Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004 Computing Is Pretty Strange.

Slides:



Advertisements
Similar presentations
Cryptography Ch-1 prepared by: Diwan.
Advertisements

Microsoft® Word 2010 Training
Scanning Directly to the Flash Drive To Scan Photos To Scan Photos Open scanner lid Open scanner lid Put pictures on scanner bed face down Put pictures.
Each of these photos represent an available slideshow. Click on any of these pictures and press [Tab] to open the new slideshow in a new window. Press.
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Steganography and Network Security
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Environmental Education Outreach Program: Summer Scholars:
Environmental Education Opportunity Program: Summer Scholars:
Overview of Digital Stenography
Steganography Rayan Ghamri.
Drawing forecast charts. Open NeLant basic map area.
How to Script a Presentation and Include Your Own Original Media Bryn Jones UNDA 2001.
Removing White Backgrounds Using Adobe Fireworks.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
LEARN THE QUICK AND EASY WAY! VISUAL QUICKSTART GUIDE HTML and CSS 8th Edition Chapter 2: Working with Webpage Files.
Microsoft Word Review Lesson
Steganography detection Roland Cmorik, Martin Šumák.
A Steganography Project Project By: Awadesh Madhogaria.
Inserting Pictures and Symbols in Word documents There are many ways to insert pictures – these are the most common methods Copy and Paste Copy and paste.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
© Keith Vander Linden, 2005 Jeremy D. Frens, Open up the box of a computer, and you won't find any numbers in there. You'll find electromagnetic.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
Presented by the Virginia 4-H Science and Technology Committee.
Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004 Computing Is Pretty Strange.
Information Hiding Nattawat Laksanawisit At National Chi Nan University.
Renee Sammet. What Is Psykopaint.com? Psychopaint.com is a website that facilitates abstract photo editing. It is extremely user friendly and fast.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
My Website. My idea My idea was to make it friendly and nice look through the website. So I made my own logo to make it my own.
TAKE PHOTO TAKE PHOTO How to take a photo: - Sit down in front of the monitor. - Look directly into the lense. - Press TAKE PHOTO. - !!! DON’T MOVE WHILE.
TAKE PHOTO TAKE PHOTO How to take a photo: - Sit down in front of the monitor. - Look directly into the lense. - Press TAKE PHOTO. - !!! DON’T MOVE WHILE.
Processing Workshop. What is processing? “Processing is an open source programming language and environment for people who want to program images, animation,
Creating a Historical Tour in Alice By Jenna Hayes May 2010.
Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004 More details and explanation …
Creating a Power Point My Community By Mrs. Armentrout.
Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004 Drawing pictures … It’s not art, it’s fun.
Computer Basics Technology really can make your life better!!
Compare and Contrast : Blackboard & a Personal Web Page www3.ltu.edu/~s_schneider/howto/faculty.htm You’ll find this presentation (and another) here :
Read, Read, Read, Read, Read!! The following presentation is a review over important icons and commands in the Microsoft Word program. They are important.
How to use the Hand-In Folder. Click on the Folder icon at the bottom of the screen.
Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004 Making an example of Pacman.
Based on Lawrence Snyder’s slides for UW-Seattle. This notice serves as permission for their use for teaching in public or private (not for profit) schools.
Body System Here Enter group members names here. Save Your Work! This is a good time to start saving your work. Go to FILE, then Save As…, then change.
Computing Fundamentals Lesson 5 – Dotty Reality This lesson you will be discovering how computers save picture files, using dots and points.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
This is a a test of SONY`s new technology
Welcome
Steganography Example
What are vector images? How are they different from bitmap images?
Hidden Communications: The Effectiveness of Steganography
Creating Power Point Presentations
Visit for more Learning Resources
This is a a test of SONY`s new technology
This is a a test of SONY`s new technology
Art Programs Raise Deep Questions
Steganography Techniques and their use in Anonymity
Testing and Repetition
Using the Power of XML Personally
Lawrence Snyder University of Washington, Seattle
Making Picture File Sizes and Dimensions Smaller
Basic Processing … Drawing pictures … It’s not art, it’s fun
Encryption & Steganography: Amazing Things To Do with Bits
STEGANOGRAPHY IN IMAGES
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Presentation transcript:

Lawrence Snyder University of Washington, Seattle © Lawrence Snyder 2004 Computing Is Pretty Strange

 The process of hiding information  Two Greek roots meaning: “stego” == “roof” “stega” == “cover” 2/6/2016© Larry Snyder2

 Most common reason to hide information is to avoid being caught with it  Military and spy documents  Repressive governments restricting news/info  Avoid others “snooping” – privacy  Hiding is different than encryption … uses the fact that the searcher doesn’t know it’s there 2/6/2016© Larry Snyder3

 The Plan …  hide “subversive” protest photo in “calendar art” 2/6/2016© Larry Snyder4 Guest Image Host Image

 We don’t need all of the bits in RGB to get a decent picture 2/6/2016© Larry Snyder All bitsLeft 2 bits of each color only

 Put guest bits into right 2 bits of host 2/6/2016© Larry Snyder

 2/6/2016© Larry Snyder7 foglg.jpg stegFog.png Really? Just Do It! Really? Just Do It!

Each of the colors is shifted left 1 bit at a time … and then we’ll see the details 2/6/2016© Larry Snyder Original Hidden Picture

 2/6/2016© Larry Snyder9 Encoding Code Code To Save Result on Click

2/6/2016© Larry Snyder10

2/6/2016© Larry Snyder11

 After the pictures are loaded Clear right 2 bits of host Extract left 2 bits of guest New combined color 2/6/2016© Larry Snyder xx xx xx

 2/6/2016© Larry Snyder13

 Read in the file, and then on key press, shift the bits left one position 2/6/2016© Larry Snyder14 Just Do It! Again Just Do It! Again

 Run A Test … 2/6/2016© Larry Snyder15 The Original

2/6/2016© Larry Snyder16 Steganized

 Steganography can be used extensively – there are many places to hide information  Tomorrow, you’ll hide a picture, too. 2/6/2016© Larry Snyder17