Steganography Nathan Shirley

Slides:



Advertisements
Similar presentations
BMP Hide ‘n’ Seek What is BMP Hide ‘n’ Seek ? –It’s a tool that lets you hide text messages in BMP files without much visible change in the picture. –Change.
Advertisements

F5 A Steganographic Algorithm
Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Steganography and Network Security
Overview of Digital Stenography
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
Image Representation.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
WEB GRAPHICS. The Pixel Computer displays are comprised of rows and columns of pixels. Pixels are indivisible. Some common screen resolutions are:, 600.
Steganography Ben Lee III Long Truong ECE Spring 2002.
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Terms 2 Terms 3 Terms 4 Terms 5 Terms.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Capture your favorite image Done by: ms.Hanan Albarigi.
© Keith Vander Linden, 2005 Jeremy D. Frens, Open up the box of a computer, and you won't find any numbers in there. You'll find electromagnetic.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Have you ever wanted to hide something from: Your friends? Your family? The Government?
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
© Keith Vander Linden, 2005 Jeremy D. Frens, Open up the box of a computer, and you won't find any numbers in there. You'll find electromagnetic.
Agenda Last class: Memory, Digitizing Numbers Today: Digitizing: Text
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
Chapter 4: Representation of data in computer systems: Images OCR Computing for GCSE © Hodder Education 2011.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
Scanner  We can use it to convert printed images or docs into a digital format.  After obtaining a digital image we can make some modifications it on.
Data Representation. How is data stored on a computer? Registers, main memory, etc. consists of grids of transistors Transistors are in one of two states,
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
DATA REPRESENTATION IMAGES GCSE Computing. Learning Objective ■ To understand how an image is represented in Binary ■ To be able to convert a Binary code.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
UNITS OF MEASUREMENT 2.01 Understand Digital Raster Graphics.
© 2016 AQA. Created by Teachit for AQA Character encoding and Representing images Lesson.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Steganography Nathan Shirley
Component 1.9 Security and Data Management
Digital Steganography
Images Data Representation.
Data Representation Images.
Data Representation.
Representing images.
TEMPLATE INSTRUCTIONS Please use these instructions to complete your TV Ad Find YOUR Department / Program template or use the general College of Arts &
Welcome
Steganography Example
UNIT 2 – LESSON 4 Encoding Color Images.
Data Formats.
Computers Talk Binary.
Steganography & Digital Watermarfking
Steganography with Digital Images
MED 2001 Advanced Media Production
Khan, Mohammed Minhajuddin
Summer Term Year 10 Slides
Name: _______________________________
Files [Computing] Computing.
Hiding Information, Encryption, and Bypasses
TEMPLATE INSTRUCTIONS Please use these instructions to complete your TV Ad Find YOUR Department / Program template or use the general College of Arts &
Visuals are analog signals...
UIT Unconference December 06, 2018 Ian Redzic
1. Get your bubble lab 2. Flip to the graph
Image Based Steganography Using LSB Insertion Technique
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Steganography Nathan Shirley

Any attempt to hide information

Ancient Steganography Greece – head tattoos France – Tattoos on Messenger's backs Mixing Fonts – printing presses Micro Dots – Small ink dots Jeremiah Denton – POW Morse Code with his eyes on international tv http://www.encyclopediaofalabama.org/article/h-2969 https://en.wikipedia.org/wiki/Histiaeus https://en.wikipedia.org/wiki/Steganography

Digital Steganography Most Common - Images, Video, and Sound files (lowest bit) Printers – Use small yellow dots to encode serial number and timestamp Delays in network packets https://www.eff.org/issues/printers https://en.wikipedia.org/wiki/Steganography

Lowest Bit Steganography Pixels represented by 32 bits 8 for each: Red Green Blue Alpha 32 Bit Format: 0xAARRGGBB If we flip the lowest bit (or two) it will only change the value by 1/256th

Lowest Bit Steganography Bits available to store information: Lowest Bit 0000 0000 0000 0000 0000 0000 0000 0000 Lowest 2 Bits

Viewing only the 2 least significant bits Basic Example Viewing only the 2 least significant bits Original Image https://en.wikipedia.org/wiki/Steganography#/media/File:Steganography_original.png

Stegosaurus (Steganography Tool)

The Secret Data 14 KB of Christmas ASCII Art

Before and After Adding Data SteganographySimple.java

LSB Before and After LSBViewer.java

Diff between images ImageDiff.java

New Method Randomize Position of Points using SHA1 based PRNG to generate random x and y coords Store Hash Map of all previously “used” bits to prevent collisions In the case of a collision, skip that point and generate the next

Basically Connect the Dots

New Method Before and After SteganographyAdvanced.java

New Method LSB LSBViewer.java

New Method Diff ImageDiff.java

The New Secret Data 140 KB of NMAP man pages

Disadvantages: Adding too much Data 140 KB – NMAP man page Original Simple Sequential Connect The Dots

GitHub https://github.com/natethegreat2525/Stegosaurus/

Demo