Hidden Communications: The Effectiveness of Steganography

Slides:



Advertisements
Similar presentations
DocuBank Website Branding Options You can elect to have your firms information appear on the DocuBank Member home page for each of your clients. You do.
Advertisements

CALEB WALTER 7/14/2013 Audio Stego – A Brief How To.
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
BMP Hide ‘n’ Seek What is BMP Hide ‘n’ Seek ? –It’s a tool that lets you hide text messages in BMP files without much visible change in the picture. –Change.
Steganography and Network Security
Steganography Rayan Ghamri.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Steganography detection Roland Cmorik, Martin Šumák.
A Steganography Project Project By: Awadesh Madhogaria.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Digital Image Processing GSP 216. Digital Image Processing Pre-Processing – Correcting for radiometric and geometric errors in data Image Rectification.
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
Digital Media Lecture 4: Bitmapped images: Compression & Convolution Georgia Gwinnett College School of Science and Technology Dr. Jim Rowan.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Cryptographic Anonymity Project Alan Le
Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004 Computing Is Pretty Strange.
Implementation of Steganographic Techniques Danny Friedheim pd. 2.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization G. Sahoo1 and R. K. Tiwari2 Presented by Pan Meng.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
FOOTPRINTING STEGANOGRAPHY.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
Author’s Name/s Goes Here, Author’s Name/s Goes Here
Digital Steganography
Introduction to Steganography
Photography, chapters 6 & 7
(Project) by:- ROHAN HIMANSHU ANUP 70282
Restoring Tumorous MRI Brain Images
Arisai Mauricio April 8, 2013 Period. 6
Riding the Waves Learning Perfect Pitch through the Shapes of Sound
Instructions on making the poster
Benjamin Bucior Northwest Guilford High School, Greensboro, NC
Analyzing Period of Simple Pendulum
Welcome
Steganography Example
Computer Graphics Different Images File.
Campo Elementary School
Halloween Card Tutorial.
Create your Benner - intro
INVESTIGATING THE TERMINAL VELOCITY OF WATER DROPLETS
Steganography.
Finding The Optimal Position For Tennis Serving
Instructions on making the poster
D-WRD May 2016: Assigning, Assessing, and Supporting Student Presentations.
ANALYZING SHOE PRINTS IN A CRIME SCENE
Citation Map Visualizing citation data in the Web of Science
Do You Know? Convert the following:
Resolution Resolution: 6 x 4.
Steganography Techniques and their use in Anonymity
Template for IBI poster 36 inches in width and 48 inches in height The title occupies no more than three lines First Author1, Second Author2, Third Author1,2.
Chair Professor Chin-Chen Chang (張真誠) National Tsing Hua University
Santa’s s By……..
Dr. Fisher, 20 April 2013 For Astronomy class at ISM
Entrepreneurial Mindset Vision Test
ONLINE SECURE DATA SERVICE
Abstraction – Number Systems and Data Representation
Wavelet transform application – edge detection
Exam Objectives: Identify Design Elements When Preparing Images
A Lesson in Literature, Philosophy, and Life
Encryption & Steganography: Amazing Things To Do with Bits
STEGANOGRAPHY IN IMAGES
Instructions for presentation
Presentation transcript:

Hidden Communications: The Effectiveness of Steganography Gregory Taylor (ichbineingenie@gmail.com) – Cary High School Summer Ventures in Science and Math – Visualization and Image Processing Appalachian State University – July 2009 Dr. Rahman Tashakkori, Mr. Jere Miles & Ms. Biva Shrestha

Introduction What is steganography? Dates back to the Greeks Centered around avoiding detection Many different types

Methods Create a steganographic image Alter the image using different filters Attempt to re-extract the message Analyze how much of the message remained intact and the effects of the filters

The Image Original image was color Made smaller and grayscale Final product Create the message Hello there! If you are reading this, then you probably already know what this message is about. If you don't know what this message is about, then just stop reading right now. I'm serious. This message is not for you. The purpose of writing this was to communicate the details of a secret plot. If you are not a part of this secret plot, once again, you should stop reading now. (This space is empty) (This space is still empty) Stop it now. Really. Reading this message will not give you some sort of incredible knowledge that you will be able to use in your daily life. This stuff is top secret. For realz. Look! I can talk like a gangsta. Fo shizzle! (...) (...) Why has my failure at being cool not yet scared you away? It always works! By the way, I'm not even going to disclose my secret plot in this message. Why would I? You're obviously reading this when you shouldn't be. If I disclose now, then you might ruin our totally awesome plan! So, I'm not going to tell you. The End...............,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,.,. Still not telling you.... ;:;:;:;:;:;:;:;:;:;:;:;:;:;:;:;:;:;:;:;:;:;:;:;: It's the last paragraph. It's the last chance to disclose. Will I? Does it even matter now? I guess it depends on you now. *

Create and Test the Stego-Object Encrypt the message Decrypt the message If full message is the result, methods are confirmed functional Save as a text image Extract least significant digit binary Compare with the stego-message binary Make appropriate changes Resave as a new text image Open text image Extract least significant digit binary Plug into binary to ASCII converter Record results

Filter and Test A total of 14 filters used, but only 12 useful Extract the message from each filtered image Record results Save as a PNG file Enhance contrast on the image* Save as a JPG file Raise the contrast of the images by an even value Save as a GIF file Save as a BMP file Raise the contrast of the image by an odd value Save as a BMP file using GIMP* Sharpen the image Lower the brightness of the image Blur the image Raise the brightness of the image Use edge detection on the image Add random noise to the image

Results Different Binary Characters Different Binary Percentage Different ASCII Characters Different ASCII Percentage Raw Stego 0.00% PNG 3104 31.04% 802 64.16% JPG 4743 47.43% 1226 98.08% GIF BMP BMP GIMP* Sharpen 5531 55.31% 1204 96.32% Blur 4838 48.38% 1242 99.36% Edge Detection 4975 49.75% 1243 99.44% Enhance Contrast* Raise Contrast (E) 7249 72.49% 1220 97.60% Raise Contrast (O) 2761 27.61% 780 62.40% Darken 3268 32.68% 770 61.60% Brighten 3172 31.72% 766 61.28% Noise 188 1.88% 128 10.24%

Results

Results PNG JPG Contrast (O) Contrast (E)

Conclusions Steganography effective in hiding messages Active filtering as seen here easily destroys messages hidden in this way Steganography an active growing field Basic encryption

Thank you! Dr. Rahman Tashakkori Acknowledgements Mr. Jere Miles Ms. Biva Shrestha