Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.

Slides:



Advertisements
Similar presentations
Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
F5 A Steganographic Algorithm
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Steganography and Network Security
T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A November 2005Analysis of Attacks on Common Watermarking Techniques 1 A study on the robustness.
Data Hiding within Audio Signals Matthew Wiedemer CSE691 November 20, 2001.
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Pictures Worth More Than 1000 Words
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Introduction to Computer Graphics
Digital Watermarking Parag Agarwal
Prepared by George Holt Digital Photography BITMAP GRAPHIC ESSENTIALS.
Digital Watermarking By: Li Yang
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Data Hiding in binary images using block parity Group ID -17 Guided by Mr. Pramod Ganjewar By – Sipendra Sinha Deepak Kumar Rohit Singh Amol Gaikwad Snehal.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
 By Bob “The Bird” Fiske & Anita “The Snail” Cost.
Cryptographic Anonymity Project Alan Le
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization G. Sahoo1 and R. K. Tiwari2 Presented by Pan Meng.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Introduction to Steganography
Steganography in WebP image using LSB embedding
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
Welcome
Steganography Example
Raster Images CPSC 1030.
Steganography.
Department of Computer and Information Sciences
Visit for more Learning Resources
Steganography with Digital Images
Encryption, Cryptography, and Steganography:
Steganography Techniques and their use in Anonymity
Parag Agarwal Digital Watermarking Parag Agarwal
Information Hiding and Its Applications
Image Based Steganography Using LSB Insertion Technique
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University

2 Introduction to Steganography n What –Steganography literally means “covered writing”, takes one piece of information and hides it within another. n Why –You are working at a company that does not allow encrypted , and you want to send a “secret message”. –You are resident of a country that does not allow encrypted communication, and you want to send a secret. n How –Steganography takes advantage of unused or insignificant areas of data in computer files (images, sounds recordings, etc.), replacing it with information to be hidden.

3 Brief Review of Image File Formats n Colour (Gray-scale) representation of images –256 colours (8 bits per pixel = 1B / pixel) –16M colours (24 bits / pixel = Red + Green + Blue) e.g columns x 768 rows x 3B / pixel = 2.3 MB n Compression –Lossless (GIF, 8-bit BMP format) –Lossy (JPEG format) Reduces an image file to about 5% of its normal size

Embedding Data n Cover image file - holds the hidden message n Message file - the message to be hidden. Formats:  plaintext  ciphertext  image n Stego_key - password, to be used to encrypt and decrypt the message

5 Steganographic Methods Information can be hidden in many different ways in an image. According to this article, steganographic methods can be categorised into: –least significant bit insertion (my focus) –masking and filtering –algorithms and transformations

6 Least Significant Bit Insertion n Information can be hidden in the least significant bits of an image. E.g. In a 24-bit image with 1024x768 pixels, we can store 3 bits in each pixel (1 bit / Byte), so 1024x768x3 bits = 29.5 KB can be hidden in this 2.3 MB file.

7 n Let’s hide ‘A’ = in 24-bit image data. (Example from the paper.) Suppose 3 24-bit pixel values (9B) are After the insertion, the raster data becomes: Is there an error in the article’s example? A = ? Least Significant Bit Insertion

8 The 1st least significant bit of "Kings" has been replaced with the first most significant bit of "Pentagon." Copyright by Fabien A. P. Petitcolas, Computer Laboratory, University of Cambridge The extracted image is on the right.

9 The 2 least significant bit of "Kings'" have been replaced with the 2 most significant bit of "Pentagon" Copyright by Fabien A. P. Petitcolas, Computer Laboratory, University of Cambridge

10 The 6 least significant bit of "Kings'" have been replaced with the 6 most significant bit of "Pentagon" Copyright by Fabien A. P. Petitcolas, Computer Laboratory, University of Cambridge

11 Weaknesses of LSB Insertion n Cover image must be selected carefully because of colour limitation n LSBI is vulnerable to image manipulation, such as: –lossy data compression –cropping, scaling –image enhancement

12 Advanced Techniques n Masking and Filtering –Create the watermarked image, then use it to hide information (embed information in significant area) n Other algorithms and transforms –combine the compression algorithm with steganography –may manipulate image properties such as luminance –scatter message by using some algorithms and also use stego-key to provide extra layer of protection.

13 Conclusion and Comments n Steganography is not intended to replace cryptography but to supplement it n LSB Insertion is a quick and easy way to hide information, but –it is not robust. It is vulnerable to image manipulation including lossy data compression, colour correction, addition of caption, and geometric modification such as cropping, scaling. –It is not secure. It can not survive deliberate attack. n Masking and Filtering is more robust than LSB insertion: the stego-message may survive image compression, clipping.

14 Conclusion and Comments (cont’d) n Some “algorithms and transforms” for steganography allow the stego-information to be spread throughout the message so it looks “more like noise”. Others allow the image to be converted to other formats, without any message losses. n Question: How to hide a message in a cover file?