UIT Unconference December 06, 2018 Ian Redzic

Slides:



Advertisements
Similar presentations
InkJet and Thermal Printers. Inkjet Introduction InkJet Printing came about in the late 1980s InkJet Printing came about in the late 1980s Have become.
Advertisements

CHEN XIAOYU HUANG. Introduction of Steganography A group of data hiding technique,which hides data in undetectable way. Features extracted from modified.
Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Steganography and Data Hiding. Introduction Steganography is the science of creating hidden messages. Sounds like crypto, but… In traditional crypto,
Khan, Mohammed Minhajuddin
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Pictures Worth More Than 1000 Words
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Reza Mohammadi Shiraz University Of Technology
A Steganography Project Project By: Awadesh Madhogaria.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Steganography “Hiding in Plain Sight” Gary Alan Davis, D.Sc. Department of Computer & Information Systems.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Introduction to Steganalysis Schemes Multimedia Security.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
Steganography Leo Lee CS 265, Section 2 Dr. Stamp April 5, 2004.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Covert Channels Eric Pennington COSC480. Common Network Threats  Viruses, Trojans, Worms, etc.  Password Attacks  Eavesdropping  Port Scanning  Not.
FOOTPRINTING STEGANOGRAPHY.
STEGANOGRAPHY Sibaka Mahapatra Computer Science 3rd Year, Sec-E
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Steganography Nathan Shirley
Digital Steganography
Introduction to Steganography
Steganography in WebP image using LSB embedding
Steganography Nathan Shirley
Day 6 - Encoding and Sending Formatted Text
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
A (Very) Brief History of Pre-Computer Cryptography
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Computers Talk Binary.
Steganography.
Steganography & Digital Watermarfking
Visit for more Learning Resources
Steganography with Digital Images
Khan, Mohammed Minhajuddin
Steganography ETPRO 2010.
Steganography Techniques and their use in Anonymity
Steganography in digital images
Parag Agarwal Digital Watermarking Parag Agarwal
“Hiding in Plain Sight”
JPEG Steganalysis Statistical Offset Tests
STEGANOGRAPHY IN IMAGES
Presentation transcript:

UIT Unconference December 06, 2018 Ian Redzic iredzic@stanford.edu Slack @IanRedzic

Steganography The practice of hiding a message ( or worse ) within another file. Hiding a message in plain sight. 440 BC first recorded use Production studios, recording companies, computer device manufacturers The first recorded uses of steganography can be traced back to 440 BC when Herodotus mentions two examples in his Histories.[3] Histiaeus sent a message to his vassal, Aristagoras, by shaving the head of his most trusted servant, "marking" the message onto his scalp, then sending him on his way once his hair had regrown, with the instruction, "When thou art come to Miletus, bid Aristagoras shave thy head, and look thereon." Additionally, Demaratus sent a warning about a forthcoming attack to Greece by writing it directly on the wooden backing of a wax tablet before applying its beeswax surface. Some modern computer printers use steganography, including Hewlett- Packard and Xerox brand color laser printers. The printers add tiny yellow dots to each page. The barely-visible dots contain encoded printer serial numbers and date and time stamps.[37]

Reality Winner

Steganography by the yellow ink Source: https://bit.ly/2Su5J0P

How does Steganography work? Least Significant Bit = LSB In general, using extremely high compression rates makes steganography difficult, but not impossible. Compression errors provide a hiding place for data, but high compression reduces the amount of data available to hold the payload, raising the encoding density, which facilitates easier detection (in extreme cases, even by casual observation). Source: https://bit.ly/2GN6Bbi

Other Steganography methods Discrete cosine transform or DCT-based Palette-based image Use of service fields in data formats Payload embedding Wideband Overlay Another far less detectable one is called the discrete cosine transform coefficient technique (I know, it's a mouthful), which slightly changes the weights (coefficients) of the cosine waves that are used to reconstruct a JPEG image. Source: https://bit.ly/2Su5J0P

Steganography use in cyber espionage tools Microcin - malware was designed for surveillance purposes NetTraveler – utilized in spear phishing campaigns Zberp – trojan aimed at banking and financial sectors Enfal/Zero.T - backdoor that is specifically used for downloading other malware Shamoon - aggressive disk-wiping malware KinS - professional-grade banking trojan ZeusVM – banking trojan Triton (Fibbit) - malware that attacks industrial control systems (ICS)

Source: https://bit.ly/2zLXJBb

Steganalysis Steganalysis is the study of detecting hidden messages [or objects] using steganography

Questions before demo …

Demo Summary Tools: steghide and stegosuite Hide a .txt file in an image Hide another image within an image Hide a compressed file within an image How to detect images with embedded data