“Hiding in Plain Sight”

Slides:



Advertisements
Similar presentations
Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
Advertisements

Web Design Vocab 3 PNG, JPG, GIF, MP3, MPEG.
Principles of Information Technology
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Information Hiding: Watermarking and Steganography
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Khan, Mohammed Minhajuddin
“The Art of Hiding Data”
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
Amazing Call to Action Templates. Personalising the Call to Action Templates Images are grouped in the Powerpoint slide so to edit an element, simply.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
Digital Watermarking Parag Agarwal
Reza Mohammadi Shiraz University Of Technology
Steganography Ben Lee III Long Truong ECE Spring 2002.
Watermarking Relational Databases CSC 574/474 Information System Security.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Unit 8.2 / Lesson 1 / presentation1a Web Elements.
ACE-HIGH MP3 WAV WMA OGG Converter By :: Natharat Kaewrawang
Steganography “Hiding in Plain Sight” Gary Alan Davis, D.Sc. Department of Computer & Information Systems.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
STEGANOGRAPHY By Allison Boyzuck. What is it? Simply put Steganography is the act of embedding either a picture or message in another picture or message.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
To insert an Audio file on all slides click Insert click the Audio drop down arrow and select the type of audio you want. An audio file placed on the.
Computer Forensics, Steganography and Cryptography and Related Ethical Issues. Edilasio Pereira Russell Braun Team 8.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
Let’s Make a Movie The Basics. Goals Storyboard Take Video Upload Video.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
FOOTPRINTING STEGANOGRAPHY.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
2 nd lecture.  Plaintext – ciphertext – encryption – decryption.  Cryptography – cryptanalysis – cryptanalyst – cryptology.  Authentication – Integrity.
Teacher Tube Teacher tube is a great source for any digital media to use with your class. It is free to sign up, and you have access to many different.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Principles of Information Technology
Introduction to Steganography
Insert Voice over PowerPoints
-Type text and adjust font/size To add images:
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Editing Instructions To add text: -Insert -Text Box
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Model-based Steganography
Steganography.
Khan, Mohammed Minhajuddin
Windows Movie Maker (.wmv)
How to Embed Videos into Powerpoint
דחיסת קול ותמונה נמרוד פלג חורף תשע"ז, המרכז הבינתחומי הרצליה
Steganography ETPRO 2010.
Steganography Techniques and their use in Anonymity
Parag Agarwal Digital Watermarking Parag Agarwal
Narrative inserted in Speaker notes:
HOW TO CREATE BIBLIOGRAPHY:
STEGANOGRAPHY IN IMAGES
Principles of Information Technology
Presentation transcript:

“Hiding in Plain Sight” Steganography “Hiding in Plain Sight” Gary Alan Davis, D.Sc. Department of Computer & Information Systems

Steganography – what is it? Covered Writing (Berinato, 2003) from Greek “steganos” & “graphie” Earliest example (May, 1997) Greece, 500 B.C. Message tattooed on shaved head of slave Message sent when hair grew back Goal: Hide the fact that message even exists (Glass, 2002)

Steganography in Technology Hiding messages within legitimate files Picture (.bmp, .jpeg, .gif) Audio (.wav, .mp3) Video (.mpeg, .avi) Messages could be . . . (Fisher, 2004) Trademark/copyright information Communication to others Malicious code

Good Steganography Watermarks Digital Watermarks (Glass, 2002) Identify copyrighted material Deter unlicensed use Deter piracy Digital Watermarks (Glass, 2002) Robust Watermarks – use blocked if mark is detected Fragile Watermarks – use blocked if mark is corrupted

Bad Steganography Malicious code (Fisher, 2004) Viruses Spyware Terrorist Communications (Kolata, 2001) “Dead Drop” (e.g., eBay) No direct communication Difficult to detect hidden messages in files

SecureKit, Inc. (www.securekit.com) Steganography Demo Steganography 1.7.1 15 day free trial $24.95 to purchase SecureKit, Inc. (www.securekit.com) Note: The following demo is an example of Insertion Steganography (note change in carrier file size)

First, choose a carrier file to contain your secret message (click to continue)

Click here to select carrier file Click here to open carrier file

Click here to add a secret message Click here to type in the message Click OK to continue

84 Click Save Click Hide

Secret message is now hidden in carrier file (click to continue) The next series of steps show how the recipient can reveal the secret message (click to continue)

To Open Carrier File, click here 84

Click Unhide to reveal Secret Message 84 Click OK to continue

Any Questions? davis@rmu.edu Thank you! Any Questions? davis@rmu.edu