Steganography ETPRO 2010.

Slides:



Advertisements
Similar presentations
Starter for 10 Unit 9: Using a digital or video camera Transform IT SFT09_camera_video.
Advertisements

Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
CRYPTOGRAPHY Lecture 1 3 week summer course. Why we need secure means of communication? Government: diplomacy is sometimes better done quietly. Military:
Khan, Mohammed Minhajuddin
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Steganography Rayan Ghamri.
Using Outlook Express Copyright: Nipawin School Division No.61, Box 2044 Nipawin, SK 2004.
Welsh Art - Industry Clwyd Fine Art Trust and Joint Area Museum Education Service (JAMES)
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Investigation 1: Rubbings
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Steganography “Hiding in Plain Sight” Gary Alan Davis, D.Sc. Department of Computer & Information Systems.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Presented by the Virginia 4-H Science and Technology Committee.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Do pictures always give truthful information? Can publishing it be hurtful??
International Young Naturalists’ Tournament 6. Disappearing ink Serbian team Regional Center For Talented Youth.
1984 Pre-Reading IS HISTORY STABLE?. JOURNAL Does the history that we read, watch, and study reflect the reality? Who writes history text books? Can history.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
MY DIGITAL FOOTPRINT. WHAT IS A DIGITAL FOOTPRINT? Each time you log onto social media, you leave a trail behind you, mostly based on what you search.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
FOOTPRINTING STEGANOGRAPHY.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
As modern children, we have a huge number of electronic devices available to us. We might use computers, tablets, mobile phones or games consoles; for.
Introduction to Steganography
Managing a Project User Documentation.
The History of Printing
Can we believe what we read and see?
Digital Literacy Tour Google/iKeepSafe/YouTube Presenter Introduction
Forensic Science Questioned Documents: Part 3
A (Very) Brief History of Pre-Computer Cryptography
Computers Talk Binary.
OverDrive Digital Library Basics
Ramya Kuppam Manikyam School of Computing Dr. Todd McDonald Professor
STOP. THINK. CONNECT. Online Safety Quiz.
OverDrive Digital Library Basics
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Fingerprints & Footprints
Digital Citizenship and You.
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
Star Math PreTest Instructions For iPad users with the STAR app
The KINDNESS KART will be happening soon in the gym!
Fry Word Test First 300 words in 25 word groups
Information, Communication and Technology
The of and to in is you that it he for was.
2.8.2 Being Online Being smart online
UIT Unconference December 06, 2018 Ian Redzic
TRILLION DOLLAR FOOTPRINT
Identifying Author’s Purpose and Perspective World Lit DD
“Hiding in Plain Sight”
Fingerprints: Methods of Detection
2.8.2 Being Online Being smart online
2.8.2 Being Online Being smart online
Being smart online I can discuss what I do online.
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Steganography ETPRO 2010

What does this mean? Steganos (Covered) Graphie (Writing) ETPRO 2010

Why Greek? They used this technique! In 440 Demaratus, used a covered writing technique to send a warning about an attack to Greece. At that time wax tablets were used to write on. The wax could be melted and the tablet could be used again. Demaratus, wrote on the wooden backing of a wax tablet before the beeswax was applied. Histiaeus tattooed the shaved head of his most trusted slave and sent the slave to deliver his message once the hair had grown back. Ask students if they have ever heard of other “covered writing” Students might say: Invisible ink Microdots Altered Digital Files ETPRO 2010

Invisible Ink in the Revolutionary War Podcast: Invisible Ink and More: The Science of Spying in the Revolutionary War British spies would mark their letters with an A for acid, or F for fire to tell the recipient of the letter whether the heat from the flame of a candle, or washing soda ( an alkaline chemical Sodium Carbonate is currently used in water softener) The author would write a letter and in between the lines he or she would write in invisible ink. The recipient had to be very careful not to smudge the writing. ETPRO 2010

What could you use to make invisible ink? Good spies use stuff that is normally found around the house to make invisible ink. That way, if the materials are discovered, they won’t be revealed as spies! Give students the steganography worksheet and let them practice different steganography methods. Method 1: Use the white candle on the paper, the highlighter will reveal the message. Method 2: Use the skewer to scratch a message on piece of paper (the paper may need to be folded several times to provide adequate relief to the message. Use the crayon to reveal the message Method 3: Combine the baking soda in the water and wrote on the paper with a cotton swab. When it is dry, paint on purple grape juice to reveal the message. ETPRO 2010

The Special Operations Executive Training Manual Invisible Inks should be: Water Soluble Non-volatile, and no smell Leave no residue (i.e. Be invisible if you tilted the paper) Not visible under ultra-violet light Not deteriorate or cause the paper to deteriorate over time Be revealed by unknown developers Use as few developers as possible Develop using something other than heat Easy to obtain so that it looks innocent if someone should have it Ask students to assess the methods they tried as a real spy would. Method 1 (White Candle): Pro:2,4,5,7, 8, 9 Con:1,3,6, Method 2 (Skewer): Pro:2,4,5, 7, 8, 9 Con:1,3,6 Method 3 (Baking Soda and Water) Pro:1, 2,4,5,7, 9 ETPRO 2010

MicroPrinting Image from: http://www.google.com/imgres?imgurl=http://farm3.static.flickr.com/2710/4500411648_874798709f_z.jpg&imgrefurl=http://www.flickr.com/photos/jackofspades/4500411648/&usg=__O6PXyuwV6i06Tj5o8JyEVHK_aQ4=&h=488&w=640&sz=270&hl=en&start=0&sig2=HZw3PxZ8GpQuiY4BSEiNAw&zoom=1&tbnid=n0PDTlNEK00lBM:&tbnh=143&tbnw=188&ei=tK_mTLemJ8P_lgee3uWfCw&prev=/images%3Fq%3Dmicroprinting%26um%3D1%26hl%3Den%26sa%3DG%26rlz%3D1C1SNNT_enUS360US361%26biw%3D1600%26bih%3D775%26as_st%3Dy%26tbs%3Disch:1,iur:fc&um=1&itbs=1&iact=hc&vpx=540&vpy=115&dur=4104&hovh=196&hovw=257&tx=145&ty=159&oei=tK_mTLemJ8P_lgee3uWfCw&esq=1&page=1&ndsp=4&ved=1t:429,r:2,s:0 ETPRO 2010

Hiding the entire Declaration of Independence in one dot! . ETPRO 2010

Computer Steganography Altered Images Could you tell a fake picture from a real picture? ETPRO 2010

Which is Fake? Which is True? If time permits take the Urban legends image quiz at http://urbanlegends.about.com/library/bl_image_quiz.htm http://urbanlegends.about.com/library/bl_image_quiz.htm ETPRO 2010 PIC SITE

ETPRO 2010

circa 1860: This nearly iconic portrait of U. S circa 1860: This nearly iconic portrait of U.S. President Abraham Lincoln is a composite of Lincoln's head and the Southern politician John Calhoun's body. Putting the date of this image into context, note that the first permanent photographic image was created in 1826 and the Eastman Dry Plate Company (later to become Eastman Kodak) was created in 1881. 2010

http://www.cs.dartmouth.edu/farid/research/tampering.html ETPRO 2010

Using a Steganography Tool: Can you tell the difference? Included in the content files is a great video on steganography. It shows how whole files can be merged into a photo without changing the image. Here is a good article about steganography: http://www.symantec.com/connect/articles/steganography-revealed Steganography can be used for good or evil. This means that sites that host steganography can be loaded with malware. It is best not to search for or install this software on your machine. ETPRO 2010

S Tools Can Hide a Text file in a .BMP Photo ETPRO 2010

Using the same tool and the password, reveals the hidden file ETPRO 2010