Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.

Slides:



Advertisements
Similar presentations
Cryptography Ch-1 prepared by: Diwan.
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Information Hiding: Watermarking and Steganography
 Caesar used to encrypt his messages using a very simple algorithm, which could be easily decrypted if you know the key.  He would take each letter.
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
What is Steganography? def’n: the art and science of hiding information by embedding it in some other data. cryptography - render message unintelligible.
Steganography and Data Hiding. Introduction Steganography is the science of creating hidden messages. Sounds like crypto, but… In traditional crypto,
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Khan, Mohammed Minhajuddin
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Bob Sherman, MCSE, CISSP Sinclair Community College Dayton, OH
STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
Cryptanalysis. The Speaker  Chuck Easttom  
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
A Steganography Project Project By: Awadesh Madhogaria.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
Information Hiding Nattawat Laksanawisit At National Chi Nan University.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Mort Anvari Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.
Private key
CSCI 391: Practical Cryptology Introduction. Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
INCS 741: Cryptography Overview and Basic Concepts.
FOOTPRINTING STEGANOGRAPHY.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Cryptography – Test Review
Introduction to Steganography
Cracking Encrypted Systems
Welcome
STEGANOGRAPHY.
Encryption
Information and Network Security
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Steganography.
Steganography & Digital Watermarfking
Visit for more Learning Resources
Encryption, Cryptography, and Steganography:
Khan, Mohammed Minhajuddin
Steganography ETPRO 2010.
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Steganography By Robert Summitt and Jiten Patel

What is Steganography It is the art and science of writing a message in a way to where the only the recipient knows of its existence. The word Steganography is of Greek origin and means “covered, or hidden writing.” Steganographic messages will generally appear as something else such as a picture or a text file. Provide security over insecure channel

History of Steganography Dates back to 440 BC Heredotus and wax tablets Histiaeus and his tattooed slave Later in the 1500’s Johannes Trithemius Steganographia World War II Micro Dots Doll Woman Pueblo Incident in 1968 Sign Language Photos

How does it work now? Plaintext Encrypt Cyphertext Covertext Stegotext

Steganography Examples This first photo is that of a tree (obviously) By making this image 85% brighter the result is the image of the cat below

Steganography Examples M1 = Steganography is the art and science of communicating in a way which hides the existence of the communication. In contrast to cryptography, where the "enemy" is allowed to detect, intercept and modify messages without being able to violate certain security premises guaranteed by a cryptosystem, the goal of steganography is to hide messages inside other "harmless" messages in a way that does not allow any "enemy" to even detect that there is a second secret message present

Other Uses Hidden messages can also be implemented into audio files using the LSB method. Sounds and noises at the LSB level can not typically be heard by the human ear. Therefore when playing the original file it sounds just like a normal.wav or.mp3 file However it can be decrypted to reveal another sound file or any file for that matter. File must be big enough to hold hidden message.

Steganography In The News Bin Laden: Steganography master? USA Today reported that Bin Laden and others "are hiding maps and photographs of terrorist targets and posting instructions for terrorist activities on sports chat rooms, pornographic bulletin boards and other websites, U.S. and foreign officials say."

Popular Programs Steghide.bmp.wav.au MP3Stego.mp3 Snow Text files

S-Tools One of the most reliable tools for steganography is S-tools This program was created in 1994 by Andy Brown There has been no updates since then because of its encryption algorithm. Nearly impossible to break

How S-tools works

Why S-tools is so good for this! 4 different types of encryptions to choose from IDEA, DES, Triple DES, MDC The password is entered and confirmed by the user and then is encrypted using the desired algorithm To reveal any image one must know the password along with the encryption algorithm This makes it extremely difficult to break even using a brute force attack.

WinBatch attempt Using a script designed for winbatch an attempt was made to brute force a few files that supposedly had hidden files Script was designed to brute force using a dictionary file The script also tried every possible encryption method Dated machines didn’t have enough virtual memory to conduct this test but if they had it would have taken a LONG time!

More Modern day uses KFC Ad Digital Watermarking

References Including the history, modern uses, and KFC refrences Site where Winbatch was found Site explaining LSB and provides script used for Winbatch Site where S-tools comes from