Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.

Slides:



Advertisements
Similar presentations
Information Hiding and Covert Channels
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Information Hiding: Watermarking and Steganography
Watermarking & Steganography
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
Khan, Mohammed Minhajuddin
Watermarking & Steganography Sanjay Goel University at Albany, SUNY.
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Pictures Worth More Than 1000 Words
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
Digital Watermarking Parag Agarwal
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Steganography “Hiding in Plain Sight” Gary Alan Davis, D.Sc. Department of Computer & Information Systems.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
FOOTPRINTING STEGANOGRAPHY.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Introduction to Steganography
Steganography in WebP image using LSB embedding
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
STEGANOGRAPHY.
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Information and Network Security
Computers Talk Binary.
Steganography.
Visit for more Learning Resources
Encryption, Cryptography, and Steganography:
Khan, Mohammed Minhajuddin
Steganography Techniques and their use in Anonymity
Steganography in digital images
Parag Agarwal Digital Watermarking Parag Agarwal
“Hiding in Plain Sight”
Authors: J.J. Murillo-Fuentes
Image Based Steganography Using LSB Insertion Technique
STEGANOGRAPHY IN IMAGES
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

Out of site… Out of Mind

By Fred A. DuBrock COSC-356 Steganography

Derived from the Greek words steganos, which means “covered,” and graphia, which means “writing.”

Steganography Messages hidden in pictures (low order bits) Hard to detect that a message is even there! Difficult problem with respect to terrorism…

Steganography (Hidden Writing) A technique to prevent an opponent from reading your traffic and for him to remain unaware that there is any traffic at all. Old examples of this: * In ancient Greece tattooing on a slaves head * invisible ink * microdot * low-bandwidth applications

Steganorgraphy Steganography Practice of hiding information within other information Digital watermarks Hidden within documents and can be shown to prove ownership

How Steganography Is Used  Enhanced Data Structures  Strong Watermarks  Document Tracking Tools  Document Authentication  Private Communications

Strong Watermarks  Creators of digital content such as books, movies and audio files  A message may be inserted “This file copyright 2002 by Big Fun”  Some watermarks are meant to be found  Other watermarks are deliberately made as fragile as possible

Document Tracking Tools  Hidden information can identify the legitimate owner of a document  Is an idea attractive to both content- generating industries and government agencies with classified information

Private Communications  Useful in political situations when communications is dangerous

Steganalysis and watermark security What is steganalysis? Steganalysis is the art of discovering and rendering useless covert message, i.e., methods countering steganography. Note that the two goals with steganalysis: 1) Discover the presence of the secret message embedded in cover Work. 2) Make the secret message invalid.

However, steganographic watermarking needs to be secure against any steganalysis tools to detect watermarks’ presence. It is easily seen that --- in steganographic watermarking, watermarks’ presence must not be detected (resisting to unauthorized presence detection); while in non-steganographic watermarking, watermarks’ can be publicly announced.

Steganography-Practice of Hiding information in other information Example of a conventional watermark

Other References Digital Watermarking: ISBN Investigator's Guide to Steganography ISBN: Information Hiding Techniques for Steganography and Digital Watermarking ISBN:

Software Many useful programs can be found in Internet archives. Some of the better ones include the following: * * uk/~-fapp2/steganography * * html * isse.gmu. eduF~njohnson/Steganography * * * Specific software packages available on the Internet are listed here. Romana Machado distributes the Java ver- sion of her Stego and EzStego software from here. This cross-platform tool hides information in the least significant bit of an image after the colors in the image are sorted. This usually works quite well, but there can be some inconsistencies. See Sections 9.2 and The software is distributed with the GNU Public License.

Thanks. © 2004 Fred A. DuBrock