Steganography & Digital Watermarfking

Slides:



Advertisements
Similar presentations
Steganography and Network Security
Advertisements

Khan, Mohammed Minhajuddin
Steganography Techniques and Countermeasures with Images, Text, and Audio  First speaker – Chris Kleeschulte  Second speaker – David Miller  Third speaker.
Overview of Digital Stenography
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Computer Security Secure Communication – Cryptography
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
Digital Watermarking Parag Agarwal
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Cryptography & Classical Ciphers
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
CGMB 324: MULTIMEDIA SYSTEM DESIGN Chapter 03: Multimedia Element I - Text.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
Cryptography, Authentication and Digital Signatures
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
STEGANOGRAPHY Sonya Febiatiningsih ( ) for further detail, please visit
Steganography Leo Lee CS 265, Section 2 Dr. Stamp April 5, 2004.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
1.1 Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
2 nd lecture.  Plaintext – ciphertext – encryption – decryption.  Cryptography – cryptanalysis – cryptanalyst – cryptology.  Authentication – Integrity.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Steganography Nathan Shirley
Digital Steganography
Introduction to Steganography
Steganography Nathan Shirley
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Steganography Example
Classical Techniques: Substitution
Information and Network Security
Computers Talk Binary.
Steganography.
Visit for more Learning Resources
Steganography with Digital Images
Encryption, Cryptography, and Steganography:
Khan, Mohammed Minhajuddin
Steganography Techniques and their use in Anonymity
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
Parag Agarwal Digital Watermarking Parag Agarwal
Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 1.#
Image Based Steganography Using LSB Insertion Technique
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Steganography & Digital Watermarfking Jagdish S. Gangolly State University of New York at Albany 9/17/2018 Acc 661 (Spring 2002)

Steganography vs. Cryptography Objectives: Cryptography: To hide information (its meaning) by encrypting. It enables checking for authenticity of source, non-repudiation by receiver, and protect integrity of the message in transit. Steganography: To hide information by “finger-printing” in order to prevent illicit copying of documents, or to pass private messages without detection. 9/17/2018 Acc 661 (Spring 2002)

Steganography I "Steganography is the art and science of communicating in a way which hides the existence of the communication. In contrast to cryptography, where the enemy is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a cryptosystem, the goal of steganography is to hide messages inside other harmless messages in a way that does not allow any enemy to even detect that there is a second secret message present" [Markus Kuhn 1995-07-03]. 9/17/2018 Acc 661 (Spring 2002)

Steganography II wax covered tablets: Herodotus’ Histories Tattoos on shaved heads Invisible inks Inks that react to chemicals Null ciphers: News Eight Weather: Tonight increasing snow. Unexpected precipitation smothers eastern towns. Be extremely cautious and use snowtires especially heading east. The highways are knowingly slippery. Highway evacuation is suspected. Police report emergency situations in downtown ending near Tuesday. Newt is upset because he thinks he is President. Source: http://www.jjtc.com/stegdoc/sec202.html 9/17/2018 Acc 661 (Spring 2002)

Steganography III An Example: Hide and Seek 5.0 Uses the Least Significant Bit of each pixel to encode characters, 8 pixels per character and spreads the data throughout the GIF in a somewhat randomly. Max size: 1024 x 768 pixels Maximum message size: (320x480)/8 = 19200 Message: Steganography is the art and science of communicating in a way which hides the existence of the communication. In contrast to cryptography, where the "enemy" is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a cryptosystem, the goal of steganography is to hide messages inside other "harmless" messages in a way that does not allow any "enemy" to even detect that there is a second secret message present [Markus Kuhn 1995-07-03]. 9/17/2018 Acc 661 (Spring 2002)

Steganography IV Maximum display used: 320 x 480 pixels Original: 222 x 282 pixels and 256 shades of gray Resulting image: forced to 320 x 480 pixels Source: http://www.jjtc.com/stegdoc/sec309.html 9/17/2018 Acc 661 (Spring 2002)

Steganography V 9/17/2018 Acc 661 (Spring 2002)

Steganography VI 9/17/2018 Acc 661 (Spring 2002)

Steganography IV Method: Each pixel is represented as a byte (8-bits). Gray-scale images are very good because the shades gradually change from byte to byte. A similar image with 16 shades of gray (four-bit color) may look very close to one with 256 shades of gray but the palette has less variations with which to work. The subtleties permit data to be stored without the human eye catching the changes. A message may be plain-text, ciphertext, other images or any thing that can be embedded in the least significant bits (LSB) of an image. 9/17/2018 Acc 661 (Spring 2002)