Digital Steganography

Slides:



Advertisements
Similar presentations
Unit 30- Digital Graphics THEORY P2 and D2
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
F5 A Steganographic Algorithm
F5 a Steganographic algorithm - andreas westfeld
Steganography and Network Security
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
Steganography and Data Hiding. Introduction Steganography is the science of creating hidden messages. Sounds like crypto, but… In traditional crypto,
Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed By: Randy Grubb Armstrong Atlantic State University – Cyber.
Steganography The Art of Hiding Messages
“The Art of Hiding Data”
RGB Intensity Based Variable- Bits Image Steganography 2008 IEEE Asia-Pacific Services Computing Conference (APSCC 2008) 1 st International Workshop on.
Overview of Digital Stenography
Steganography Part 2 – Detection and Research. Introduction to Steganalysis What is steganalysis?  The art of detecting messages hidden by steganography.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Russell Taylor Week 3. Image File Formats - TIF, JPG, PNG, GIF - which to use? The three most common and important image file formats for for printing,
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Steganography detection Roland Cmorik, Martin Šumák.
Steganography.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Common file formats  Lesson Objective: Understanding common file formats and their differences.  Learning Outcome:  Describe the type of files which.
Data Compression. Compression? Compression refers to the ways in which the amount of data needed to store an image or other file can be reduced. This.
Image formats. Basic terminologies… Pixels: Pixels are the building blocks of every digital image. a pixel is a single point in a graphic image. Resolutions:
Guide to Computer Forensics and Investigations, Second Edition Chapter 11 Recovering Image Files.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Introduction to Steganalysis Schemes Multimedia Security.
Multimedia Basics (1) Hongli Luo CEIT, IPFW. Topics r Image data type r Color Model : m RGB, CMY, CMYK, YUV, YIQ, YCbCr r Analog Video – NTSC, PAL r Digital.
Cryptographic Anonymity Project Alan Le
Digital Graphics for Computer Games Pixels Types of Digital Graphics (Raster and Vector) Compression.
Image File Formats By Dr. Rajeev Srivastava 1. Image File Formats Header and Image data. A typical image file format contains two fields namely Dr. Rajeev.
Information Systems Design and Development Media Types Computing Science.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
FOOTPRINTING STEGANOGRAPHY.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Component 1.9 Security and Data Management
Introduction to Steganography
Sampling, Quantization, Color Models & Indexed Color
Computer Science Higher
Welcome
How to Convert Pictures into Numbers
Chapter 3 Graphics and Image Data Representations
Raster Images CPSC 1030.
"Digital Media Primer" Yue-Ling Wong, Copyright (c)2013 by Pearson Education, Inc. All rights reserved.
Model-based Steganography
Steganography.
Image File Size and File Compression
Visit for more Learning Resources
Representing Images 2.6 – Data Representation.
Steganography with Digital Images
Encryption, Cryptography, and Steganography:
Steganography in digital images
Information Hiding and Its Applications
“Hiding in Plain Sight”
"Digital Media Primer" Yue-Ling Wong, Copyright (c)2013 by Pearson Education, Inc. All rights reserved.
JPEG Steganalysis Statistical Offset Tests
Image Based Steganography Using LSB Insertion Technique
STEGANOGRAPHY IN IMAGES
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

Digital Steganography Jared Schmidt

In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis Detecting steganography OpenPuff Demo Conclusion / Questions

Digital Steganography The art of hiding data in a file so that only the sender and intended recipient suspect the presence of hidden data A form of security through obscurity Very easy to accomplish Harder to detect and decrypt BMP, JPG, TXT, HTML/XML, PDF, PNG, GIF, AU, WAV, MP3, AVI, TIF, TGA, DLL, EXE

LSB Method Most common form of digital steganography In a RGB image, Information is hidden in the LSB[s] of the RGB values of each pixel In a 24-bit bitmap, each pixel represented by 3 bytes. 8 bits representing red value = 2^8 = 256 shades of RED 8 bits representing green value = 2^8 = 256 shades of GREEN 8 bits representing blue value = 2^8 = 256 shades of BLUE 16,777,216 possible colors Effectively have 3-4 bits of data to hide information in for every pixel 32bpp format contains an alpha channel 8 required for ASCII character

Color Perception Changing the LSB of the Red value by 1 (in 24-bit color depth) is undetectable by the human eye. Nokia 808 PureView: 41 megapixel camera phone. 41 megapixels / (3 pixels/byte) = 13.66MB of data can be hidden in a single image.

JPEG Steganography Most common image format Lossy compression Uses type-II DCT to achieve compression. Neighboring pixels typically have similar color values. Information less important to human eye (sharp transitions in brightness, color hue) is discarded Steganographic methods work by manipulating rounding in the DCT coefficient matrix of a JPEG file

JPEG Encoding/Decoding Process

Comparison of JPEG Compression A blocking effect occurs with higher compression creating “artifacts” Higher quality Lower Quality

Network Steganography Modifying network packet’s header or payload In TCP/IP networks, unused bits in the IP and TCP header may be used Packet based length steganography Manipulation of the MTU (Maximum Transmission Unit) VoIP - Lost Audio Packets Steganographic Method (LACK) Transmitter intentionally delays packets by an “excessive” amount of time. Payload of these lost packets contains the secret information

Open Source Steganography Tools Uses Individuals or organizations storing sensitive information in steganographic carriers. Layered encryption / decoy data Digital watermarking to verify intellectual ownership or authenticity Open Source Steganography Tools OpenPuff, S-Tools

Illegitimate Uses Terrorist Organizations Easy form of covert communication May 16, 2012 – Over 100 Al-Qaeda training manuals and detailed future plots discovered in a porn video found on an operative’s flash drive. Stealing/transmitting confidential data or corporate plans

Finding Steganography on the Web Provos and Honeyman, researchers at the University of Michingan, conducted a scan of 2 million Ebay images and 1 million USENET images in 2001 and found no suspect images. UN report title “Use of Internet for Terrorist Purposes” Members of a Colombian guerilla group found communicating using steganographic spam emails

Steganalysis Analyzing images for possible hidden data Many algorithms perform a statistical analysis to detect anomalies in the cover object E.g. repetitive patterns could indicate use of a steganography tool or hidden message Investigating pixel “neighborhoods” to find inconsistencies with ways files are compressed.

Problems with Detecting Steganography Impractical to actively scan all internet content for steganography Data is likely encrypted Data can be hidden in certain parts of image or scattered based on a random seed Messages can be hidden in chains of files Can be hidden in several files using different techniques for each Time consuming

Cover and Stego Image Comparison Original Image (cover) Stego Image (with hidden data)

Conclusion How digital steganography is achieved Images, audio, video Network methods (manipulation of packets) Uses of Steganography Legitimate / Illegitimate How it can be detected Challenges with detection Questions?