduction to Steganography 454 NOTE: some of the enclosed information was adapted from slides created by Professor Gary C. Kessler of Champlain.
Steganography Leo Lee CS 265, Section 2 Dr. Stamp April 5, 2004.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
Staff Induction Log On Credentials & Security Resources Web Applications / Software LanSchool Projectors / Cameras / Printing Laptops / WiFi.
STEGANOGRAPHY Sibaka Mahapatra Computer Science 3rd Year, Sec-E
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Introduction to Steganography
Welcome
Computers Talk Binary.
Steganography.
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
Interpreting Binary Data
STEGANOGRAPHY IN IMAGES
Chapter 1: Introduction
Presentation transcript:

Steganography Ryan Albright

Presentation Overview Steganography -What is Steganography -History of Steganography -Types of Steganography -Steganography Tools -Steganography Today Steganalysis -What is Steganalysis -Problems Questions

Steganography - Definition -From the Greek word “steganos” meaning “covered” and the Greek word “graphie” meaning “writing” -The process of hiding secret messages within an ordinary message and extracting it at its destination -Anyone else viewing the message will fail to know that it contains hidden/encrypted data

Steganography – History Ancient Romans -write between line using invisible ink -fruit juices, milk, and urine -when heated, messages appear Store messages on messenger's head

Steganography - History During WWII Germans developed Microdot -secret message photographically reduced to size of period -affixed as the . in the letter i -large amounts of printed data, including drawings Laser Printers -hide short binary message in a document 0 = standard space 1 = 1/300 inch more than usual

Steganography - Principles Steganography is based on two principles -Files that contain digitized images or sound can be altered to a certain extent without loosing their functionality unlike other types of data that have to be exact in order to function properly. -The other principle deals with the human inability to distinguish minor changes in image color or sound quality, which is especially easy to make use of in objects that contain redundant information, be it 16-bit sound, 8-bit or even better 24-bit image.

Steganography – Text (Null Ciphers) -Message sent by German spy in WWII Apparently neutral's protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by products, ejecting suets and vegetable oils. -Take the second letter in each word Pershing sails from NY June 1.

Steganography – Spam Text Dear Friend , This letter was specially selected to be sent to you ! We will comply with all removal requests ! This mail is being sent in compliance with Senate bill 1621 ; Title 5 ; Section 303 ! Do NOT confuse us with Internet scam artists . Why work for somebody else when you can become rich within 38 days ! Have you ever noticed the baby boomers are more demanding than their parents & more people than ever are surfing the web ! Well, now is your chance to capitalize on this ! WE will help YOU sell more & SELL MORE . You can begin at absolutely no cost to you ! But don't believe us ! Ms Anderson who resides in Missouri tried us and says "My only problem now is where to park all my cars" . This offer is 100% legal . You will blame yourself forever if you don't order now ! Sign up a friend and your friend will be rich too . Cheers ! Dear Salaryman , Especially for you - this amazing news . If you are not interested in our publications and wish to be removed from our lists, simply do NOT respond and ignore this mail ! This mail is being sent in compliance with Senate bill 2116 , Title 3 ; Section 306 ! This is a ligitimate business proposal ! Why work for somebody else when you can become rich within 68 months ! Have you ever noticed more people than ever are surfing the web and nobody is getting any younger ! Well, now is your chance to capitalize on this . We will help you decrease perceived waiting time by 180% and SELL MORE . The best thing about our system is that it is absolutely risk free for you ! But don't believe us ! Mrs Ames of Alabama tried us and says "My only problem now is where to park all my cars" . We are licensed to operate in all states ! You will blame yourself forever if you don't order now ! Sign up a friend and you'll get a discount of 20% ! Thanks ! Dear Salaryman , Your email address has been submitted to us indicating your interest in our briefing ! If you no longer wish to receive our publications simply reply with a Subject: of "REMOVE" and you will immediately be removed from our mailing list . This mail is being sent in compliance with Senate bill 1618 , Title 6 , Section 307 . THIS IS NOT A GET RICH SCHEME . Why work for somebody else when you can become rich within 17 DAYS ! Have you ever noticed more people than ever are surfing the web and more people than ever are surfing the web ! Well, now is your chance to capitalize on this ! WE will help YOU turn your business into an E-BUSINESS and deliver goods right to the customer's doorstep ! You are guaranteed to succeed because we take all the risk ! But don't believe us . Ms Simpson of Wyoming tried us and says "Now I'm rich, Rich, RICH" ! We assure you that we operate within all applicable laws . We implore you - act now ! Sign up a friend and you'll get a discount of 50% . Thank-you for your serious consideration of our offer .

Steganography – Spam Text Meet at Main and Willard at 8:30 -Message looks like typical spam, which is generally ignored and disregarded -Created at Spam Mimic, a web site that converts blocks of text into spam -Uses grammar based mimicry -Reader will learn nothing by looking at the spacing or misspellings -Zeros and ones are encoded by the choice of words

Steganography – Digital Images Hiding Text -Stored as array of colored dots, pixels -Each pixel has three numbers associated with it, one for Red, Green, Blue -Each number is stored as 8 bits -Picture can still look good if the 4 least significant bits are altered, a change of 16 in the color’s value -Can hide 1.5 letters per pixel -A 640x480 image can hold over 400,000 characters

Steganography – Digital Images Word document containing the text: “Meet me at 3:00PM at 310 Roble Drive Indiana PA 15701”

Steganography – Digital Images

Steganography – Digital Images Hiding Images -Easier than hiding text -Line pictures up pixel by pixel -Take the 4 most significant bits of the secret photo -Place them in the 4 least significant bits of the carrier photo

Steganography – Digital Images -The new values of the images are strongly patterned, so they are easily recognizable. -The hidden image would be easily recognized by statistical analysis -The final step is to make the message look random before hiding it -Encode the message before hiding it -Spread information randomly over photo using random number generator

Steganography – Digital Images Carrier File Secret Picture

Steganography – Digital Image

Steganography – Audio & Video -Least Significant Bit -modification usually won’t create noticeable audible changes -Take advantage of human limitations -encode messages using frequencies inaudible to human ears (above 20,000 hz) -Use musical tones -F tone = 0’s C tome =1’s -compose piece around secret message

Steganography - Tools -S-Tools -EzStego -Jpeg Hide & Seek -JSteg Shell 2.0 -OutGuess -Multiple Others

Steganography – Digital Watermaking Create invisible digital marks in images and audio files -Carry copyright information -Prevents theft of material

Steganography – Al-Qaida -Believed that Osama Bin-Laden and Al-Qaida hide terrorist plots on sports chat rooms and porn sites. -Difficult to intercept hidden images -2 billion web sites -28 billion images

Steganalysis - Definition -the art of and science of detecting data in hidden signals -the goal of steganalysis -identify suspected packages -determine if they contain hidden data -recover the data, if possible

Steganalysis - Problems -suspected file may or may not have data hidden in them in the first place -the data may have been encrypted before it was placed in the carrier file -some files may have irrelevant data encoded in them -unless you completely recover the data, you can’t be sure there was hidden data in the first place

Steganalysis - Study University of Michigan Study -scanned over 2 million images on Ebay -failed to find a single hidden message

Questions