S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.

Slides:



Advertisements
Similar presentations
Cryptography Ch-1 prepared by: Diwan.
Advertisements

Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
F5 A Steganographic Algorithm
Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Watermarking & Steganography
Khan, Mohammed Minhajuddin
Watermarking & Steganography Sanjay Goel University at Albany, SUNY.
Steganography The Art of Hiding Messages
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot May 2011 May 2011 Steganalysis ITSS 4201 Internet Insurance and Information.
Steganography. Outline What is Steganography? History Steganography used nowadays? Terms Steganography methods Steganography Available Software Steganalysis.
Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:
Material being covered 3/9 Remainder of Text Chapter 6 (Q5, 6) Text Chapter 6A Material Posted 3/9 Midterm Information Introduction to Text Chapter 7.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.
FOOTPRINTING STEGANOGRAPHY.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
STEGANOGRAPHY Sibaka Mahapatra Computer Science 3rd Year, Sec-E
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Introduction to Steganography
Welcome
Steganography Example
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Computers Talk Binary.
Steganography.
Visit for more Learning Resources
Steganography with Digital Images
Encryption, Cryptography, and Steganography:
Khan, Mohammed Minhajuddin
Steganography Techniques and their use in Anonymity
Image Based Steganography Using LSB Insertion Technique
STEGANOGRAPHY IN IMAGES
Presentation transcript:

S TEGANOGRAPHY The Art of Message Hiding

Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on activity: Exchange of Steganographic Messages Part 3: Research and Practice on Steganalysis

S TEGANOGRAPHY Steganography is an ancient technique (known from the Antiquity) for hiding information. The hidden information can be additionally encrypted (in the digital age). A Digital Message (the secret) can be hidden within -digital images -audio files -video files -… or even other text messages by storing the secret information within inessential lines of code (bytes) that don't alter the look or sound of the original file.

Modern Use of Steganography Terror groups hide behind Web encryption by Jack Kelley, USA TODAY 02/05/2001 … (Islamist groups) are hiding maps and photographs of terrorist targets and posting instructions for terrorist activities on sports chat rooms, pornographic bulletin boards and other Web sites, U.S. and foreign officials say.

New York Times, August 3rd, : How 2 convert binary to colors How Steganography Works

Steganography versus Cryptography 1/2 Although Steganography and Cryptography seem to be practically closely related they are technically different Steganography hides the existence of a secrete message, whereas Cryptography only scrambles the original message (plain text) so it cannot be understood

Steganography versus Cryptography 2/2 Steganography cannot replace cryptography, because the containers must have a much larger size than the embedded “secret” message Steganography necessitates the transmission of the encoding key, and possibly more information to decode the message. The transmission of this vital information must be accomplished using a different communication channel Note: Asymmetric Encryption (e.g. PGP), does not require the transmission of a secret key.

Terminology of Steganography Cover data (a.k.a: Carrier, Container) –The original, innocent message, be it audio, video, text or an image Embedded data (a.k.a: Secret) –The data that is to be hidden with the ccarrier Stego data –A message that includes both the cover and embedded data

Historical Forms of Steganography - Tattoos ( Herodotus) - Invisible Inks (lemon juice, milk, urine, …) -Microdots in paper - Text – Can one man pace up to empty rooms? – Can One Man Pace Up To Empty Rooms?

Modern Steganography Types of covers (carriers) include –Text –Images –Audio files –Video files  Details and Examples

Steganography in TEXT Examples of Encoding Algorithms Line-shift coding –Moving lines of text up and down by 1/300 th of an inch Word-shift coding –Moving words left and right Feature coding –Changing the heights of letters Other methods

Steganography in Images Least significant bit insertion (GIF, BMP) –Changing the least significant bit in order to store other data Discreet Cosine Transform (JPG) –Applying a Cosine function to approximate hidden data Examples 

Injected Data Extracted Data Previous slide’s image from Hawaiipictures.com and this slide’s images fom spacedaily.com

Steganography in Audio Examples of Encoding Algorithms Low bit encoding –Similar to Least Significant bit insertion Phase encoding –Similar to Discreet Cosine Transform function Spread Spectrum –Using entire bandwidth to encrypt data. Number of jumps determines amount of data able to hide. Echo Data Hiding –Next slide 

Several Free Steganography Programs are available on the Internet - S-tools - OpenPuff (Free, Open-Source and Portable)  -...

Exercise 1 in class: OpenPUFF You work in team Use OpenPuff to hide a secret your partner and attach the file with the secret Give your partner the password and the algorithm used for the encoding (“by phone”) Decode the message sent by your partner

Exercise 2: Steganalysis Detection of Hidden Information You work individually Use a Hash generator to detect the existence of hidden informatin inside a file Use your favorite Hash Generator or this one: ( Free Portable : )Free Portable :

Exercise 3: Research on Steganalysis Extracting Hidden Information without knowing the Key On the following pages, you will find collections of tools for detecting the existence of a secret. 1)Get a Steganographic message for which you do not know the key 2)Try to extract the secret