Steganography Kati Reiland CS 419 April 7, 2003. What is Steganography? Technically meaning “covered writing” Anything that hides information in another.

Slides:



Advertisements
Similar presentations
Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
Advertisements

Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Information Hiding: Watermarking and Steganography
What is Steganography? def’n: the art and science of hiding information by embedding it in some other data. cryptography - render message unintelligible.
Steganography and Data Hiding. Introduction Steganography is the science of creating hidden messages. Sounds like crypto, but… In traditional crypto,
Khan, Mohammed Minhajuddin
Steganography The Art of Hiding Messages
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Pictures Worth More Than 1000 Words
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Steganography. Outline What is Steganography? History Steganography used nowadays? Terms Steganography methods Steganography Available Software Steganalysis.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Computer Concepts 2014 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Introduction to Steganography
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Computers Talk Binary.
Steganography.
Visit for more Learning Resources
Steganography with Digital Images
Khan, Mohammed Minhajuddin
Steganography Techniques and their use in Anonymity
Parag Agarwal Digital Watermarking Parag Agarwal
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Steganography Kati Reiland CS 419 April 7, 2003

What is Steganography? Technically meaning “covered writing” Anything that hides information in another media without making any visible changes to the media. Not cryptography

History of Steganography In 440 b.c. Demeratus warned Sparta Shaved messenger’s head “Invisible Inks” A Beautiful Mind Hidden Data in i’s, j’s, and periods Today, used to protect currency from counterfeiting

Uses of Steganography Hiding of information to avoid observation or detection Protection of intellectual property rights.

Possible Uses of SteganographyDrawbacks Used to combine explanatory information with an image (e.g. doctor’s notes with an x-ray) Could accidentally degrade or render an image misleading Embedding corrective audio or image data in case corrosion occurs from a poor transmission or connection Could counteract with the original image Peer-to-peer private communicationsDoesn’t hide the fact that an was sent Posting secret communications on the web to avoid transmission Anyone with a cracking tool could expose and read the message Copyright protectionHardware tools needed to protect the watermarking. Maintaining AnonymityIt is easier to use free web-based or cloaked Hiding data on the network in case of a breach Better to understand and effectively use standardized encryption Table from ComputerWorld, 2002

Avoiding Detection Binary Data –ASCII text –Graphics Cover Object Where is it hidden? –TCP/IP Headers –Spaces in Text –“Noise” in sound files –Least Significant Bits in image files

Example of Hidden Data Camouflaging –Fishing freshwater bends and saltwater coasts rewards anyone feeling stressed. Resourceful anglers usually find masterful leapers fun and admit swordfish rank overwhelming anyday. Fishing freshwater bends and saltwater coasts rewards anyone feeling stressed. Resourceful anglers usually find masterful leapers fun and admit swordfish rank overwhelming anyday.

An Easier Example After the theater, all clients keep a tab down at Wesley’s Nook. ATTACK AT DAWN

Data in Audio Uses Least Significant Bits to hold data May retain data in the “unhearable” areas of the audio file

Data in Images Large files offer the best option for concealment but they are also the most difficult to transmit. –Compression Lossless Lossy 3 Types of Hiding in Digital Images –Least Significant Bit (LSB) Insertion –Masking and Filtering –Algorithms and Transformations

From Protecting Personal Data

Various Color Palettes

LSB Insertion Can be destroyed by any compression On average, only alters 50% of the bits Works best with 24-bit cover images Undetectable to the human eye

From Protecting Personal Data

Masking and Filtering Used for 24-bit and Gray- scale images “Watermarking” Extend the image to include the information as a part of the cover image. Generally unchanged by compression

Algorithms and Transformations Discrete Cosine Transform –A lossy compression (cosines are not exact calculations) Redundant Pattern Encoding –Also called Spread Spectrum Methods –Scatters info in the image and “marks” the significant areas –The rules for scattering and swapping are kept by the “stego-key”

Most Popular Stego Tools StegoDos White Noise Storm S-Tools Hide and Seek

Protection of Rights Digital Watermarking Digital Fingerprinting

Uses Copyright Information –Integrity –Informs of Ownership Stop Piracy –Ruins the use of pirated software, music, or data –Simply doesn’t allow duplicates to be made Keep track of where the music/software is being used

Digital Watermarking Places a piece of information, usually copyright information about the owner, repeated within the data. MagicGate and OpenMG MP3Stego PictureMarc

Digital Fingerprinting An embedded unique pattern into each distributed copy of the data. The unique data needs to appear normal to the user.

Steganalysis The process of finding hidden data in other media. Corporate Data Theft 4 Types of Attacks –Stego-only Attack –Chosen Stego Attack –Known Cover Attack –Known Stego Attack

Bibliography The Code Book by Simon Singh Steganography and Steganalysis by Joshua Silman Steganography by Neil Johnson Steganography: The New Terrorist Tool? By Danley Harrison TechTV’s various articles on Copy Protection and Digital Watermarking Protecting Personal Data by Simone Fischer-Hubner