1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.

Slides:



Advertisements
Similar presentations
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Advertisements

BMP Hide ‘n’ Seek What is BMP Hide ‘n’ Seek ? –It’s a tool that lets you hide text messages in BMP files without much visible change in the picture. –Change.
Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Steganography and Network Security
Steganography and Data Hiding. Introduction Steganography is the science of creating hidden messages. Sounds like crypto, but… In traditional crypto,
Khan, Mohammed Minhajuddin
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Survey on Information Assurance TEL 581 Presented by Viswesh Prabhu Subramanian Gregory Michel Lincoln Jean Louis Steganography.
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Steganography “Hiding in Plain Sight” Gary Alan Davis, D.Sc. Department of Computer & Information Systems.
© Keith Vander Linden, 2005 Jeremy D. Frens, Open up the box of a computer, and you won't find any numbers in there. You'll find electromagnetic.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Have you ever wanted to hide something from: Your friends? Your family? The Government?
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization G. Sahoo1 and R. K. Tiwari2 Presented by Pan Meng.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Steganography Nathan Shirley
Digital Steganography
Introduction to Steganography
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Steganography Example
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Computers Talk Binary.
Steganography.
Steganography & Digital Watermarfking
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
Parag Agarwal Digital Watermarking Parag Agarwal
“Hiding in Plain Sight”
STEGANOGRAPHY IN IMAGES
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

1

2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04

3 What is Steganography? Derived from the Greek steganos (covered or secret) and graphy (writing or drawing). Hiding of information within electronic media: text, graphics and sound. Hiding of information within electronic media: text, graphics and sound. Used synonymously with Cryptography but different. Used synonymously with Cryptography but different. Cryptography: rendering of information as unreadable to others.Cryptography: rendering of information as unreadable to others. The presence of ciphertext makes it obvious that a secret lies within.The presence of ciphertext makes it obvious that a secret lies within.

4 History In Ancient Rome: hidden messages were tattooed on messengers shaved head. When the hair grew back, the messengers set off with a decoy message in hand. A process that usually took months. In Ancient Rome: hidden messages were tattooed on messengers shaved head. When the hair grew back, the messengers set off with a decoy message in hand. A process that usually took months. In Greece: Messages were inscribed on wooden tablets and covered with wax to make the text disappear. In Greece: Messages were inscribed on wooden tablets and covered with wax to make the text disappear. World War II: Microdot developed by the Germans. World War II: Microdot developed by the Germans. Pre 911: Terrorist utilized hotmail to distribute images between each other as a form of communication. Pre 911: Terrorist utilized hotmail to distribute images between each other as a form of communication. Post 911: Alleged conspirators were suspected using pictures posted in online auction sites (e.g. ebay) to camouflage hidden messages. Post 911: Alleged conspirators were suspected using pictures posted in online auction sites (e.g. ebay) to camouflage hidden messages.

5 How is it used? Expressed verbally: result file = container file + message file result file = container file + message file The secret message is hidden in distributed manners through algorithmic mean in the file meant to contain the secret data. Using white noise contained in electronic media. Using white noise contained in electronic media. Replacing LSB - least significant (rightmost) bit in colors. Replacing LSB - least significant (rightmost) bit in colors.

6 How it works Maroon and gold boxes show altered bytes. Maroon and gold boxes show altered bytes. Only 8 pixels changed: Only 8 pixels changed: 2, 4, 5, 6, 7, 8, 9, 10 The following sequence of 24 bits represents a single pixel in an image. Its 3 bytes of color information provide a total of 256 different values for each color (red, green and blue) and thus can represent a total of 16.7 million colors. This particular value displays as a dark green: Now, let’s take 11 of these pixels that represent, say, part of a solid-color background. In the following sequence, the least significant (rightmost) bit of each 8-bit byte has been co- opted to hide a text message—the four characters Aha!—in ASCII binary: The two figures below represent the 11 colored pixels we’ve been manipulating. The figure on the left is the original, unaltered version. The one on the right has been modified, as shown above. Can you see a difference? I can’t either. The hidden message occupies 32 of those 264 bits (about 12%) and contains four 8-bit bytes. In the diagram, each maroon or gold box represents a bit that had to be changed to include the hidden message. Notice that only 15 of 264 bits (less than 6%) had to be changed and only eight of the 11 pixels were altered. Here are the bits behind those 11 pixels:

7 Demo

8 Legitimate use of Steganography: Document tracking. Document tracking. Watermark containing copyright information. Watermark containing copyright information. Authentication. Authentication. Possible document locator. Possible document locator.

9 Ways to detect Steganography: Steganalysis - the art of discovering and rendering hidden messages useless. Steganalysis - the art of discovering and rendering hidden messages useless. Compare images to look for degradation with characteristic. Compare images to look for degradation with characteristic. Record anomalies and compare with original pictures. Record anomalies and compare with original pictures. Gather information on color composition, luminance, pixel relationship to form knowledge database and analyze the data to find patterns. Gather information on color composition, luminance, pixel relationship to form knowledge database and analyze the data to find patterns.

10 Ways to remove hidden messages: Overwrite areas of files which might contain noise space. Overwrite areas of files which might contain noise space. Heighten levels of noise. Heighten levels of noise. Image processing technique: lossy compression such as that used by JPEG. Image processing technique: lossy compression such as that used by JPEG.

11 Why is it hard to detect? Because of human inability to discern minor changes in colors and sound quality, any electronic media can hide information. Because of human inability to discern minor changes in colors and sound quality, any electronic media can hide information. The same steganography tool and pass- phrase are needed to unhide the information. The same steganography tool and pass- phrase are needed to unhide the information. Too many data to process and too time consuming – which picture is the original? Secret messages can be hidden in any picture! Too many data to process and too time consuming – which picture is the original? Secret messages can be hidden in any picture!

12 Why is Steganography not pervasively used (with ill intention)? Limited data can be hidden. A picture with 2048 by 3072 pixels (each containing 24 bits) can only hide 756K of data. Limited data can be hidden. A picture with 2048 by 3072 pixels (each containing 24 bits) can only hide 756K of data. Large files attract attention! Large files attract attention! Original information must remain intact in order for recovery of hidden message. Original information must remain intact in order for recovery of hidden message.

13 References Deborah Radcliff. “Steganography: Hidden Data.” Computerworld. Framingham: Jun 10, Vol. 36, Iss. 24; 52. James David Ballard, Joseph G Hornik, Douglas McKenzie. “Technological Facilitation of Terrorism”. The American Behavioral Scientist. Thousand Oaks: Feb Vol. 45, Iss. 6; Sharon Gaudin. “The Terrorist Network.” Network World. Framingham: Nov 26, Vol. 18, Iss. 48;

14 Thank you!