Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.

Slides:



Advertisements
Similar presentations
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Advertisements

BMP Hide ‘n’ Seek What is BMP Hide ‘n’ Seek ? –It’s a tool that lets you hide text messages in BMP files without much visible change in the picture. –Change.
Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Steganography and Network Security
Comp 1001: IT & Architecture - Joe Carthy 1 Review Floating point numbers are represented in scientific notation In binary: ± m x 2 exp There are different.
Analogue and Digital. Digital and Analogue 1.What change is happening between 2008 and 2012? 2.List some of the ways that digital TV can be sent. 3.List.
Steganography and Data Hiding. Introduction Steganography is the science of creating hidden messages. Sounds like crypto, but… In traditional crypto,
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Khan, Mohammed Minhajuddin
Overview of Digital Stenography
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
Simplex, Half Duplex & Duplex Serial & Parallel transmission Synchronous & Asynchronous Bit & Baud Rate.
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
CSCI-235 Micro-Computers in Science Hardware Part II.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Steganography “Hiding in Plain Sight” Gary Alan Davis, D.Sc. Department of Computer & Information Systems.
 Refers to sampling the gray/color level in the picture at MXN (M number of rows and N number of columns )array of points.  Once points are sampled,
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Fill in the blanks: The _____________ utility in Windows’ Accessories is used for running audio CD. For recording sound, there must be _________ in the.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
Agenda Last class: Memory, Digitizing Numbers Today: Digitizing: Text
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
Data Representation The storage of Text Numbers Graphics.
Covert Channels Drew Hintz. At A Glance Definitions Who are you? Who are “they”? A Couple Good Solutions A Couple Really Good Solutions Demo Tool.
Steganography Leo Lee CS 265, Section 2 Dr. Stamp April 5, 2004.
Chapter 1 Background 1. In this lecture, you will find answers to these questions Computers store and transmit information using digital data. What exactly.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
FOOTPRINTING STEGANOGRAPHY.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
STEGANOGRAPHY Sibaka Mahapatra Computer Science 3rd Year, Sec-E
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Steganography Nathan Shirley
Digital Steganography
Steganography Nathan Shirley
Welcome
Forensic Science Questioned Documents: Part 3
Introduction to Computers
A (Very) Brief History of Pre-Computer Cryptography
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Computers Talk Binary.
Steganography.
Steganography & Digital Watermarfking
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
Steganography ETPRO 2010.
HIDING IN PLAIN SIGHT A QUICK INTRO TO STEGANOGRAPHY
UIT Unconference December 06, 2018 Ian Redzic
“Hiding in Plain Sight”
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Security by obscurity

Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that a message exists. TERMS: Payload – message to be hidden and sent Carrier – overlying message to conceal the payload Channel – type of message the carrier is (i.e. slave, JPEG, WAV) Package – carrier containing payload Suspect – intercepted message which is thought to have a payload

Wax tablets print message on underlying wood, cover in wax and write false message Shaved Slaves Shave a slave, tattoo a message, send him out once hair grows back Invisible Ink Write a message in lemon juice in between lines of a phony message, recipient heats to reveal the secret message. Morse Code Yarn Create a length of yarn such that there is a Morse code message in the colors of the yarn, weave it into some booties and send them as a gift.

When an analog signal is converted into digital, there can be “noise” which causes a small corruption of some data. Think of a tape player hissing when no noise had been recorded. When a camera takes a picture, there are minute variations in the data after being converted even if all variables of the picture being taken were the same. What if we took this random, corrupted data and replaced it with something meaningful? As long as an interceptor does not know where to look, and assumes this noise is just noise, our message is kept secret.

1. Hiding in pictures and video 2. Watermarking 3. Blog Steganography 4. CAPTCHA 5. Bacon’s Cipher

Pictures are represented in your computer as a header and zounds of RGB values. -24 bit color means 2^8 shades of each color. -Human eye cannot tell the difference between shade of and , so why not omit this last bit of information, and insert something sneaky? -ASCII is represented by numbers 0-127, or 8 bits. If we drop each low order bit for each of the three colors every pixel, we can insert an ASCII character every 3 pixels! -To insert a message like “Sneaky Hello World!” we would only need a picture 19x3 or 57 pixels. The bigger the picture, the bigger the message you can hide without it being noticeable! - Note that it does not have to be an ASCII message! We can hide anything that can be represented in binary (which, according to Claude Shannon, is everything) inside of a picture.

This is a normal cake picture. This is a cake picture that has “SNEAKY HELLO WORLD” embedded in it. Can you tell the difference? A computer could, if it knew where to look.

A video is simply a rapid succession of pictures being displayed. If we can hide long messages in a picture, imagine what we could hide in a two hour long movie with ~30 frames per second! -OR - Subliminal Message – pictures inserted into a frame of video. Your brain recognizes the image, but you are not consciously aware of it. If the video were slowed down, you would have the time to recognize this image consciously. As long as the video remains at normal speed, the message remains hidden. You can also retrieve information by speeding up the video, if it was hidden for such purpose. Think of flip books where each page has a small amount of information, and they converge into a full picture when viewed rapidly.

Watermark – embedded message containing the source of the object Currency – if you hold a $50 bill to the light, you can see bands of text that appear to be *inside* the paper. These bands make it extremely difficult to counterfeit the bills. Printers – tiny yellow dots are printed on the bottom of pages. They can contain anything including the serial number of the printer, the user who printed the page, and a timestamp. Dots seen through a microscope:

Completely Automated Public Turing test to tell Computers and Humans Apart Why is this Steganography? It hides information from computers, but not from (most) humans.

1.Translate payload into As and Bs using Baconian Alphabet 2.Two typefaces (fonts) much be chosen 3.Construct a carrier message with the same length as the payload 4.Use typeface1 for A and typeface2 for B 5.Transmit A AAAAAG AABBAN ABBAAT BAABA B AAAABH AABBBO ABBABU-V BAABB C AAABAI-J ABAAAP ABBBAW BABAA D AAABBK ABAABQ ABBBBX BABAB E AABAAL ABABAR BAAAAY BABBA F AABABM ABABBS BAAABZ BABBB

Payload = “ATTACK AT DAWN” Font1 (A) = Bold Font2 (B) = Regular Translated payload = “AAAAA BAABA BAABA AAAAA AAABA ABAAB AAAAA BAABA AAABB AAAAA BABAA ABBAA”, length = 12x5 = 60 characters Carrier: “Hello Mr. Honeydew, how are you holding up after your operation? Let me know.” Package: “Hello Mr. Honeydew, how are you holding up after your operation? Let me know.”

"Baconian Cipher." Purple Hell. Web. 07 Oct "Bacon's cipher -." Wikipedia, the free encyclopedia. Web. 07 Oct "CAPTCHA -." Wikipedia, the free encyclopedia. Web. 07 Oct "Portal-cake." Armchair Generalist. Web. 07 Oct "Steganography -." Wikipedia, the free encyclopedia. Web. 07 Oct "Steganography_Encode - Utility Mill - Utility." Utility Mill - Makes Utilities. Web. 07 Oct