CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.

Slides:



Advertisements
Similar presentations
BMP Hide ‘n’ Seek What is BMP Hide ‘n’ Seek ? –It’s a tool that lets you hide text messages in BMP files without much visible change in the picture. –Change.
Advertisements

F5 A Steganographic Algorithm
Steganography and Network Security
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Khan, Mohammed Minhajuddin
Network Security – Part 2 Public Key Cryptography Spring 2007 V.T. Raja, Ph.D., Oregon State University.
Overview of Digital Stenography
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
Bob Sherman, MCSE, CISSP Sinclair Community College Dayton, OH
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Steganography detection Roland Cmorik, Martin Šumák.
A Steganography Project Project By: Awadesh Madhogaria.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Computer Systems Nat 4.5 Computing Science Data Representation Lesson 4: Storing Graphics EXTENSION.
Steganography.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss Authors: Avinash Srinivasan, Jie Wu, and Justin.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
``Chaffing and Winnowing’’ & Crypto Policy Comments Ronald L. Rivest Cryptography and Information Security Group MIT Lab for Computer Science April 1998.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
STEGANOGRAPHY Sonya Febiatiningsih ( ) for further detail, please visit
Cryptographic Anonymity Project Alan Le
Implementation of Steganographic Techniques Danny Friedheim pd. 2.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization G. Sahoo1 and R. K. Tiwari2 Presented by Pan Meng.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
FOOTPRINTING STEGANOGRAPHY.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Steganography Nathan Shirley
Digital Steganography
Introduction to Steganography
Steganography Nathan Shirley
Welcome
Steganography Example
Cryptography And Network Security
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Steganography.
Steganography & Digital Watermarfking
Visit for more Learning Resources
Steganography with Digital Images
Encryption, Cryptography, and Steganography:
Khan, Mohammed Minhajuddin
JPEG Steganalysis Statistical Offset Tests
Image Based Steganography Using LSB Insertion Technique
STEGANOGRAPHY IN IMAGES
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

CSCI 530L Steganography and Steganalysis

Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full Send an to with the exact subject line “Lab Time List the lab sections 1-7 in order of preference

Any Difference?

Steganography Introduction Steganography The art and science of hiding information by embedding messages within other seemingly harmless messages in such a way that no one besides the intended recipient is able to retrieve it. It is different than Cryptography Cryptography in a broad sense means scrambling of data using a particular algorithm Steganography is about hiding data

Hiding Data Steganography – hiding a file inside of another Typically hiding text inside of a media file Normally used for the transportation of secretive information Operating System Unused memory Slack space Unallocated space Hidden partition Normally used to hide data from investigators Network Unused bits in packet headers

Steganography Applications Terrorist and Criminal Activities “Terrorist instructions hidden online “  U.S. News “Messages in dots”  U.S.News Corporate Espionage Trading company secretss

Steganography Approaches Chaffing and Winnowing Ron Rivest Bob sends multiple messages to Alice, but only one is authenticated. The rest are bogus. Eavesdropper cannot determine which are real and which are fake Least Significant Bit Manipulation

Least Signifiacant Bit Manupalation Idea is that the least significant bit of a byte can change with little change to the overall file Consider a 8-bit grey scale image One pixel of information is stored using 8 bits. There are 256 different variations of grey MSBLSB

LSB continued Change in the LSB information of some area of the image will not be noticeable by naked eye. Utilizing this fact the message is embedded … …

LSB advantages and disadvantages Advantages Does not change the size of the file Is harder to detect than other steganography techniques Disadvantages Normally must use the original program to hide and reveal data If the picture with the hidden information is converted to another format, then the hidden data may be lost