Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.

Slides:



Advertisements
Similar presentations
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
F5 A Steganographic Algorithm
Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Steganography and Data Hiding. Introduction Steganography is the science of creating hidden messages. Sounds like crypto, but… In traditional crypto,
Khan, Mohammed Minhajuddin
Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed By: Randy Grubb Armstrong Atlantic State University – Cyber.
Steganography, Steganalysis, & Cryptanalysis
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Pictures Worth More Than 1000 Words
Steganography Part 2 – Detection and Research. Introduction to Steganalysis What is steganalysis?  The art of detecting messages hidden by steganography.
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
Digital Watermarking Parag Agarwal
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot May 2011 May 2011 Steganalysis ITSS 4201 Internet Insurance and Information.
Steganography. Outline What is Steganography? History Steganography used nowadays? Terms Steganography methods Steganography Available Software Steganalysis.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
IEEE-WVU, Anchorage  1 Steg in the Real World Two examples that move the work of steganalysis out of the lab –The massive data survey of Provos.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Steganography Leo Lee CS 265, Section 2 Dr. Stamp April 5, 2004.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
FOOTPRINTING STEGANOGRAPHY.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
Digital Steganography
Introduction to Steganography
Security and Error Correction/Detection in 802.1x and GSM
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Digital Forensics 2 Lecture 2B: Steg Tools Presented by : J.Silaa
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Computers Talk Binary.
Steganography.
Steganography & Digital Watermarfking
Visit for more Learning Resources
Steganography with Digital Images
Khan, Mohammed Minhajuddin
Steganography in digital images
Parag Agarwal Digital Watermarking Parag Agarwal
UIT Unconference December 06, 2018 Ian Redzic
JPEG Steganalysis Statistical Offset Tests
Image Based Steganography Using LSB Insertion Technique
STEGANOGRAPHY IN IMAGES
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B

Topics of discussion: What is Steganography? What is Steganalysis? What are some detection methods? Is this a growing threat?

What is Steganography? Steganography is the hiding of information within a more obvious kind of communication. Used for centuries traced back to the Roman Empire traced back to the Roman Empire messenger shaved his head tattooed a message on it waited for his hair to grow back traveled to his destination traveled to his destination shaved his head to reveal the message. Also used invisible ink etc.

Round 1 - Bitmap One of these is just a regular image, the other has a 22.0 KB document hidden inside it. Can you tell which is which by just looking? The image on the right is the one with the embedded data.

Round 2 – GIF The same 22 KB document is hidden inside one of these. The original was 4.8 KB, because it is compressed, the steg image is 251 KB

Steganalysis Steganalysis is the detection of steganography by a third party. Visual analysis- detecting changes in the appearance that are noticeable to the human eye. Statistical (algorithmic) analysis- more powerful, reveals small alterations in an image’s statistical behavior caused by steganography

Different Statistical Tests Average bytes - above 175 indicates data embedded, below indicates clean file. Differential values – above 150 is dirty, below 50 is clean You can also use variation of the bytes, kurtosis, and average deviation graphs, but they have no distinct breaking point, and therefore can not be universal. There are also more complicated types, such as mathematical steganalysis

Types of Detection Types of Detection S-tools & Hide and Seek – examine color table of.bmp images for near duplicates J-Steg – hides in DCT coefficients, use statistical testing EZ-Stego – look at color table, can see by looking at image if it is degraded

WetStone Technologies WetStone delivers cyber security and digital investigation products delivers cyber security and digital investigation products training to government, law enforcement, and private sector organizations around the world. training to government, law enforcement, and private sector organizations around the world. Stego Suite 4.1 Stego Suite 4.1 Stego Watch Stego Watch Stego Analyst Stego Analyst Stego Break Stego Break

StegoWatch, Stego Analyst and Stego Break Stego Analyst- An imaging tool that allows searches for visual clues Can examine characteristics such as color palettes, hue, intensity, used colors, etc… Stego Break- Applies a dictionary based attack, to obtain passwords. Stego Watch- This allows users to detect the presence of hidden communications in digital images or audio files.

Niels Provos and StegDetect Niels Provos is one of the leaders in Steganography detection, he developed Stegdetect. This program uses a webcrawler to save images and send them to Stegdetect. It also includes Stegbreak which launches dictionary based attacks on jpegs. Problems: Many false positives Many false positives Too slow Too slow

Dangers of Steganography Explosion on internet traffic provides perfect environment for steganography Over 100 free steg programs on the internet, over 1 million downloads Terrorism – In a New York Times article it explains the use of steganography by terrorists linked to Osama Bin Laden, as well as the Zacarias Moussaoui case that we read about. Used for industrial espionage, trade secret theft, cyber weapon exchange, and criminal coordination and communication.

Future of Steg and Steganalysis As the use of steganography becomes more widespread in both the traditional and criminal world, the techniques are becoming better and better. Steganalysis is also getting better, but as people publish their findings, it is easier to protect against it. Laws are changing to encompass digital information. on Niels Provos’ website, the legality is said to be questioned. website

My Thoughts There is a lot of information out there. Too many images Easy access

Summary Today we talked about What steganography is What steganography is What steganalysis is What steganalysis is Some detection methods Some detection methods Some programs used Some programs used The growing threat when used maliciously The growing threat when used maliciously For more information look at my website at: