Summer 2005CS 4953 The Hidden Art of Steganography The Hidden Art of Steganography  What is hiding in your picture?

Slides:



Advertisements
Similar presentations
Information Hiding and Covert Channels
Advertisements

Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Brodatz Textures Vistex Textures What is texture ? Texture can be considered to be repeating patterns of local variation of pixel intensities.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Khan, Mohammed Minhajuddin
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Steganography Rayan Ghamri.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Information Security Principles (ESGD4222)
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Digital Steganography
Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Cryptography, Authentication and Digital Signatures
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Digital Watermarking
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
A Partial Survey of the Perfect Digital Watermark Problem.
INCS 741: Cryptography Overview and Basic Concepts.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
2 nd lecture.  Plaintext – ciphertext – encryption – decryption.  Cryptography – cryptanalysis – cryptanalyst – cryptology.  Authentication – Integrity.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Cryptography – Test Review
Introduction to Steganography
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Information and Network Security
Steganography.
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
Parag Agarwal Digital Watermarking Parag Agarwal
STEGANOGRAPHY IN IMAGES
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

Summer 2005CS 4953 The Hidden Art of Steganography The Hidden Art of Steganography  What is hiding in your picture?

Summer 2005CS 4953 The Hidden Art of Steganography The Hidden Art of Steganography  What is hiding in your picture?

Summer 2005CS 4953 The Hidden Art of Steganography The Hidden Art of Steganography  What is hiding in your picture?

Summer 2005CS 4953 The Hidden Art of Steganography Information Hiding  Information Hiding is a branch of computer science that deals with concealing the existence of a message  It is related to cryptography whose intent is to render messages unreadable except by the intended recipients  It employs technologies from numerous science disciplines: –Digital Signal Processing (Images, Audio, Video) –Cryptography –Information Theory\Coding Theory –Data Compression –Human Visual/Auditory perception  There are four primary sub-disciplines of Information Hiding –Steganography –Watermarking –Covert Channels –Anonymity

Summer 2005CS 4953 The Hidden Art of Steganography F. A. P. Petitcolas, R. J. Anderson, M. G. Kuhn, “Information Hiding – A Survey”, Proceedings of the IEEE, special issue on protection of multimedia content, 87(7): , July 1999 Information Hiding

Summer 2005CS 4953 The Hidden Art of Steganography Fields Applied to Information Hiding  Information Theory/Coding Theory  Digital Signal Processing –Discrete Fourier Transform/Discrete Cosine Transform –Image/Audio/Video Processing  Data Compression  Cryptographic Principles  Discrete Math  Cryptographic Hashing  Data Networks  The Human Visual System/Human Auditory System –Capabilities and limitations

Summer 2005CS 4953 The Hidden Art of Steganography Basic Terminology  The data to be hidden: –Plaintext (from cryptography) –Secret message –Stego-message –Embedded data  The data which will have a stego-message embedded in it: –Covertext –Cover-Object –Cover-Image\Cover-Audio\Cover-Video –Target file

Summer 2005CS 4953 The Hidden Art of Steganography Basic Terminology  The key used to make the stego-message secure –Stego-Key –Secret Key –Key  The file with the steganography-message embedded –Stegotext (ciphertext in cryptography) –Stego-Object –Stego-Image\Stego-Audio\Stego-Video

Summer 2005CS 4953 The Hidden Art of Steganography Basic Terminology  Alice and Bob –Classical names given to the parties wishing to communicate  Sometimes, you may have a Carol and a Dave  Eve, an adversary, can listen to but not modify or forge a message –(think passive eavesdropping)  Wendy the Warden, another adversary, can monitor, modify, or forge a message –A passive warden simply listens (like Eve) –An active warden may modify a message –A malicious warden may forge a fake message

Summer 2005CS 4953 The Hidden Art of Steganography History of Steganography  The concept of message hiding is not new – it’s been around for centuries –A Greek shaved the head of a slave, wrote a message, then waited for the hair to grow back before sending the slave to his destination –Steganography (in the form of invisible ink) was used by Washington in the Revolutionary War –Prior to the Civil War, quilts were sewn with special patterns to tell escaping slaves which direction to go and what to do –During WWI there was a cable the read, “Father is dead.” Suspecting a hidden meaning, the censor changed it to “Father is deceased” which caused the reply, “Is Father dead or deceased?” –During WWII chess by mail was banned, crossword puzzles examined, stamps were removed and replaced by ones of equal value –In the 1980’s, some of Margaret Thatcher’s cabinet documents were leaked to the press. She ordered that the word processors being used by government employees, encode their identity in the word spacing of the documents

Summer 2005CS 4953 The Hidden Art of Steganography Steganography  Steganography literally means “covered writing” –A stegosaurus has a covered back  Steganography’s primary goal is to hide data within some other data such that the hidden data cannot be detected even if it is being sought  Secondary goals: –prevent extraction from the cover file without destroying the cover –prevent destruction of the stego-message without destroying the cover  Most frequently, steganography is applied to images, but many other data or file types are possible –Audio –Video –Text –Executable programs

Summer 2005CS 4953 The Hidden Art of Steganography Watermarking  Watermarking is very similar to steganography in that one of its goals is to not be detected  However, it’s primary goal is to not be able to be extracted or destroyed (at least not without destroying the cover too)  Typically, watermarking is designed to protect intellectual property rights for images, sounds, and video –If it’s easily removed or destroyed, those rights cannot be protected  Even if it’s not detectable, an adversary could suspect that a work (of art) could have a watermark and so take steps to destroy it –There is a popular program called StirMark which does just that  For some applications watermarks may be visible  May be used to fingerprint a particular file and detect changes –Make it tamper proof  Used to prove ownership  So far, to my knowledge, no one has invented a watermarking system that is good enough to hold up in court

Summer 2005CS 4953 The Hidden Art of Steganography Covert Channels  Covert channels are communication paths that were neither designed nor intended to transfer information  For example, the telephone was designed to allow voice communication –information could be conveyed by letting it ring a certain number of times –The time differences between successive phone calls could be used –You could use a mobile phone and call from different locations – the street names convey the message  Unused bits in the TCP/IP protocol headers can be used to carry information  Hiding data in an image, then sending that image to someone else could also be considered a covert channel

Summer 2005CS 4953 The Hidden Art of Steganography Anonymity  Anonymity is about concealing the sender and receiver of messages  This is the least studied sub-discipline of information hiding

Summer 2005CS 4953 The Hidden Art of Steganography Steganalysis  Steganalysis is the detection of data that has been hidden  It is a cat and mouse game – as one group of researchers come up with better ways to hide stuff, another group figures out how to detect it or perhaps just destroy it  In the summer course last year, one student thought he had a hiding system that was undetectable –His lab partner wrote a statistical analysis program that exposed the hidden message –The first student modified his program to defeat the attack –His lab partner modified his analyzer and still found the message

Summer 2005CS 4953 The Hidden Art of Steganography Wisdom from Cryptography  One of the main principals of cryptography applies to steganography as well  It is a simple concept, yet many repeatedly ignore or dismiss it  The premise from which to measure a secure steganographic system is to assume that the opponent knows the system being employed, yet still cannot find any evidence of a hidden message –Kerchoff’s Principle: the system should not depend on secrecy and should be able to fall into enemy hands without disadvantage –The ONLY way to find any evidence of a message is with the key –Many systems have relied on the “Security by Obscurity” premise and many have failed – those that have not have been lucky CSS for DVD, RIAA digital watermarking, Adobe e-books, SDMI

Summer 2005CS 4953 The Hidden Art of Steganography Wisdom from Cryptography  Often designers think (erroneously) that “They’ll never think of this.” – yet, the designer did??? –A criminal would never think to look in a flower pot for the house key Nooooo!  Even in military situations, equipment is captured or bought  If the security depends on the secrecy of the algorithm, once it is compromised, the entire system is compromised - forever  If a key is compromised, only that message is compromised  A secure system will not rely on keeping the algorithm secret, just the key  The same premise holds true for a steganography system –Do NOT depend on the secrecy of your algorithm for security!

Summer 2005CS 4953 The Hidden Art of Steganography Applications of Information Hiding  Covert military communications  Covert police communications –Criminals have learned that police are nearby when they hear encrypted communications, so they abate their activity for the moment –A steganographic system would prevent this detection  Digital Rights Management – protecting intellectual property such as images, music, electronic books, etc.  Embedding textual data in medical images would better ensure that the picture belongs to a particular patient –This technique could apply to personal pictures, sounds, and movies  Tamper proofing – ensuring a data file has not been changed  Communicating in an oppressive country w/o free speech

Summer 2005CS 4953 The Hidden Art of Steganography Nefarious Applications of Information Hiding  You won’t find these applications in the book –money laundering –drug running –child pornography –spying (good or bad depending upon which side you’re on!) –terrorism  Unfortunately, these uses are also possible  The technology itself isn’t bad, but like many things, it can be (and is) abused  Since there are nefarious uses, law enforcement and the military is also interested in understanding hiding techniques and detecting hidden data  There are some projects right here at UTSA that have done research for the Air Force

Summer 2005CS 4953 The Hidden Art of Steganography Goals of Information Hiding - Security  It is secure if it cannot be removed even with full knowledge of the embedding algorithm without knowledge of the secret key  Can it be detected by human perception? (Invisibility) –See distortion/noise in an image –Hear distortion/noise in speech or music?  Can it be detected by statistical analysis? (Undetectability)  Does it leave easily detectable signatures?  Levels of Failure: –Detection - Proof of existence of message –Extraction – removing without destroying the cover –Destruction – destroying the message without destroying the cover

Summer 2005CS 4953 The Hidden Art of Steganography Goals of Information Hiding - Capacity  How much data can a cover image hold? –There is a physical limit (unless the cover file size is increased) –There is a limit as to when the data will be noticeable  Typically, as more capacity is used, the lower the security and robustness

Summer 2005CS 4953 The Hidden Art of Steganography Goals of Information Hiding – Robustness  How well does the data maintain integrity in the face of modifications?  The modifications we are concerned with are quite common –Images: blurring, sharpening, scaling, cropping, contrast, gamma, brightness, rotation, skewing, recoloring, printing/copying/scanning, etc. –Audio: filtering (think bass/treble), volume adjustment, stereo to mono, etc. –Video: any image/audio modification, add/delete frames, temporal adjustments, frame swapping, frame averaging –Also: lossy compression, A/D and D/A conversion, and sophisticated attacks  Robustness is achieved through redundant encoding of the message which reduces the capacity

Summer 2005CS 4953 The Hidden Art of Steganography Steganographic Hiding Techniques  Substitution systems –Put message in redundant or noisy parts of cover  Transform domain techniques –Embed information in the transform space  Spread spectrum techniques –Message is spread across frequency spectrum of cover  Statistical methods –Alter some statistical properties of the cover  Distortion techniques –Store message by distorting the cover slightly and detecting the change from the original  Cover generation methods –Encode information in the way a cover is created

Summer 2005CS 4953 The Hidden Art of Steganography Steganographic Techniques - Substitution  Replace information in the cover with the stego-message  The most common method is to replace the Least Significant Bit (LSB)  Each pixel in the mandrill image is composed of 8 bits and so have a range of values from zero (black) to 255 (white) –The “sports enthusiast” was hidden by replacing the 4 least significant bits –You might be tempted to think, “That’s half the information!” –No, it is 1/16 the information – not noticeable to us  Other images with more solid backgrounds would NOT provide the same level of imperceptibility –To maximize capacity while maintaining imperceptibility, you need to analyze the cover image

Summer 2005CS 4953 The Hidden Art of Steganography Steganographic Techniques - Substitution  You can see some of the distortion caused by the mandrill image (Again, 4 bits were used)

Summer 2005CS 4953 The Hidden Art of Steganography Steganographic Techniques - Substitution  Using a solid white or black cover is NOT very good

Summer 2005CS 4953 The Hidden Art of Steganography Steganographic Techniques - Substitution  Here is a progression of hiding in the mandrill image

Summer 2005CS 4953 The Hidden Art of Steganography Questions and/or Comments