Welcome http://aryasindhu.blogspot.com/p/innovations.html.

Slides:



Advertisements
Similar presentations
[1] AN ANALYSIS OF DIGITAL WATERMARKING IN FREQUENCY DOMAIN.
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
F5 A Steganographic Algorithm
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Khan, Mohammed Minhajuddin
Steganography The Art of Hiding Messages
Security 3 Distributed Systems Lecture # 16. Overview Steganography Digital Watermarking.
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Survey on Information Assurance TEL 581 Presented by Viswesh Prabhu Subramanian Gregory Michel Lincoln Jean Louis Steganography.
Steganography Rayan Ghamri.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
STEGANOGRPAHY [APPLICATION – I]
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
Reza Mohammadi Shiraz University Of Technology
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Robustness Studies For a Multi-Mode Information Embedding Scheme for Digital Images Daniel Eliades Mentor: Dr. Neelu Sinha Department of Math and Computer.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
FOOTPRINTING STEGANOGRAPHY.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
 Digital images store large amounts of data and information. This data can be manipulated to some extend without being detected by human eyes.  DWT(Discrete.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Introduction to Steganography
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
STEGANOGRAPHY.
DONE BY S.MURALIRAJAN M.NIRMAL
Visit for more Learning Resources
Steganography with Digital Images
Encryption, Cryptography, and Steganography:
Khan, Mohammed Minhajuddin
MULTIMEDIA WATERMARKING IN ENHANCING DIGITAL SECURITY
Steganography Techniques and their use in Anonymity
Steganography in digital images
Parag Agarwal Digital Watermarking Parag Agarwal
STEGANOGRAPHY IN IMAGES
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

Welcome http://aryasindhu.blogspot.com/p/innovations.html

Presented By: Aryasindhu Sahu Steganography : A Modern Approach To Digital security Syntech 2010 , SIET Dhenkanal Presented By: Aryasindhu Sahu

The art of hiding information inside information. stegos graphia + Steganography Covered Writing The art of hiding information inside information. http://aryasindhu.blogspot.com/p/innovations.html

"Since everyone can read, encoding text in neutral sentences is doubtfully effective." SECRET INSIDE http://aryasindhu.blogspot.com/p/innovations.html

Historical Facts Ancient Greeks used wax on wood World War 2 – use of Invisible Inks Old Paintings – symbols and signs http://aryasindhu.blogspot.com/p/innovations.html

Modern Steganography Text Injection File Embedding Digital Watermarking Copyright Marking Data Encryption LSB Editing http://aryasindhu.blogspot.com/p/innovations.html

Hiding Several Messages: Deniable Cryptography Knowledge of encrypted data No proof how much information is stored Digital Watermarking: Not really hiding information Important: Not modifiable Uses the hiding property of Steganography Recent: MPAA hides watermarks in movies. http://aryasindhu.blogspot.com/p/innovations.html

Implementations CODEBOOK Original Document Marked Document ENCODER http://aryasindhu.blogspot.com/p/innovations.html

Steganography Implementations Texts / Web ages Images Audios Videos Digital Equipments Implementations Steganography http://aryasindhu.blogspot.com/p/innovations.html

Implementations Texts or Web Pages Use of codebooks Layout of text Every Nth character Use of whitespaces and newlines Difficult to detect and decode http://aryasindhu.blogspot.com/p/innovations.html

Implementations Images Cover Images Identifying Redundant data Replace (a subset of ) redundant bits with data http://aryasindhu.blogspot.com/p/innovations.html

Implementations Audios Frequencies inaudible to human Embedding data using LSB Encoding musical tones http://aryasindhu.blogspot.com/p/innovations.html

Implementations Videos Visible signals Using Image Steganography Using Audio Steganography http://aryasindhu.blogspot.com/p/innovations.html

Example of Image Steganography 255,0,0 11111111 , 00000000 , 00000000 255,0,1 11111111 , 00000000 , 00000001 254,1,0 11111110 , 00000001 , 00000000 Secret data is encrypted at the positions of LSB and decrypted at the recipient. A little change in the LSB puts very less effect on the pixel. So we are unable to identify the steganographic images. http://aryasindhu.blogspot.com/p/innovations.html

Modern use of Steganography In modern printers Digital Images Email Encryption Document Password Protection Website Security Digital Watermarking SAFDB (Steganography Application Fingerprint Database) http://aryasindhu.blogspot.com/p/innovations.html

Detection Of Steganography In Text or Web Pages Look for (disturbing of) patterns Odd use of language Line heights and whitespaces http://aryasindhu.blogspot.com/p/innovations.html

Detection Of Steganography In Images Examine color palette Size of the image Differences: − Format − Last modified date Statistical analysis Analyze frequency of DCT (discrete cosine transform) coefficients Entropy of redundant data − Hidden content higher entropy Apply filters to steganograms Visible representation of statistical data http://aryasindhu.blogspot.com/p/innovations.html

Detection Of Steganography In Audios Statistical analysis Analyze patterns in background noise Distortions Measure inaudible frequencies http://aryasindhu.blogspot.com/p/innovations.html

Detection Of Steganography In Videos Look for distinguishing movements Same techniques as with images Same techniques as with audio http://aryasindhu.blogspot.com/p/innovations.html

Defeating Steganography Text Images ● Change spacing ● Modify line heights, layout ● Add or remove words ● Compress with lossy compression ● Convert to different format ● Resize the image ● Modify colors Audios Videos ● Compress with lossy compression ● Change bit rate ● Alter / limit frequency spectrum ● Same techniques as with images ● Same techniques as with audio http://aryasindhu.blogspot.com/p/innovations.html

Comparison of Secret Communication Technique Confidentiality Integrity Unremovability Encryption Yes No Digital Signature Steganography Yes/No http://aryasindhu.blogspot.com/p/innovations.html

Terrorism & Steganography Terror groups hide behind web encryption. Uncrackable encryption is allowing terrorism. Example : Emails from Al-Qaida or Laden Group after Sept 11 attack. http://aryasindhu.blogspot.com/p/innovations.html

Conclusion Seamless Security Hide data practically everywhere Hidden Watermarking Data Stealing reduced Detection of Steganography − Possible, but can be difficult Defeating Steganography is not hard http://aryasindhu.blogspot.com/p/innovations.html

QUESTIONS ? http://aryasindhu.blogspot.com/p/innovations.html