Steganography Paul Gretes Gangster pay ho Dennis Pattersonno sniper DNA test A lepers gut.

Slides:



Advertisements
Similar presentations
Information Hiding and Covert Channels
Advertisements

Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
Technical Aspects of Digital Rights Management
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
Khan, Mohammed Minhajuddin
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
1 Adnan Gutub Computer Engineering King Fahd University of Petroleum & Minerals Saudi Arabia A Novel Arabic Text Steganography Method Using Letter Points.
Security 3 Distributed Systems Lecture # 16. Overview Steganography Digital Watermarking.
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Survey on Information Assurance TEL 581 Presented by Viswesh Prabhu Subramanian Gregory Michel Lincoln Jean Louis Steganography.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
Steganography Rayan Ghamri.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Steganography and Digital Watermarking Jonathan Cummins, Patrick Diskin, Samuel Lau, Robert Parlett, Mark Ryan.
STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Reza Mohammadi Shiraz University Of Technology
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Digital Watermarking With Phase Dispersion Algorithm Team 1 Final Presentation SIMG 786 Advanced Digital Image Processing Mahdi Nezamabadi, Chengmeng Liu,
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Digital Steganography
Steganography. Outline What is Steganography? History Steganography used nowadays? Terms Steganography methods Steganography Available Software Steganalysis.
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Information Hiding Nattawat Laksanawisit At National Chi Nan University.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
Steganography Leo Lee CS 265, Section 2 Dr. Stamp April 5, 2004.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Cryptographic Anonymity Project Alan Le
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
A Partial Survey of the Perfect Digital Watermark Problem.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Introduction to Steganography
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Technical Aspects of Digital Rights Management
Computers Talk Binary.
Department of Computer and Information Sciences
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
Parag Agarwal Digital Watermarking Parag Agarwal
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Steganography Paul Gretes Gangster pay ho Dennis Pattersonno sniper DNA test A lepers gut

Topics  Driving Interest and Examples  Prisoner’s Problem  Public/Private Key Steganography  Attacks  Basic Theory  Watermarking/Fingerprinting

p h g l o j i m e i s s u n a f y ne i rs n r Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils. Intercepted message:

p h g l o j i m e i s s u n a f y ne i rs n r (Perishing sails from NY June I)

Steganography  Comes from the greek words  and  – literally, “covered writing”  Steganography conceals the fact that a message even exists.

Driving Interest behind Steganography  Military and Intelligence agencies –Battlefield Communications  Criminals –Or terrorists (Bin Laden suspected use)  Law Enforcement and counter intelligence agencies –Interested in weaknesses

Earlier Examples  Prisoners hid messages in letters home using the dots and dashes on i, j, t, & f to spell out a hidden text in Morse Code  Herodotus tells us Histiaeus shaved the head of his most trusted slave and tattooed it with a message which disappeared after the hair had regrown.

Example

Steganography diagram

Definitions…  Embedded data – message you want to send  Cover object – text, image, audio, or other object to hide data in  Stego-key – used to control hiding process  Stego-object – resulting object when data is hidden in cover object  Robustness –>

Steganography in pictures  How? –Least Significant Bit Insertion –Masking and Filtering More robust than LSB Insertion –Algorithms and Transformations

LSB Insertion  3 pixels of a picture might be (without compression) ( ) ( ) ( )  Binary value for A is  New data for 3 pixels would be ( ) ( ) ( )  Change won’t be visually noticeable!

Steganography in Audio  Echo hiding –We cannot perceive short echoes (millisecond short) –Introduce two types of short echo with different delays to encode zeros and ones  Example program: MP3Stego –Information hidden during compression process

Aphex Twin

Steganography in Programs  Example program: Hydan –Exploits redundancy in the i386 instruction set by defining sets of functionally equivalent instructions Can add 50 or subtract –50 XOR DX,DX MOV BX, 4 MOV AX,3 versus MOV AX, 3 MOV BX,4 XOR DX, DX MUL BX MUL BX –Same code, new order---when paired with original, can give meaning

 Marks should not degrade the perceived quality of the work  Detecting the presence and/or value of a mark should require knowledge of a secret  Multiple marks should not interfere with each other  Mark should survive all attacks that do not degrade work’s perceived quality –Resampling, dithering, compression, and combinations of these Qualities of a Robust Marking System

Channels  Covert Channels –Usually non-digital –Flower pot example  Subliminal channel –Exploits existing randomness –Regular communication through stego-object  “Supraliminal” channel –Low bandwidth – maybe establish session key –Information not hidden but cannot be modified Example: a novel

Prisoners’ Problem  Two individuals attempt to communicate covertly without alerting a “warden” who controls the communications channel

Prisoners’ Problem, continued  Passive Warden – monitors traffic and signal to some process outside the system if unauthorized message traffic is detected; (just spies on channel)  Active Warden – tries to remove all possible covert messages from cover texts that pass through their hands; (can slightly modify data being sent) –Much harder to deal with

Pure Steganography  In the best case, prisoners would not have to communicate prior to imprisonment (to trade encryption keys)  Is it possible? –Very difficult to engineer

Public/Private Key Steganography  Intertwined with Prisoner’s Problem  Private-Key Steganography assumes that Alice and Bob are allowed to share a secret key prior to imprisonment, or even trade public keys  Public-Key Steganography – shared key isn’t necessary – one only needs to know the other’s public key (may have to check all objects for messages)

Role of Randomness  Average information rate given by entropy  Example: entropy of monochrome images is generally around 4 – 6 bits/pixel –Use this difference to hide information –All the gain provided by compression is used for hiding

Watermarking/Fingerprinting  Cousin to steganography  Not limited to images (but is main focus)  Fingerprint – hidden serial number  Watermarking – hidden copyright message –Visible Company logo (image) –Invisible More applications Fragile – mark destroyed if image manipulated (ex: in Court) Robust – mark is resistant to image manipulation (verify ownership)

Types of Marking  Private Marking – require original for comparison –What if original is tampered with?  Public Marking (or Blind Marking) – requires neither secret original or embedded mark –More challenging –More useful

Attacks  Robustness attack –Try to diminish or remove mark  Presentation attack –Modify content such that detector cannot find mark  Interpretation attack –Devise a situation which prevents assertion of ownerships  Many attacks are combinations of above

Original image Rotated Stretched Cropped Blurred (would more likely be a combination of manipulations) Robustness Attacks

 Program: StirMark –Slightly stretches, shifts, bends, rotates by an unnoticeable, random amount. Then, adds a low frequency deviation to each pixel. Also adds smoothly distributed error.  Attack on Echo Hiding –Try to detect echo and remove it

Presentation Attack  Mosaic Attack –Chop image into smaller images –Prevents web crawlers from finding whole image and checking for watermark

Interpretation Attack  Owner of document d encodes watermark w, publishes the marked version d + w and has no other proof of ownership.  Attacker registers his watermark as w’ can claim that original unmarked version of it was d + w – w’.

 Goal: discover covert messages  Extended  2 tests  Stuff way to complicated for this presentation Statistical Steganalysis

Conclusions/Summary  Complicated  Many methods of implementation  Implementation depends on situation –Many situations –Many assumptions  Must ensure robustness (in most cases)

Works used  Most information: –Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn. Information hiding - a survey. Proceedings of the IEEE, 87(7), pp , July –Neil F. Johnson, Sushil Jajodia. Exploring Steganography: Seeing the Unseen, IEEE Computer, February pp –Niels Provos. Defending Against Statistical Steganalysis. In Proceedings of the 10th USENIX Security Symposium, pages , August –R. Anderson, "Stretching the limits of steganography," in Information Hiding, Springer Lecture Notes in Computer Science vol. 1174, pp , –R. Anderson and F. Petitcolas. On the limits of steganography, ieee journal on selceted areas in communications 16, pp , may 1998., –‘Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications.’ Craver, N. Memon, B.-L. Yeo, M. M. Yeung, IEEE Journal of Selected Areas in Communications, vol. 16 no. 4 pp. 573– 586, May 1998, Special issue on copyright & privacy protection. –S. Craver, "On Public-Key Steganography in the Presence of an Active Warden." in Information Hiding II, Springer Lecture Notes in Computer Science v 1525 (April 1996), pp 355—368.  Other information: various websites