Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.

Slides:



Advertisements
Similar presentations
BMP Hide ‘n’ Seek What is BMP Hide ‘n’ Seek ? –It’s a tool that lets you hide text messages in BMP files without much visible change in the picture. –Change.
Advertisements

Steganography and Network Security
Khan, Mohammed Minhajuddin
IT Systems What Number? EN230-1 Justin Champion C208 –
CSCI 4550/8556 Computer Networks Comer, Chapter 7: Packets, Frames, And Error Detection.
Connecting with Computer Science, 2e
Overview of Digital Stenography
Survey on Information Assurance TEL 581 Presented by Viswesh Prabhu Subramanian Gregory Michel Lincoln Jean Louis Steganography.
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
First Bytes - LabVIEW. Today’s Session Introduction to LabVIEW Colors and computers Lab to create a color picker Lab to manipulate an image Visual ProgrammingImage.
Last time 3 main components to a computer system Types of computers Talked about software – task oriented What are some kinds of data that a computer works.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
Management Information Systems Lection 06 Archiving information CLARK UNIVERSITY College of Professional and Continuing Education (COPACE)
TERMS TO KNOW. Programming Language A vocabulary and set of grammatical rules for instructing a computer to perform specific tasks. Each language has.
Chapter 2 Data Representation. Define data types. Visualize how data are stored inside a computer. Understand the differences between text, numbers, images,
Steganography Ben Lee III Long Truong ECE Spring 2002.
Computer Systems Nat 4.5 Computing Science Data Representation Lesson 4: Storing Graphics EXTENSION.
Steganography.
MATH 224 – Discrete Mathematics
Aloha Aloha What you see: What the computer sees: binary number columns binary number columns
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Data Representation S2. This unit covers how the computer represents- Numbers Text Graphics Control.
Chapter 11 Fluency with Information Technology 4 th edition by Lawrence Snyder (slides by Deborah Woodall : 1.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
ECE 495: VIP SMARTPHONE STEGANOGRAPHY ANDROID APP Alex Buschkoetter, Greg Brener.
Have you ever wanted to hide something from: Your friends? Your family? The Government?
STATISTIC & INFORMATION THEORY (CSNB134) MODULE 8 INTRODUCTION TO INFORMATION THEORY.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Chapter 2 Data Representation.
©Brooks/Cole, 2003 Chapter 2 Data Representation.
Data Representation, Number Systems and Base Conversions
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Computer Security coursework 1 Dr Alexei Vernitski.
Marwan Al-Namari 1 Digital Representations. Bits and Bytes Devices can only be in one of two states 0 or 1, yes or no, on or off, … Bit: a unit of data.
Data Representation. What is data? Data is information that has been translated into a form that is more convenient to process As information take different.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
COMP135/COMP535 Digital Multimedia, 2nd edition Nigel Chapman & Jenny Chapman Chapter 2 Lecture 2 – Digital Representations.
Cryptographic Anonymity Project Alan Le
Understanding Character Encodings Basics of Character Encodings that all Programmers should Know. Pritam Barhate, Cofounder and CTO Mobisoft Infotech.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Base 16 (hexadecimal) Uses the decimal digits and the first letters of the alphabet to encode 4 binary bits (16=2 4 ) abcdef or ABCDEF.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
DATA Unit 2 Topic 2. Different Types of Data ASCII code: ASCII - The American Standard Code for Information Interchange is a standard seven-bit code that.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
BINARY I/O IN JAVA CSC 202 November What should be familiar concepts after this set of topics: All files are binary files. The nature of text files.
Day 6 - Encoding and Sending Formatted Text
Steganography Example
STEGANOGRAPHY.
Steganography.
Steganography & Digital Watermarfking
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
Ch2: Data Representation
Student: Ying Hong Course: Database Security Instructor: Dr. Yang
Chapter 2 Data Representation.
Understanding Hex “I hope you have the worst headache of your life, then you will begin to understand” ~unknown.
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran

Goals To conceal either an image or a text message into a "carrier" image with Least Significant Bit Steganography To detect that an image has been compromised or altered To extend the method to apply to various image formats To make the program usable with a Graphical User Interface (GUI)

Literally means "concealed writing" in Greek Opposite of cryptography, in which a message is made unintelligible, but transmitted through public means Steganography is the concealment of the fact that a message is even being transferred. What is Steganography?

Historical Methods Shaving hair Wax tablets Jargon Cardano grille Invisible Inks Micro dots

Current Method Hiding an entire text or image binary in either an image or audio “carrier” using Least Significant Bit encoding Previously done as a Senior Technology Lab using the same technique with.wav audio files in 2007.

Least Significant Bit Encoding Images on computers are made out of pixels Each pixel is represented by three byte s Each byte is composed of eight bits or 1s and 0s The second set of bytes represents the encoded ASCII character “G” ( )

Program Design in JAVA Create a Graphical User Interface dropdown menu encode message or image into a chosen carrier image input a suspected image and attempt to detect if it has been compromised

Inputing the Image Read the binary of the image using Buffered Reader into a two dimensional array (a matrix) Alter every Least Significant Bit in each byte in order to spell out the word. Each ASCII character's binary will have to be specified in a class file. Save the altered image because it is ready to be sent

Steganalysis Detecting steganography is only feasible if the original image is available or if the exact encoding method is known The program will still be able to detect if an image has been compromised by converting the suspected image into hexadecimal Each image format has a specific tag associated with it at a specific part of the hexadecimal code

Image Hex Tags Image FormatTag of Compromised File Location Within the Hex Code.GIF Beginning.JPGFF D9End.PNG E 47 0D 0A 1A 0A D Beginning

Detection Read the suspected image's binary into a text file Convert the binary code into hexadecimal Find the supposed image format of the suspected image Test if its associated hexadecimal tag is legitimate

Possible Problems Steganography is an increasingly complex field because of new algorithms There are many methods to inconspicuously hide an image or text message with computer science, some are less complex (microdots) and some use higher level mathematical algorithms (stochastic modulation) The Least Significant Bit method is an established method and will be probably be detected by commercial Steganalysis software, but not the human eye

Testing Most of the coding so far has been done with binary operations and properly inputting an image into a text file and comprehending pixel values

Learned Concepts How images of various formats are constructed How to manipulate binary code and understanding the role of bits within bytes Various methods of Steganography and Steganalysis and which are the most effective

Future Plans First make the encoding work for one image format Detect that one image format Extend the program to work with other image formats and improve the algorithms susceptibility to common detection methods