Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.

Slides:



Advertisements
Similar presentations
Microsoft ® Office OneNote ® 2007 Training Using your Notebook to its fullest potential Kent School District presents:
Advertisements

Working with Tables for Page Design – Lesson 41 Working with Tables for Page Design Lesson 4.
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
BMP Hide ‘n’ Seek What is BMP Hide ‘n’ Seek ? –It’s a tool that lets you hide text messages in BMP files without much visible change in the picture. –Change.
Creating and Editing a Web Page Using Inline Styles
Khan, Mohammed Minhajuddin
How to Logon Oracle Collaboration Suite and change password? STEP 1 Launch
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
CIS101 Introduction to Computing HTML Project Two.
Web Page Development Identify elements of a Web Page Start Notepad
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Creating an HTML page Skills: edit and debug HTML pages IT concepts: text editor This work is licensed under a Creative Commons Attribution-Noncommercial-
Before class begins… Help us to assess this session and plan for future workshops Please complete the Advanced Refworks Pre-learning assessment at:
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Bob Sherman, MCSE, CISSP Sinclair Community College Dayton, OH
Creating a Web Page HTML, FrontPage, Word, Composer.
What do I need in order to use TeamSpot? The TeamSpot A 42” monitor and computer with special software located in Moody Garden Lab. Always kept logged.
Passwords, Encryption Forensic Tools
LEARN THE QUICK AND EASY WAY! VISUAL QUICKSTART GUIDE HTML and CSS 8th Edition Chapter 2: Working with Webpage Files.
IT Website Development Welcome!. Welcome to Unit 7! Optimizing Images and creating photo albums in Dreamweaver There are no textbook readings for.
Website design Feng Zhao College of Educatioin California State University, Northridge.
Voki! – for engaging learners. 1. Set up your audio Select Tools Go to Audio Select Audio Setup Wizard 2. Edit your profile WHILE YOU’RE WAITING… Right-click.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Dreamweaver – Setting up a Site and Page Layouts Web Design Section 7-2 Part or all of this lesson was adapted from the University of Washington’s “Web.
August,  Which color boxes control what areas of the website  Color scheme- using HTML color codes for custom colors  Background Color code-
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
IT Introduction to Website Development Welcome!
How To: Add HYPERLINKS and IMAGES with HYPERLINKS to your Outlook Signature. By: Tom Jackson
Using FrontPage Express. Slide 1 Standard toolbars and menus Time indicator: gives an approximation of download time of the page.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Fall 2005 Using FrontPage to Enhance Blackboard - Darek Sady1 Using FrontPage to Enhance Blackboard 1.Introduction 2.Starting FrontPage 3.Creating Documents.
1 ITI 1120 Lab # 1 An Introduction to the Lab Environment Contributors: G. Arbez, M. Eid, D. Inkpen, A. Williams, D. Amyot.
Hiding Data in “Plain Sight” Computer Forensics BACS 371.
Go to your school’s web locker site school name.schoolweblockers.com) Your user name is the first letter of your first name, the first 4.
Homework #4 HTML Web Assignment II ©2001 E. Kinnear.
Mr. Justin “JET” Turner CSCI 3000 – Fall 2015 CRN Section A – TR 9:30-10:45 CRN – Section B – TR 5:30-6:45.
Training Guide for Inzalo SOP Users. This guide has been prepared to demonstrate the use of the Inzalo Intranet based SOP applications. The scope of this.
CSD 340 (Blum)1 Using Visual Studio CSD 340 (Blum)2 Start/Microsoft Visual Studio 2005/Microsoft Visual Studio 2005.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
Landscaper 101. Time Code AMC AMCNET HELP!!! Where do you go for help? –Upper right corner has a ? for the online help –This presentation.
Spiderman ©Marvel Comics Creating Web Pages (part 1)
Creating and Editing a Web Page
Lesson 2 – Unit B. Quick review 1. What is the name of the eGCC host that you ftp your files? 2. What type of software do you use to create and edit web.
Creating and Editing a Web Page Using Inline Styles
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
What is a Wiki? By: Marisela Alvarado. Fill out all the information and click on Create Account.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael Jones2Digital Forensic Investigations.
Dreamweaver – Setting up a Site and Page Layouts Web Design Section 7-2 Part or all of this lesson was adapted from the University of Washington’s “Web.
Lindsey Velez, Director of Instructional Technology Single Sign-On One Click.
Classroom Wiki Tutorial EDIC 763 Instructional Design Fall 2011 Aysha Bajabaa Dr. Gary Whitt 1 NextBack.
 Open the course to add an online class  Click on Add a Page (left side)  Type in a name  Click on Create  Click on the Content Tab  Click on Add.
Intro to Google Docs 2014.
Welcome
Steganography Example
Steganography.
Visit for more Learning Resources
Embedding Graphics in Web Pages
Steganography Techniques and their use in Anonymity
Using Cascading Style Sheets (CSS)
Instructions for Windows users:
“Hiding in Plain Sight”
THE PROFESSIONAL POWERPOINT TEMPLATE
Presentation transcript:

Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier

What is Steganography 2

The art of covered or hidden writing. Steganos – Greek word meaning “covered” Graphy – Latin word meaning “writing” or “drawing” Thousands of years old – Tattoos, symbols, contextual clues/jargon, bunnies Difficult to detect (if you don’t know its there) 3

What Steganography is Not Cryptography – Kryptos = secret or hidden – Graphein/Logia = writing/study – The art of writing or solving codes. – Hide the meaning, not the message Steganography – Hide the message, not the meaning Can both be used to obscure data 4

Example 1 Covered or concealment ciphers – Use null cipher to hide message according to some prearranged set of rules Frank is not doing my editing. Hidden message: “Find me” 5

Activity 1 At your table, devise your own concealment cipher strategy. (5 minutes) Use that strategy to hide a message. (3 min) Class will have several minutes to try to decipher each group’s message. – Prize for group with most correct guesses – Prize for group with most elaborate or creative strategy 6

Types of Steganography Insertion Substitution Generation 7

Insertion (Injection) Hide data in sections of a file that are not processed – Comments section in HTML file – After EOF marker in regular file – Metadata section of file No modification of relevant data Will add to original file size No limit to how much can be hidden Potential to detect if compared to original 8

Example 2 Steganography via injection OriginalEdited in Notepad++ 9

Activity 2 (text only) Open an image using notepad++ Write a message at the bottom of the file Open the image normally to view it Experiment with writing messages at various locations in the image (in notepad++) to see what happens Discuss results of inserting messages in places other than at the end – What happens when you add text to beginning? – What about somewhere in the middle? 10

Activity 3 (files) Create file(s) (any files, text, word, etc…) Zip files up using built-in windows zip command (send to -> zip file) Place zip and an image in same folder Open command in current directory – Shift + right click -> open command prompt here copy /b [name of picture].jpg + [name of zip file].zip [new name for picture].jpg View new image normally Change file extension to.zip to view archive contents 11

Substitution Make minor changes in data such that user doesn’t notice change No change in file size Limited in how much can be hidden Potential to detect if compared to original 12

Example 3 Least Significant Bit Substitution Original Modified 13

Activity 5 Open a web browser and go to the following URL: – ganography.php ganography.php Follow instructions to upload any image Type hidden message Do not enter a password (no encryption) Download image with message inside Open in notepad++ to see if you can find message Go back to website and follow instructions to show message 14

End of Session 1 Lunch 15

Generation Create new file from carrier (file hiding the data) and hidden data file using some algorithm No limit to how much can be hidden Cannot be compared to original since a brand new “original” file is created 16

Example 5 Use custom algorithm to hide data 17 Created image Message hidden in audio generated from image

Activity 4 Do Together (part 1) Use Gimp to create hidden message – Create new image – Change background color to black – Create text in image (use white text) – Export image as JPEG 18

Activity 4 Do Together (part 2) Use coagula to convert JPEG to audio (.wav) file – Open JPEG in coagula – Select “render without blue” This should create coagula.wav in current folder 19

Activity 4 Do Together (part 3) Use Audacity to view message – Open coagula.wav in audacity – Select Spectrogram option to view hidden message 20

Activity 5 (part 1) Use OpenPuff to Hide, encrypt, and distract Hide data – Choose 3 different passwords (write them down) 2 for crypto, 1 for scrambling – Select data to hide From secret data folder – Select multiple carriers (.mp3,.jpg,.pdf, ect…) From carrier folder – Sort carriers – Select noise level – Add Decoy – Enter 3 different passwords – Choose output folder(s) 21

Activity 5 (part 2) 22

Activity 5 (part 3) Use OpenPuff to Hide, encrypt, and distract Unhide data – Enter all passwords If you want to unhide decoy, enter decoy passwords If you want to unhide data, enter data passwords – Browse to folder with previous carriers and choose correct ones – Sort carriers in same order as before – Select same noise level as before – Verify data is correct 23

Activity 5 (part 4) 24

Who Uses Steganography Spies and terrorists – dyn/content/article/2010/06/30/AR html dyn/content/article/2010/06/30/AR html Commercial and Government – Suggest to use with encryption – Watermarking Hackers – detection/hackers-exfiltrating-data-with-video- steganography-via-cloud-video-services/ detection/hackers-exfiltrating-data-with-video- steganography-via-cloud-video-services/ All of us after this workshop! 25

Interesting Application of Steganography -the-man-who-solved-the-mysterious-cicada puzzle/ -the-man-who-solved-the-mysterious-cicada puzzle/ 26

A Keystone in Building a Better Future for All 27