Steganography and Network Security

Slides:



Advertisements
Similar presentations
Images Images are a key component of any multimedia presentation.
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
F5 A Steganographic Algorithm
Digital Imaging and Image Analysis
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed By: Randy Grubb Armstrong Atlantic State University – Cyber.
RGB Intensity Based Variable- Bits Image Steganography 2008 IEEE Asia-Pacific Services Computing Conference (APSCC 2008) 1 st International Workshop on.
Binary & Decimal numbers = 3* * *10 + 5*1 = 3* * * *10 0 Decimal system: Ten digits: 0,1,2,3,…,9 Example:
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Adnan Gutub Mahmoud Ankeer Muhammad AbuGhalioun
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
First Bytes - LabVIEW. Today’s Session Introduction to LabVIEW Colors and computers Lab to create a color picker Lab to manipulate an image Visual ProgrammingImage.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Digital Colour Theory. What is colour theory? It is the theory behind colour mixing and colour combination.
1 A Java Framework for Experimentation with Steganography Dr. Kenny Hunt The University of Wisconsin – La Crosse.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
Steganography detection Roland Cmorik, Martin Šumák.
A Steganography Project Project By: Awadesh Madhogaria.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Computer Systems Nat 4.5 Computing Science Data Representation Lesson 4: Storing Graphics EXTENSION.
Steganography.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
Visual Cryptography Advanced Information Security March 11, 2010 Presenter: Semin Kim.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
CS 101 – Sept. 14 Review Huffman code Image representation –B/W and color schemes –File size issues.
Cryptographic Anonymity Project Alan Le
Implementation of Steganographic Techniques Danny Friedheim pd. 2.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization G. Sahoo1 and R. K. Tiwari2 Presented by Pan Meng.
More Digital Representation Discrete information is represented in binary (PandA), and “continuous” information is made discrete.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Introduction to Steganography
Images Data Representation.
Welcome
How to Convert Pictures into Numbers
Steganography Example
Cryptography And Network Security
Steganography.
Steganography & Digital Watermarfking
CS320n –Visual Programming
Visit for more Learning Resources
Steganography Techniques and their use in Anonymity
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
© 2010 Cengage Learning Engineering. All Rights Reserved.
Non-numeric Data Representation
Image Based Steganography Using LSB Insertion Technique
Department of Computer Science, University of Central Florida ,Orlando
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Steganography and Network Security By Sravya Nagaraju

Contents: Introduction Frame works Categories Image Steganography Applications References

INTRODUCTION Steganography: Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.

Frame Work:

Categories:

Image Steganography: Image Steganography is the technique of hiding the data within the image in such a way that prevents the unintended user from the detection of the hidden messages or data.

For Example Original image Stego Image Image sources: https://www.pushpraj.com/photos/cool-scenery

Methods: Image Domain Least significant bit Substitution Pixel indicator Stego Color Cycle Max Bit Pixel value Differencing

Image Domain: Images are made up of lots of little dots called pixels. Each pixel is represented as 3 bytes – one for Red, one for Green and one for Blue. 11111000 11001001 00000011 248 201 3 Each byte is interpreted as an integer number, which is how much of that color is used to make the final color of the pixel. 248 + 201 + 3 = Orange Color

The difference between two colors that differ by one bit in either one red, green or blue value is impossible detect for a human eye. So we can change the least significant (last) bit in a byte, we either add or subtract one or more values from the value it represents. This means we can overwrite the last bit in a byte without affecting the colors it appears to be.

A common approach of hiding data within an image file is Least Significant Bit (LSB) Substitution. In this method, we can take the binary representation of the hidden data and overwrite the LSB of each byte within the cover image.

Least significant bit Substitution: Suppose we have the following binary representation for the Cover Image. 10010101 00001101 10010110 00001111 Suppose we want to "hide" the following 4 bits of data: 1011, we get the following, Where the each data bits are accommodated in the least significant bits of each byte of the image.

Least Significant Bit Substitution results in a very minor distortion of the image which is very much negligible for the human eyes. Original Image Stego Image Image source: http://nestopia.com/blog/freshen-house-vibrant-flowers/

Pixel Indicator: This method uses the least two significant bits of one of the channels to indicate existence of data in the other two channels.

Stego Color Cycle: The SCC technique uses the RGB images to hide the data in different channels. It keeps cycling the hidden data between the Red, Green and Blue channels, utilizing one channel at a cycle time.

Max Bit: This method measures the intensity of the pixel and then hides data by random pixel selection with a goal to hide maximum data in each pixel. This method is divided into three parts: Encryption Image Intensity Calculation Steganography.

Original Image Grayscale Image Intense Pixels All Black colored pixels are considered as Intense pixels Image source: http://beartales.me/2013/07/31/old-buildings/

Pixel Value Differencing: Pixel Value Differencing (PVD) is able to provide a high quality stego image in spite of the high capacity of the concealed information. That is, the number of insertion bits is dependent on whether the pixel is an edge area or smooth area. In edge area the difference between the adjacent pixels is more, whereas in smooth area it is less. Smooth Area Edge Area While human perception is less sensitive to subtle changes in edge areas of a pixel, it is more sensitive to changes in the smooth areas

Applications of Image Steganography Secure Private Files and Documents. Hide Passwords and Encryption Keys. Transport Highly Private Documents between International Governments. Transmit message/data without revealing the existence of available message.

References: http://www.garykessler.net/library/steganography.html http://www.jjtc.com/Steganography/ http://www.wikepedia.org/ http://technet.Microsoft.com http://www.bu.edu/

Questions ?

Thank You