Introduction to Steganography

Slides:



Advertisements
Similar presentations
Information Hiding and Covert Channels
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Summer 2005CS 4953 The Hidden Art of Steganography The Hidden Art of Steganography  What is hiding in your picture?
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
What is Steganography? def’n: the art and science of hiding information by embedding it in some other data. cryptography - render message unintelligible.
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Khan, Mohammed Minhajuddin
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Pictures Worth More Than 1000 Words
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Steganography Rayan Ghamri.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
I NTRODUCTION TO C RYPTOLOGY Cryptoanalysts, Encryption, and Decryption.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
FOOTPRINTING STEGANOGRAPHY.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
2 nd lecture.  Plaintext – ciphertext – encryption – decryption.  Cryptography – cryptanalysis – cryptanalyst – cryptology.  Authentication – Integrity.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Cryptography – Test Review
Steganography in WebP image using LSB embedding
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
STEGANOGRAPHY.
Information and Network Security
Steganography.
Visit for more Learning Resources
Recent Developments on Multimedia and Secure Networking Technologies
Encryption, Cryptography, and Steganography:
Khan, Mohammed Minhajuddin
Steganography Techniques and their use in Anonymity
Steganography in digital images
Parag Agarwal Digital Watermarking Parag Agarwal
Recent Developments on Multimedia and Secure Networking Technologies
STEGANOGRAPHY IN IMAGES
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

Introduction to Steganography BSIT-7th Instructor: Inam Ul Haq Inam.bth@gmail.com Steganography, Network Security, University of Okara

Table of content Information Hiding Steganography History Fields applied to Information Hiding Basic Terminologies Steganalysis Some Applications Some Tools Steganography Techniques Steganography, Network Security, University of Okara

Information Hiding F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, “Information Hiding – A Survey”, Proceedings of the IEEE, special issue on protection of multimedia content, 87(7):1062-1078, July 1999 Steganography, Network Security, University of Okara

Information Hiding Information Hiding is a branch of computer science that deals with concealing the existence of a message It is related to cryptography whose intent is to render messages unreadable except by the intended recipients It employs technologies from numerous science disciplines: Digital Signal Processing (Images, Audio, Video) Cryptography Information Theory\Coding Theory Data Compression Human Visual/Auditory perception There are four primary sub-disciplines of Information Hiding Steganography Watermarking Covert Channels Anonymity Steganography, Network Security, University of Okara

Steganography Steganography means “covered writing” A Greek word steganos means covered, protected or concealed Definition: It is concealing any file, image, audio or video within another file. Most frequently, steganography is applied to images, but many other data or file types are possible Audio Video Text Executable programs Links Steganography, Network Security, University of Okara

History The concept of message hiding is not new – it’s been around for centuries A Greek shaved the head of a slave, wrote a message, then waited for the hair to grow back before sending the slave to his destination Steganography (in the form of invisible ink) was used by Washington in the Revolutionary War Prior to the Civil War, quilts were sewn with special patterns to tell escaping slaves which direction to go and what to do In the 1980’s, some of Margaret Thatcher’s cabinet documents were leaked to the press. She ordered that the word processors being used by government employees, encode their identity in the word spacing of the documents Steganography, Network Security, University of Okara

Fields Applied to Information Hiding Information Theory/Coding Theory Digital Signal Processing Discrete Fourier Transform/Discrete Cosine Transform Image/Audio/Video Processing Data Compression Cryptographic Principles Discrete Math Cryptographic Hashing Data Networks The Human Visual System/Human Auditory System Capabilities and limitations Steganography, Network Security, University of Okara

Basic Terminology The data to be hidden: Plaintext / Secret message / Stego-message / Embedded data The data which will have a stego-message embedded in it: Covertext / Cover-Object / Cover-Image\Cover-Audio\Cover-Video Target file The key used to make the stego-message secure Stego-Key / Secret Key / Key The file with the steganography-message embedded Stegotext / Stego-Object / Stego-Image\Stego-Audio\Stego-Video Steganography, Network Security, University of Okara Steganography, Network Security, University of Okara

Watermarking Anonymity Watermarking is very similar to steganography in that one of its goals is to not be detected It’s primary goal is to not be able to be extracted or destroyed (at least not without destroying the cover too) Typically, watermarking is designed to protect intellectual property rights for images, sounds, and video If it’s easily removed or destroyed, those rights cannot be protected There is a popular program called StirMark which does just that Make it tamper proof Anonymity Anonymity is about concealing the sender and receiver of messages and this is the least studied sub-discipline of information hiding Steganography, Network Security, University of Okara

Steganalysis Steganalysis is the detection of data that has been hidden It is a cat and mouse game – as one group of researchers come up with better ways to hide stuff, another group figures out how to detect it or perhaps just destroy it Steganography, Network Security, University of Okara

Applications of Information Hiding Covert military communications Covert police communications Criminals have learned that police are nearby when they hear encrypted communications, so they reduce their activity for the moment A steganographic system would prevent this detection Digital Rights Management – protecting intellectual property such as images, music, electronic books, etc. Embedding textual data in medical images would better ensure that the picture belongs to a particular patient This technique could apply to personal pictures, sounds, and movies Tamper proofing – ensuring a data file has not been changed Steganography, Network Security, University of Okara

Steganography tools Anubis BMP Secrets DarkCryptTC OpenPuff OpenStego StegFS StegoShare Other tools: https://en.wikipedia.org/wiki/Steganography_tools 12 best steganography tools: http://www.topbestalternatives.com/best-steganography- software/ Steganography, Network Security, University of Okara

Steganography tools (contt.) StegoShare allows embedding of large files into multiple images Steganography, Network Security, University of Okara

Steganography tools (contt.) Free tool that implements three layers of hidden data Steganography, Network Security, University of Okara

Steganographic Techniques - Substitution The most common method is to replace the Least Significant Bit (LSB) in substitution RSA Algorithm Hash LSB DEF CON 16 See other techniques: https://pdfs.semanticscholar.org/8946/d2ea49e2ca7c53c157bfe09c2b656fc841ce.p df Steganography, Network Security, University of Okara

Exercise 1- What is covert Channel? 2- Write a detail note on Anonymity. 3- Watermarking 4- Fingerprinting 5- Explore StirMark 6- What are different steganographic techniques? 7- Can you embed secret message into image? Steganography, Network Security, University of Okara