IEEE-WVU, Anchorage - 2008  1 Steg in the Real World Two examples that move the work of steganalysis out of the lab –The massive data survey of Provos.

Slides:



Advertisements
Similar presentations
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Advertisements

F5 A Steganographic Algorithm
ARCHIMÈDE Presented by Guy Teasdale Directeur, Services soutien et développement Bibliothèque de l’Université Laval CARL Workshop on Institutional Repositories.
FIT3105 Smart card based authentication and identity management Lecture 4.
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Steganography Part 2 – Detection and Research. Introduction to Steganalysis What is steganalysis?  The art of detecting messages hidden by steganography.
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Module Nine - Steganography Highline Community College Seattle University University of Washington in conjunction with the National Science Foundation.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
Chapter 9: The Client/Server Database Environment
Security and Digital Recording System Students: Gadi Marcu, Tomer Alon Number:D1123 Supervisor: Erez Zilber Semester:Spring 2004 Final Presentation.
WISENET Wireless Sensor Network Project Team: J. Dunne D. Patnode Advisors: Dr. Malinowski Dr. Schertz.
1 © Prentice Hall, 2002 The Client/Server Database Environment.
Lecture The Client/Server Database Environment
The Client/Server Database Environment
1 Integrating a Network IDS into an Open Source Cloud Computing Environment 1st International Workshop on Security and Performance in Emerging Distributed.
MBA 664 Database Management Systems Dave Salisbury ( )
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
IEEE-WVU, Anchorage  1 The Unseen Challenge Data Sets Anderson Rocha Walter Scheirer Siome Goldenstein Terrance Boult.
NiagaraAX Framework Version 3.8 Feature Overview
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
Distributed Communication via ASP.Net Web Services and.Net Remoting By Richard King.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
A Comparison of Java RMI, CORBA, and Web Services Technologies for Distributed SIP Applications Mark D. Hanes Stanley C. Ahalt Ashok K. Krishnamurthy Department.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 ITU-T Security Standardization on Mobile Web Services Lee, Jae Seung Special Fellow,
Process by which a system verifies the identity of a user wishes to access it. Authentication is essential for effective security.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Computer Emergency Notification System (CENS)
Jabber Client Jeevan Varma Anga Distributed Systems(CSC8530) Villanova University.
1 Geospatial and Business Intelligence Jean-Sébastien Turcotte Executive VP San Francisco - April 2007 Streamlining web mapping applications.
FESA (Framework for Enterprise StegAnalysis) Charles D. George, Jr. Masters Project Fall Semester 2012.
Semantic Web Technologies Research Topics and Projects discussion Brief Readings Discussion Research Presentations.
Dr. Rebhi S. Baraka Advanced Topics in Information Technology (SICT 4310) Department of Computer Science Faculty of Information Technology.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
A Collaborative Framework for Scientific Data Analysis and Visualization Jaliya Ekanayake, Shrideep Pallickara, and Geoffrey Fox Department of Computer.
Study on network safety strategy against DDoS attack 林昀欣 2010 IEEE International Conference on Advanced Management Science (ICAMS) Xiaoming Bi,
SOA support in J2EE Platform overview Primitive SOA support Support for service-orientation principles Contemporary SOA support.
Module 7: Advanced Application and Web Filtering.
An Introduction to Web Services Web Services using Java / Session 1 / 2 of 21 Objectives Discuss distributed computing Explain web services and their.
Cryptographic Anonymity Project Alan Le
Computer Systems Lab TJHSST Senior Research Project Browser Based Distributed Computing Siggi Simonarson.
Distributed Key Based Steganography Implementation and Analysis Mayur Mehta
A CROSS PLATFORM REMOTE DESKTOP CONNECTION SUITE A.V.D.S.S.BHADRI RAJU D.RAMESH BABU U.JAYASREE G.NANIBABU.
Mobile Analyzer A Distributed Computing Platform Juho Karppinen Helsinki Institute of Physics Technology Program May 23th, 2002 Mobile.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
Software Architecture Patterns (3) Service Oriented & Web Oriented Architecture source: microsoft.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall 1 Lecture 9: The Client/Server Database Environment Modern Database Management 9 th Edition.
2 nd lecture.  Plaintext – ciphertext – encryption – decryption.  Cryptography – cryptanalysis – cryptanalyst – cryptology.  Authentication – Integrity.
Digital Steganography
Chapter 9: The Client/Server Database Environment
Chapter 1 The Nature of Software
Security and Error Correction/Detection in 802.1x and GSM
The Client/Server Database Environment
STEGANOGRAPHY.
Distribution and components
The Client/Server Database Environment
Dynamic Updates for Videogames
Chapter 9: The Client/Server Database Environment
Chapter 18 MobileApp Design
Digital Forensics 2 Lecture 2B: Steg Tools Presented by : J.Silaa
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Model-based Steganography
Steganography.
WISENET Wireless Sensor Network
Seraphim : A Security Architecture for Active Networks
Steganography in digital images
JPEG Steganalysis Statistical Offset Tests
Presentation transcript:

IEEE-WVU, Anchorage  1 Steg in the Real World Two examples that move the work of steganalysis out of the lab –The massive data survey of Provos et al –The distributed steganalysis framework

IEEE-WVU, Anchorage  2 Steg on the Web? Provos et al. 2003* 2 million JPEG images from 1 million JPEG images from Usenet –Images restricted in size between 20KB and 400KB stegdetect –Identified potential hidden content in 1% of the images *N. Provos and P. Honeyman, IEEE Security and Privacy Magazine, May/June 2003

IEEE-WVU, Anchorage  3 Steg on the Web? Percentage of (false) positives –JPHide “detected” most often TestEbayUsenet Jsteg JPHide Outguess

IEEE-WVU, Anchorage  4 Steg on the Web? Verifying hidden content –Stegbreak Dictionary attack against Jsteg, JPHide, and Outguess –Ebay: multi-lingual dictionary of 850,000 words –Usenet: short PIN numbers and pass phrases; 1.8 millions words

IEEE-WVU, Anchorage  5 Steg on the Web? Performance of Stegbreak SystemOne Image (words/second) Fifty Images (words/second) JPHide4,5008,700 Outguess 0.13b18,00034,000 Jsteg36,00047, GHz PIII JPHide: 10 days Outguess: ? Jsteg: 8 days

IEEE-WVU, Anchorage  6 Towards a larger steganalysis framework Disconcert - a distributed computing framework for loosely coupled workstations –Distribute indices into stegbreak’s dictionary Ebay: 60 nodes, 200,000 per second for JPHide Usenet: 230 nodes, 870,000 keys per second

IEEE-WVU, Anchorage  7 Is anything out there??? Conclusions of Provos et al –All steganographic systems users carefully choose passwords that are not susceptible to dictionary attacks –Images from sources not analyzed carry steganographic content –Images carried content embedded by tools that stegdetect does not consider –Messages are too small for detection

IEEE-WVU, Anchorage  8 Distributed Steganalysis: Objective –The development of an architecture for an extensible distributed application for steganalsyis User alerts Facility for content destruction of quarantine SOA to facilitate the inclusion of new and improved steganalysis algorithms

IEEE-WVU, Anchorage  9 Overall Architecture

IEEE-WVU, Anchorage  10 Communications

IEEE-WVU, Anchorage  11 Flexible Network Architectures

IEEE-WVU, Anchorage  12 Flexible Network Architectures

IEEE-WVU, Anchorage  13 User Interface

IEEE-WVU, Anchorage  14 Steganalysis Support Publicly available wrapped tools –Stegdetect (JPEG) –Digital Invisible Ink Toolkit (BMP, PNG) Detects LSB methods –Custom “supertool” Detects via signatures: »In Plain View, S-Tools, Mandelsteg, Hide and Seek v.4 And v.5, Hide4PGP Statistical tests: »  2 and  2 histogram

IEEE-WVU, Anchorage  15 Steganalysis Tool Wrapping Support Full featured tool wrapping API –Tool wrapping support for C/C++, Java, and Matlab programs –Network communication with XML messages between worker clients and server

IEEE-WVU, Anchorage  16 Implementation Details Entire framework written in Java 5 –Tool support in a variety of languages –JNI low-level system support for Linux and Windows –JBOSS backend server –EJB 3 Object Model