“The Art of Hiding Data”

Slides:



Advertisements
Similar presentations
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Advertisements

Information Hiding: Watermarking and Steganography
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
What is Steganography? def’n: the art and science of hiding information by embedding it in some other data. cryptography - render message unintelligible.
Steganography and Data Hiding. Introduction Steganography is the science of creating hidden messages. Sounds like crypto, but… In traditional crypto,
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Khan, Mohammed Minhajuddin
Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed By: Randy Grubb Armstrong Atlantic State University – Cyber.
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Pictures Worth More Than 1000 Words
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Spread Spectrum Steganography
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Information Security Principles (ESGD4222)
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
IEEE-WVU, Anchorage  1 Steg in the Real World Two examples that move the work of steganalysis out of the lab –The massive data survey of Provos.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
FOOTPRINTING STEGANOGRAPHY.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
STEGANOGRAPHY Sibaka Mahapatra Computer Science 3rd Year, Sec-E
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
2 nd lecture.  Plaintext – ciphertext – encryption – decryption.  Cryptography – cryptanalysis – cryptanalyst – cryptology.  Authentication – Integrity.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Introduction to Steganography
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Steganography.
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
Steganography ETPRO 2010.
Steganography Techniques and their use in Anonymity
Parag Agarwal Digital Watermarking Parag Agarwal
“Hiding in Plain Sight”
Image Based Steganography Using LSB Insertion Technique
STEGANOGRAPHY IN IMAGES
Presentation transcript:

“The Art of Hiding Data” ACSG 500 - Presentation 1 STEGANOGRAPHY “The Art of Hiding Data” Sarin Thapa

Steganography – Table of Contents Introduction – What is ?? History Stego Vs Crypto Digital Steganography - Types Digital Steganography - Common Techniques The “Embedding Model” An example A Live Demo using S - Tools Steganography Software's and Tools Modern Day Uses - Legitimate Modern Day Uses - Illegitimate The “E-Bay” Dig Steganalysis Conclusion References

Steganography – Definition and Origin “The art of hiding messages in such a way that no one but the sender and the intended recipient knows about the very existence of the message”. Greek Word, Steganos – “covered”, Graphie – “writing” The strength of Steganography is “ Stealth”

Steganography – A brief history Dates back to 440 BC. Herodotus and wax tablets Histiaeus, tattooed slave, Persian War World War II Microdots, Invisible inks and Null ciphers e.g. After the theater, all clients keep a tab down at Wesley’s Nook. Attack at dawn (Using the first letter of every world in the sentence) Navajo code-talkers of U.S. Marine Corps More recently the USS Pueblo incident in 1968 Sign Language

Steganography Vs Cryptography Same Purpose – To hide/protect important information But different approach Steganography – conceals information, making it unseen Cryptography – encrypts information, making it unreadable. Crypto + Steno = Added layer of security (one complements the other)

Digital Steganography – Types Mainly deals with hiding information within other files Text, Image, Audio, Video Types Hiding in Text By manipulating the lines and words, in HTML file Hiding in Images LSB insertion, Masking, Filtering, New File Hiding in Disk Space Unused or reserved disk space Hiding in Software and Circuitry Hiding in Network packets Hiding in strands of Human DNA (Genome Steg.)

Digital Steganography – Techniques Three common techniques used Substitution: LSB Method – replaces the last bit in a byte Advantage: Simplest approach to hide data in an image file Disadvantage: does not take well with file changing Injection: embedding the message directly into the carrier object Disadvantage: Makes the file size much larger Generation of a new file: Start from scratch Advantage: There is never an original file to compare to

Working Principle – The Embedding Model INFO HIDDEN INFO Encryption Key STEGO OUTPUT Stego Key COVER MEDIUM

Steganography – Example Can you spot the difference? One of them has a hidden message

Steganography – Demo Live Demonstration of Steganography using S – Tools Cover Medium : petronas.bmp ( An Image File) Hidden Material : fishtail.bmp ( An Image File) + Multiple (Text Files – Hamlet.txt, Macbeth.txt, Merchant.txt, Notice.txt,etc You won’t see a change in the file size A good practice is to use your own cover medium to obscure the point of reference

Steganography – Software Tools Software tools – Freeware, Shareware, Commercial. S – Tools Excellent tool for hiding files in GIF, BMP and WAV files MP3Stego Mp3. Offers quality sound at 128 kbps Hide4PGP BMP, WAV, VOC JP Hide and Seek jpg Text Hide ( commercial) text Stego Video Hides files in a video sequence Spam mimic encrypts short messages into email that looks like spam http://spammimic.com Steganos Security Suite (Commercial) and Many Many More…

Steganography – Modern Day Uses Legitimate Usage Digital Watermarking Prevent illegal modification, copying, distribution e.g. DVD recorders detect copy protection on DVDs that contain embedded authorizations Identify in Ownership disputes, content authentication Provide explanatory information with an images (like doctor’s notes accompanying an X-Ray) Printers Tiny Yellow dots, barely visible, contains date & time-stamps, encoded serial numbers Used to hide the existence of sensitive files on storage media

Steganography – Modern Day Uses Illegitimate Usage Corporate Espionage Theft of Trade Secrets Terrorism USA today article by Jack Kelly – “ Terror groups hide behind Web encryption” (February 5, 2001) Hiding secrets in websites like E-Bay, Amazon, Porn Websites, transmission via chat rooms, P2P sharing networks, etc. However, no official proof or record has been produced Child Pornography

Steganography – Recon Niels Provos and Peter Honeyman @ University of Michigan Tools used: StegDetect, StegBreak, Crawl, Disconcert 2 million images on E – bay site scanned. Only 1 stego-image found sovereigntime.jpg "B-52 graveyard" at Davis-Monthan Air Force Base

Steganalysis “It is the technique used to discover the existence of hidden information”. Simply put, A counter-measure to Steganography For additional info : Please see the reference or “google”

Steganography – Conclusion Steganography in it’s multitude of forms can be equally effective in being constructive as well as destructive This presentation covers only a tiny fraction of the whole gamut that might go well beyond digital images, text, audio, and video only. Like, voice, communication channels, protocols (TCP/IP), other text and binaries Inherently, it is neither good or bad. It is the manner in which it is used that will decide the outcome

References White Papers Others http://www.sans.org/reading_room/whitepapers/stenganography/steganography_past_present_future_552 http://www.sans.org/reading_room/whitepapers/stenganography/steganography_the_right_way_1584 http://www.sans.org/reading_room/whitepapers/stenganography/mp3stego_hiding_text_in_mp3_files_550 http://www.sans.org/reading_room/whitepapers/stenganography/steganography_and_steganalysis_an_overview_553 Others http://www.jjtc.com/Steganography/ http://www.garykessler.net/library/steganography.html http://www.stegoarchive.com http://www.securityfocus.com/ http://www.spammimic.com

The End Any Q ?? No Thank You Again.