Steganography Leo Lee CS 265, Section 2 Dr. Stamp April 5, 2004.

Slides:



Advertisements
Similar presentations
F5 A Steganographic Algorithm
Advertisements

Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
An Introduction to Steganography
Steganography in digital media
An Introduction Steganography with A Case Study of Steganalysis
Khan, Mohammed Minhajuddin
1 Adnan Gutub Computer Engineering King Fahd University of Petroleum & Minerals Saudi Arabia A Novel Arabic Text Steganography Method Using Letter Points.
Security 3 Distributed Systems Lecture # 16. Overview Steganography Digital Watermarking.
Overview of Digital Stenography
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
Steganography Rayan Ghamri.
One possible way to encode information in text is print it in two slightly different typefaces. The secret message is decoded by ignoring one of the typefaces.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Some information drawn from following articles:
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
1 Chapter 7: Digital Watermarking and Copy(right) Protection.
Digital Watermarking By: Li Yang
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Cryptography & Classical Ciphers
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Steganography. Outline What is Steganography? History Steganography used nowadays? Terms Steganography methods Steganography Available Software Steganalysis.
Multimedia Network Security Lab. On STUT Adaptive Weighting Color Palette Image Speaker:Jiin-Chiou Cheng Date:99/12/16.
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Steganography Paul Gretes Gangster pay ho Dennis Pattersonno sniper DNA test A lepers gut.
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Information Hiding Nattawat Laksanawisit At National Chi Nan University.
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Introduction to Steganalysis Schemes Multimedia Security.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
Topic 10a Introduction to Steganography 454 NOTE: some of the enclosed information was adapted from slides created by Professor Gary C. Kessler of Champlain.
Cryptographic Anonymity Project Alan Le
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
1 A Color Image Hidden in a Grey-Level Image IS&T Third European Conference on Colour in Graphics, Imaging, and Vision, CGIV’2006, pp. 226–231, (Leeds,
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
Steganography Ryan Albright.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
STEGANOGRAPHY Sibaka Mahapatra Computer Science 3rd Year, Sec-E
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Welcome
Classical Techniques: Substitution
Computers Talk Binary.
Steganography.
Steganography & Digital Watermarfking
Steganography with Digital Images
Khan, Mohammed Minhajuddin
UIT Unconference December 06, 2018 Ian Redzic
JPEG Steganalysis Statistical Offset Tests
STEGANOGRAPHY IN IMAGES
Chapter 1: Introduction
Presentation transcript:

Steganography Leo Lee CS 265, Section 2 Dr. Stamp April 5, 2004

Outline What is Steganography? Historical Examples LSB Embedding Concept Implementation Analysis

What is Steganography? Literally means “covered writing” Goals: Hide a secret message within some other object Do so in such a way that the presence of the message is not discernable

Historical Examples Invisible Ink used in WWII Microdot: A page of information, the size of a printed period. Waxed Tablets A person’s head! Null-ciphers (unencrypted messages)

Shaved head Steg mm… Beer…

Null cipher Message sent by German spy in WWII Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils. Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetable oils. Pershing sails from NY June 1 Pershing was an American general

LSB Embedding - Terminology Message = the secret information we want to hide Cover image = image used to hide the message in Stego-image = the cover image with the message embedded

LSB - Concept Which color is different? In (R,G,B) left and right are (0,255,0) Center one is (0,254,0) We can use the LSB to hold info, since it looks the same either way!

LSB 24-bit Bitmaps In 24-bit bmps, each pixel represented by 3 bytes (RGB) Use lsb of each byte to hold a bit of message

LSB 24-bit Bitmaps Example Message = ‘f’ = 0110 01102 Cover Image: FF FF FF 00 00 00 FF FF … Stego-image: FE FF FF 00 00 01 FF FE …

My Own Implementation Which is the stego-image and which the cover? Cover Image Stego-Image

The Message

8-bit Don’t hold direct color values Do hold offsets into a palette Can’t just change lsb, because adjacent colors in palette may not be similar

Approach 1 - EzStego Use cover image with similar colors Experts recommend gray-scale images Arrange palette so adjacent colors are similar

Approach 2 – S-Tools Use only x bits for unique color information. 8 – x bits are for secret message Example (x = 7): Can only have 128 unique colors For each unique color, there’re two similar colors xxxx xxx0 & xxxx xxx1

LSB – Analysis – The Good Simple to implement Allows for large payload Max. payload = b * p where; b = number of bytes per pixel p = number of pixels of cover image

LSB – Analysis – The Bad Easy for attacker to figure out message if he knows the message is there But the images look the same, so can’t tell it’s a stego-image… right? Human vision can’t tell but vulnerable to statistical analysis

LSB – Analysis – The Ugly It’s even easier if the attacker just wants to corrupt the message. Just randomize the lsbs himself Even vulnerable to unintentional corruption: image cropping, conversion to jpeg and back, etc. Integrity is extremely frail

LSB – Analysis - Conclusion Good for cases where only low security is desired, but not necessary. Added security when coupled with cryptography Foundation for many variations, which are more secure e.g. not vulnerable to statistical analysis attacks.