Steganography Paul Krzyzanowski

Slides:



Advertisements
Similar presentations
Information Hiding and Covert Channels
Advertisements

Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
Technical Aspects of Digital Rights Management

Khan, Mohammed Minhajuddin
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Security 3 Distributed Systems Lecture # 16. Overview Steganography Digital Watermarking.
Overview of Digital Stenography
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Digital Watermarking Parag Agarwal
Reza Mohammadi Shiraz University Of Technology
Page 1 Secure Communication Paul Krzyzanowski Distributed Systems Except as otherwise noted, the content of this presentation.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Information Security Principles (ESGD4222)
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
CPS 182s 1.1 Digital Watermark l What is a watermark? A digital watermark?  Message about a work is embedded in the work l What is steganography?  The.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
Cryptography, Authentication and Digital Signatures
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
I NTRODUCTION TO C RYPTOLOGY Cryptoanalysts, Encryption, and Decryption.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
``Chaffing and Winnowing’’ & Crypto Policy Comments Ronald L. Rivest Cryptography and Information Security Group MIT Lab for Computer Science April 1998.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Cryptography – Test Review
Introduction to Steganography
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Technical Aspects of Digital Rights Management
DONE BY S.MURALIRAJAN M.NIRMAL
Visit for more Learning Resources
EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, September 2010.
Parag Agarwal Digital Watermarking Parag Agarwal
STEGANOGRAPHY IN IMAGES
Digital Watermarking Lecture 2
Presentation transcript:

Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Distributed Systems Steganography Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution 2.5 License.

cryptography hidden writing κρυπό ς γραφία A secret manner of writing, … Generally, the art of writing or solving ciphers. — Oxford English Dictionary

cryptology hidden speaking κρυπός λογια 1967 D. Kahn, Codebreakers p. xvi, Cryptology is the science that embraces cryptography and cryptanalysis, but the term ‘cryptology’ sometimes loosely designates the entire dual field of both rendering signals secure and extracting information from them. — Oxford English Dictionary

The art of secret (hidden) writing steganography στεγανός γραφία covered writing The art of secret (hidden) writing

Steganography Art and science of communicating in a way that hides the existence of a message signal or pattern imposed on content persistent under transmission not encryption original image/file is intact not fingerprinting fingerprinting leaves separate file describing contents

Classic techniques Invisible ink (1st century AD - WW II) Tatoo message on head Overwrite select characters in printed type in pencil look for the gloss Pin punctures in type Microdots (WW II) Newspaper clippings, knitting instructions, XOXO signatures, report cards, …

Motivation Steganography received little attention in computing Renewed interest because of industry desire to protect copyrighted digital work audio images video Text Detect counterfeiter, unauthorized presentation, embed key, embed author ID Steganography ≠ Copy protection

Null Cipher Hide message among irrelevant data Confuse the cryptoanalyst

Null Cipher Hide message among irrelevant data Confuse the cryptoanalyst Big rumble in New Guinea. The war on celebrity acts should end soon. Over four big ecstatic elephants replicated.

Null Cipher Hide message among irrelevant data Confuse the cryptoanalyst Big rumble in New Guinea. The war on celebrity acts should end soon. Over four big ecstatic elephants replicated. Bring two cases of beer.

Judge creates own Da Vinci code BBC News 27 April 2006 Judge creates own Da Vinci code The judge who presided over the failed Da Vinci Code plagiarism case at London's High Court hid his own secret code in his written judgement. Seemingly random italicised letters were included in the 71-page judgement given by Mr Justice Peter Smith, which apparently spell out a message. Mr Justice Smith said he would confirm the code if someone broke it. "I can't discuss the judgement, but I don't see why a judgement should not be a matter of fun," he said. Italicised letters in the first few pages spell out "Smithy Code", while the following pages also contain marked out letters. http://news.bbc.co.uk/go/pr/fr/-/1/hi/entertainment/4949488.stm

Chaffing & Winnowing Separate good messages from the bad ones Stream of unencoded messages with signatures Some signatures are bogus Need key to test Alice Bob M3 M2 M1 M0 M3 M2 M1 M0 Irene × OK × × M3 M2 M1 M0 ? ? ? ?

Image watermarking Spatial domain watermarking bit flipping color separation Frequency domain watermarking embed signal in select frequency bands (e.g. high frequency areas) apply FFT/DCT transform first e.g. Digimarc watermark should alter the least perceptible bits these are the same bits targeted by lossy image compression software

UV Watermarking

Machine ID codes in laser printers See http://www.eff.org/Privacy/printers/

Machine ID codes in laser printers

Machine ID codes in laser printers

Machine ID codes in laser printers

Text Text lines shifted up/down (40 lines text  240 codes) word space coding character encoding - minor changes to shapes of characters

Text Text lines shifted up/down (40 lines text  240 codes) word space coding character encoding - minor changes to shapes of characters works only on “images” of text e.g., PDF, postscript

Audio Perceptual coding Hardware with copy-protection inject signal into areas that will not be detected by humans may be obliterated by compression Hardware with copy-protection not true watermarking - metadata present on media DAT minidisc presence of copy protection mechanisms often failed to give the media wide-spread acceptance

Video Coding still frames - spatial or frequency data encoded during refresh closed captioning visible watermarking used by most networks (logo at bottom-right)

Watermarking vs. Steganography Goal of steganography Intruder cannot detect a message Primarily 1:1 communication Goal of watermarking Intruder cannot remove or replace the message Primarily 1:many communication

The end.