CSCI 530L Steganography and Steganalysis
Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full Send an to with the exact subject line “Lab Time List the lab sections 1-7 in order of preference
Any Difference?
Steganography Introduction Steganography The art and science of hiding information by embedding messages within other seemingly harmless messages in such a way that no one besides the intended recipient is able to retrieve it. It is different than Cryptography Cryptography in a broad sense means scrambling of data using a particular algorithm Steganography is about hiding data
Hiding Data Steganography – hiding a file inside of another Typically hiding text inside of a media file Normally used for the transportation of secretive information Operating System Unused memory Slack space Unallocated space Hidden partition Normally used to hide data from investigators Network Unused bits in packet headers
Steganography Applications Terrorist and Criminal Activities “Terrorist instructions hidden online “ U.S. News “Messages in dots” U.S.News Corporate Espionage Trading company secretss
Steganography Approaches Chaffing and Winnowing Ron Rivest Bob sends multiple messages to Alice, but only one is authenticated. The rest are bogus. Eavesdropper cannot determine which are real and which are fake Least Significant Bit Manipulation
Least Signifiacant Bit Manupalation Idea is that the least significant bit of a byte can change with little change to the overall file Consider a 8-bit grey scale image One pixel of information is stored using 8 bits. There are 256 different variations of grey MSBLSB
LSB continued Change in the LSB information of some area of the image will not be noticeable by naked eye. Utilizing this fact the message is embedded … …
LSB advantages and disadvantages Advantages Does not change the size of the file Is harder to detect than other steganography techniques Disadvantages Normally must use the original program to hide and reveal data If the picture with the hidden information is converted to another format, then the hidden data may be lost