Ramya Kuppam Manikyam School of Computing Dr. Todd McDonald Professor

Slides:



Advertisements
Similar presentations
Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Advertisements

Khan, Mohammed Minhajuddin
Steganography The Art of Hiding Messages
Overview of Digital Stenography
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Steganography. Outline What is Steganography? History Steganography used nowadays? Terms Steganography methods Steganography Available Software Steganalysis.
Have you ever wanted to hide something from: Your friends? Your family? The Government?
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
Steganography Leo Lee CS 265, Section 2 Dr. Stamp April 5, 2004.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
FOOTPRINTING STEGANOGRAPHY.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
Information Security and Privacy By: Mike Battestilli.
2 nd lecture.  Plaintext – ciphertext – encryption – decryption.  Cryptography – cryptanalysis – cryptanalyst – cryptology.  Authentication – Integrity.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Computers and Programming
Encryption with Keys and Passwords
Digital Steganography
Cryptography – Test Review
Introduction to Steganography
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Password Management Limit login attempts Encrypt your passwords
Welcome
Cryptography And Network Security
STEGANOGRAPHY.
A (Very) Brief History of Pre-Computer Cryptography
Encryption
Information and Network Security
Computers Talk Binary.
Steganography.
Steganography & Digital Watermarfking
Visit for more Learning Resources
Steganography with Digital Images
Khan, Mohammed Minhajuddin
Steganography ETPRO 2010.
Steganography Techniques and their use in Anonymity
Parag Agarwal Digital Watermarking Parag Agarwal
DISSERTATION ON CRYPTOGRAPHY.
Image Based Steganography Using LSB Insertion Technique
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Ramya Kuppam Manikyam School of Computing Dr. Todd McDonald Professor STEGANOGRAPHY Ramya Kuppam Manikyam School of Computing Dr. Todd McDonald Professor Sponsored by NSF Grant DUE-1303384

Cryptography was created for securing the secrecy of communication. Introduction Since the rise of the internet, one of the most important fact of information technology and communication has been the security of information. Cryptography was created for securing the secrecy of communication. Unfortunately, it is not enough to keep the contents of a message secret, it may be necessary to keep the existence of the message secret. This technique is called steganography.

The word Steganography comes from Greek: What is Steganography? The word Steganography comes from Greek: Steganos – Covered or Protected Graphei – Writing It is a technique of embedding information into something else for the sole purpose of hiding that information from the casual observer. For true secrecy, you don’t want anyone to know you are sending a message at all.

History of Steganography The idea and practice of hiding information has a long history. In histories, a Greek historian shaved the head of his most trusted slave and tattooed the message on the scalp. When the hair grew back, the slave was dispatched with the hidden message.

History of Steganography (Cont..) One more example would be, a Greek exile in Persia wrote a message on the wood backing of a wax tablet. He then hid the message underneath a fresh layer of wax.

History of Steganography (Cont..) A more subtle method used during world war II was to use invisible inks. Organic compounds such as lemon juice is used to write a message and it turned dark when held over a flame.

Example for encryption: this is fun gsrh rh ufm Stego Vs. Crypto Some people might consider steganography to be related to encryption, but they are not the same thing. They do have the same purpose which is to hide/protect important information, but with different approach. Cryptography is a technology used to translate something readable to something unreadable whereas steganography conceals information making it unseen. Example for encryption: this is fun gsrh rh ufm a b c d e f g h I j k l m n o p q r s t u v w x y z z y x w v u t s r q p o n m l k j i h g f e d c b a Encryption Decryption

Stego Vs Crypto (Cont…) One of the main drawbacks of using encryption is that when you see an encrypted message, you know that it’s an encrypted. If someone captures a network data stream or an e-mail that is encrypted, the mere fact that the data is encrypted might raise suspicion. The person monitoring the traffic may investigate why and use various tools to try to figure out the message’s contents. In other words, encryption provides confidentiality but not secrecy. With Steganography, however, the information is hidden, and someone looking at the image wouldn’t be able to determine if there’s any information within the image. So, it would be right in front of our eyes, but we wouldn’t even be able to see it.

Practical uses of Stego: Advantages: For instance, we can store password information on image file on your hard drive or web page. This technology can be used by military operations to transmit confidential messages. Disadvantages: This technology was used by terrorists in 9/11 attack to hide their attack plans, maps and activities in chat rooms, bulletin boars and websites.

In text steganography, the message is converted to a English text. Types of Stego Today, we are going to do two activities in which Steganography is used. Text Steganography Image Steganography Text steganography: In text steganography, the message is converted to a English text. It is in fact English text, consisting of words chosen from English dictionary. To make it look more innocent, the English text are to be formed in such a way that it has some meaning to the intruder. Then this text can be sent to the receiver, who can then decode the message.

Text Steganography (Cont…) Historically, null ciphers are a way to hide a message in another without the use of a complicated algorithm. Simplest null ciphers is shown in the classic examples below: Come see how the swallows fly to the south island helped by our fine weather. They locate the place in the immense ocean by navigating at night, following the clouds which form around midnight above the shore. “Come to our place at midnight”

I am married happily in Dallas dated eleventh November. Text Steganography Another example of text Steganography: Magazine editors effectively tackle major economic affairs. The supporting technical associate reviews basic user coupled knowledge solutions. MeetmeaTstarbucks “Meet me at Starbucks” I am married happily in Dallas dated eleventh November. IamhiDdeN “I am hidden” She earned academic laurel. They helped exposing dexterity effectively among league. SealThedeal “Seal the deal”

“The password is secret” The supply of game for London is going steadily up. Head keep Hudson, we believe, has been now told to receive all orders for fly paper and for preservations of your hen pheasant’s life. “The game is up. Hudson has told all. Fly for your life.” 5) The main computer’s password is ‘opennthegate’. Is this a secret entrance? “The password is secret”

Image Steganography Image Steganography: A digitalized photograph is stored as an array of colored dots called pixels. Each pixel typically has three numbers associated with it, one for red, green and blue intensities, and these values often range from 0-255. each bit is stored as eight bits ( zeros and ones)

Image Steganography (Cont…) The difference of one or two in the intensities is imperceptible, and a picture can still look good if the least significant four bits of intensity are altered 1 128 64 32 16 8 4 2 1 MSB LSB

Image Steganography (Cont…) For example, the ASCII value of letter ‘M’ is 77 We can hide these 8 bits in a pixel as follows: A text requires 8 bits per letter. So we can hide more than one letter in a pixel. 1 128 64 32 16 8 4 2 1 1 1 1

Image Steganography (Cont…) In Least Significant Bit image Steganography, the intensities of the pixel (Input Data) are embedded with the bits of the secret text (Hidden data) as follows: What happens when you alter the Most Significant Bit(MSB) or more than four intensities of a pixel? http://www.rapidtables.com/web/color/RGB_Color.htm

Image Steganography (Cont…) These are the images before and after embedding text in a image file:

Exercise (Embedding a text file) Open ‘Notepad’ on your desktop and type a secret message you would like to hide using steganography.

Exercise (Embedding a text file) Save that file on the desktop.

Exercise (Embedding a text file) Open the folder ‘steg-v1.0.0’ on the desktop

Exercise (Embedding a text file) Open the ‘steg’ application:

Exercise (Embedding a text file) Click ‘Run’

Exercise (Embedding a text file) ‘Steg’ application looks like the below screenshot:

Exercise (Embedding a text file) Click on ‘file’ > ‘Open JPEG image’

Exercise (Embedding a text file) The image is located on desktop named ‘security’

Exercise (Embedding a text file) This is the image in which the data is to be hidden:

Exercise (Embedding a text file) Click ‘Hide’ > ‘Hide data’

Exercise (Embedding a text file) Open the text file that are you are supposed to embed in this image file:

Exercise (Embedding a text file) You will get a pop up saying the ‘data successfully hidden’

Exercise (Embedding a text file) Save the image file with the hidden text file by clicking on Hide > Save

Exercise (Embedding a text file) The image file is saved in the following destination:

Exercise (Extracting the text file) Click on ‘open JPEG image’ to open the image with embedded text file

Exercise (Extracting the text file) The image is located on desktop > stego > hidden

Exercise (Extracting the text file) Open ‘Extract Data’

Exercise (Extracting the text file) Open the image file which has the embedded text file in it as follows:

Exercise (Extracting the text file) You will get a pop up ‘Data extraction success’. Click ‘OK’

Exercise (Extracting the text file) When you open the folder ‘stego’, the text file which is extracted can be viewed.

Conclusion Steganography is fascinating and effective method of hiding data that has been used throughout history. Methods that can be employed to uncover such devious tactics, but the first step are awareness that such methods even exist. There are many good reasons as well to use this type of data hiding, including watermarking or a more secure central storage method for such things as passwords, or key processes. Regardless, the technology is easy to use and difficult to detect. The more that you know about its features and functionality, the more ahead you will be in the game.

“Security is the one career where the sky is the limit ; professionals are limited only by their ambition and their imagination.”