Steganography “Hiding in Plain Sight” Gary Alan Davis, D.Sc. Department of Computer & Information Systems.

Slides:



Advertisements
Similar presentations
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,
Advertisements

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Sixteen Police Technology Hi-Tech Crime.
Information Hiding: Watermarking and Steganography
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
Voice over IP: A growing cadre of criminals is hiding secret messages in voice data. From: "Voice Over IP: The VoIP Steganography Threat". IEEE Spectrum.
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Khan, Mohammed Minhajuddin
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Covert Channels John Dabney. Covert Channels   “... any communication channel that can be exploited by a process to transfer information in a manner.
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
By : Nimish Agarwal.  … are those which are neither designed nor intended to transfer information at all.  … are based on "transmission by storage into.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
STEGANOGRPAHY [APPLICATION – I]
Digital Watermarking Parag Agarwal
Reza Mohammadi Shiraz University Of Technology
A Steganography Project Project By: Awadesh Madhogaria.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Watermarking Relational Databases CSC 574/474 Information System Security.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Digital Communications Math class.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
STEGANOGRAPHY By Allison Boyzuck. What is it? Simply put Steganography is the act of embedding either a picture or message in another picture or message.
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Information Hiding Nattawat Laksanawisit At National Chi Nan University.
Computer Forensics, Steganography and Cryptography and Related Ethical Issues. Edilasio Pereira Russell Braun Team 8.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
Covert Channels Eric Pennington COSC480. Common Network Threats  Viruses, Trojans, Worms, etc.  Password Attacks  Eavesdropping  Port Scanning  Not.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Introduction to Steganography
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Virus And Malware Causes And Troubleshoot By I FIX PC
Encryption, Cryptography, and Steganography:
Khan, Mohammed Minhajuddin
Steganography ETPRO 2010.
Steganography Techniques and their use in Anonymity
Parag Agarwal Digital Watermarking Parag Agarwal
UIT Unconference December 06, 2018 Ian Redzic
“Hiding in Plain Sight”
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Steganography “Hiding in Plain Sight” Gary Alan Davis, D.Sc. Department of Computer & Information Systems

Steganography – what is it? Covered Writing (Berinato, 2003) –from Greek “steganos” & “graphie” Earliest example (May, 1997) –Greece, 500 B.C. –Message tattooed on shaved head of slave –Message sent when hair grew back Goal: Hide the fact that message even exists (Glass, 2002)

Steganography in Technology Hiding messages within legitimate files –Picture (.bmp,.jpeg,.gif) –Audio (.wav,.mp3) –Video (.mpeg,.avi) Messages could be... (Fisher, 2004) –Trademark/copyright information –Communication to others –Malicious code

Good Steganography Watermarks –Identify copyrighted material –Deter unlicensed use –Deter piracy Digital Watermarks (Glass, 2002) –Robust Watermarks – use blocked if mark is detected –Fragile Watermarks – use blocked if mark is corrupted

Bad Steganography Malicious code (Fisher, 2004) –Viruses –Spyware Terrorist Communications (Kolata, 2001) –“Dead Drop” (e.g., eBay) –No direct communication –Difficult to detect hidden messages in files

Steganography Demo Steganography day free trial $24.95 to purchase SecureKit, Inc. (

84

Thank you! Any Questions?