STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic.

Slides:



Advertisements
Similar presentations
SHRM-GT SPOTLIGHT Membership Committee. Meet the Committee Garrett Kowalewski, Chair Owner, in the process of founding a new technical and general staffing.
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
F5 A Steganographic Algorithm
Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Information Hiding: Watermarking and Steganography
Steganography and Network Security
Lighting Up the Dark Side of the Web Colin Rose Quarter Past Five Limited Monday 11 th October 2004.
Is Commercial Technology All That Threatening? Colin Rose Quarter Past Five Limited “The Dual Use of Technology” Wednesday 4 th June 2008 SHAPE Club,
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Khan, Mohammed Minhajuddin
1 Adnan Gutub Computer Engineering King Fahd University of Petroleum & Minerals Saudi Arabia A Novel Arabic Text Steganography Method Using Letter Points.
Security 3 Distributed Systems Lecture # 16. Overview Steganography Digital Watermarking.
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
One possible way to encode information in text is print it in two slightly different typefaces. The secret message is decoded by ignoring one of the typefaces.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
Digital Watermarking Parag Agarwal
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Steganography. Outline What is Steganography? History Steganography used nowadays? Terms Steganography methods Steganography Available Software Steganalysis.
Side Channels and Physical Security. Prosecutor’s Fallacy Joe’s fingerprints found at the site of a crime Prosecutor claims fingerprint test is 99.99%
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Information Hiding Nattawat Laksanawisit At National Chi Nan University.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
Topic 10a Introduction to Steganography 454 NOTE: some of the enclosed information was adapted from slides created by Professor Gary C. Kessler of Champlain.
Steganography Leo Lee CS 265, Section 2 Dr. Stamp April 5, 2004.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
Lighting Up the Darker Side of the Web Colin Rose Quarter Past Five Limited Tuesday 9 th March 2004.
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Implementation of Steganographic Techniques Danny Friedheim pd. 2.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
Steganography Ryan Albright.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
FOOTPRINTING STEGANOGRAPHY.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
STEGANOGRAPHY Sibaka Mahapatra Computer Science 3rd Year, Sec-E
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Introduction to Steganography
Welcome
Steganography Example
STEGANOGRAPHY.
Computers Talk Binary.
Steganography.
Engage Beginning Computer Programmers with Interactive Concepts
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
STEGANOGRAPHY IN IMAGES
Chapter 1: Introduction
Presentation transcript:

STEGANOGRAPHY

C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic methods Merits of Steganography Threats of Steganography Conclusion References

D EFINITION Steganography is the science of hiding information in such a way that no one suspects the information exists Steganography is a Greek word. Means “concealed writing” The purpose of steganography is covert communication to hide a message from a third party

Steganography hides the covert message but not the fact that two parties are communicating with each other. The steganography process generally involves placing a hidden message in some transport medium, called the carrier. The secret message is embedded in the carrier to form the steganography medium.

S TENOGRAPHY H ISTORY Steganography has been used since ancient Greece. Herodotus( BC) is a great historian. His great work, The Histories has a story which has used ancient stenography.

These messages were sent by the German embassy in World War I. This is called a null cipher. PRESIDENT'S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT IMMENSELY. APPARENTLY NEUTRAL'S PROTEST IS THOROUGHLY DISCOUNTED AND IGNORED. ISMAN HARD HIT. BLOCKADE ISSUE AFFECTS PRETEXT FOR EMBARGO ON BYPRODUCTS, EJECTING SUETS AND VEGETABLE OILS. Taking the first letter in each word of message 1 or second letter in message 2 reveals the hidden text.

PERSHING SAILS FROM NY JUNE 1.

S TENOGANALYSIS Steganalysis is the art and science of detecting messages hidden using steganography. The goal of steganalysis is to identify suspected packages, determine whether or not they have a payload encoded into them, and, if possible, recover that payload.

S TENOGANALYSIS V / S C RYPTOGRAPHY With cryptography the information is known to exist, but it is encoded in such a way that only the intended recipient can read it. Steganography disguises the messages as something else, so the interceptor doesn’t even know there’s a message buried in there. The goal of cryptography is to make data unreadable by a third party.

The goal of steganography is to hide the data from a third party. EXAMPLE : Memo to the Director Subject: Letter of Recommendation —————————————————————- Jane S., a chief sub editor and editor, can always be found hard at work in her cubicle. Jane works independently, without wasting company time talking to colleagues. She never thinks twice about assisting fellow employees, and she always finishes given assignments on time. Often Jane takes extended measures to complete her work, sometimes skipping coffee breaks. She is a dedicated individual who has absolutely no vanity in spite of her high accomplishments and profound knowledge in her field. I firmly believe that Jane can be classed as a high-caliber employee, the type which cannot be dispensed with. Consequently, I duly recommend that Jane be promoted to executive management, and a proposal will be sent away as soon as possible. Project Leader ————————————————————————————————

(Later that afternoon another memo was sent…) Memo to the Director: ————————————————————— Sorry about the earlier memo. Jane was looking over my shoulder as I wrote it. Kindly read every other line (i.e. 1, 3, 5, 7…) for my true assessment of her. Regards, Project Leader ————————————————————— HdlLQRPQdrmnWskKznOSarxq4GjpRTQo4hpCRJJ5aU7tZO9H PTZXFG6iRIT0wa47AR5nvkEKoIAjW5HaDKiJriuWLdtN4OXec WvxFsjR32ebz76U8aLpAK87GZEyTzBxdV+lH0hwyT/y1cZQ/E5 USePP4oKWF4uqquPee1OPeFMBo4CvuGyhZXD/18Ft/53YWIe bvdiCqsOoabK3jEfdGExce63zDI0==MpRf

This is a previous one is the perfect example of steganography. A message disguised as something else with a “key” (reading every other line) provided to expose the original message. The later one is the perfect encrypted form of cryptography.

S TEGANOGRAPHY UNDER VARIOUS M EDIA Steganography is not limited to the above examples of text. Steganography is also done in the various types of media. Steganography is done by hiding text in the bits of images. Steganography is done by hiding messages in audio files.

S TEGANOGRAPHIC M ETHODS The simplest and most common type of steganography is LSB (least significant bit). The one’s bit of a byte is used to encode the hidden information. Suppose we want to encode the letter A (ASCII 65 or binary ) in the following 8 bytes of a carrier file becomes

Is the difference between level 37,243 and 37,242 detectable by the human ear? Probably not. Typical.wav file uses 16 bit sampling.

M ERITS & U SES Digital Watermarking By using steganography user might acquire an embedded image. Secret message can be trans mitted without the fact that transmission was done. The more obvious uses of steganography relate to secret communications.

T HREATS It requires a lot of overhead to hide a relatively few bits of information. The hiding of malware into seemingly safe files such as pictures, audio and attachments. This method is used to hide any type of malware ranging from viruses to worms from spyware to Trojans. An example was the Anna Kournikova virus which was sent via as an attachment “AnnaKournikova.jpg.vbs”.

C ONCLUSION The objective of this paper was to demonstrate our Steganography, which is based on a property of the human visual system We are very convinced that this steganography is a very strong information security technique, especially when combined with encrypted embedded data. Always be aware while using technology it can be much more than what you can see.

REFRENCES rch/2004_03_research01.htm rityInWeb2-0.htm me_number_theoretic_and_algebraic_algorithms/