Download presentation
Presentation is loading. Please wait.
Published byChloe Simon Modified over 8 years ago
1
Out of site… Out of Mind
2
By Fred A. DuBrock COSC-356 Steganography
3
Derived from the Greek words steganos, which means “covered,” and graphia, which means “writing.”
4
Steganography Messages hidden in pictures (low order bits) Hard to detect that a message is even there! Difficult problem with respect to terrorism…
5
Steganography (Hidden Writing) A technique to prevent an opponent from reading your traffic and for him to remain unaware that there is any traffic at all. Old examples of this: * In ancient Greece tattooing on a slaves head * invisible ink * microdot * low-bandwidth applications
6
Steganorgraphy Steganography Practice of hiding information within other information Digital watermarks Hidden within documents and can be shown to prove ownership
7
How Steganography Is Used Enhanced Data Structures Strong Watermarks Document Tracking Tools Document Authentication Private Communications
8
Strong Watermarks Creators of digital content such as books, movies and audio files A message may be inserted “This file copyright 2002 by Big Fun” Some watermarks are meant to be found Other watermarks are deliberately made as fragile as possible
9
Document Tracking Tools Hidden information can identify the legitimate owner of a document Is an idea attractive to both content- generating industries and government agencies with classified information
10
Private Communications Useful in political situations when communications is dangerous
11
Steganalysis and watermark security What is steganalysis? Steganalysis is the art of discovering and rendering useless covert message, i.e., methods countering steganography. Note that the two goals with steganalysis: 1) Discover the presence of the secret message embedded in cover Work. 2) Make the secret message invalid.
12
However, steganographic watermarking needs to be secure against any steganalysis tools to detect watermarks’ presence. It is easily seen that --- in steganographic watermarking, watermarks’ presence must not be detected (resisting to unauthorized presence detection); while in non-steganographic watermarking, watermarks’ can be publicly announced.
13
Steganography-Practice of Hiding information in other information Example of a conventional watermark
20
Other References Digital Watermarking: ISBN1558607145 Investigator's Guide to Steganography ISBN: 0849324335 Information Hiding Techniques for Steganography and Digital Watermarking ISBN: 1580530354
21
Software Many useful programs can be found in Internet archives. Some of the better ones include the following: * http://www.stegoarchive.com * http://www.cl.cam.ac. uk/~-fapp2/steganography * http://www.geocities.com/Paris/995S/priv.html * http://www.student.seas.gwu.edu/'~sowers/digwat. html * http://www. isse.gmu. eduF~njohnson/Steganography * http://www.watermarkingworld.org * http://www.funet.fl7pub/crypt/steganography * http://glu.freeservers.com/stegano.htm Specific software packages available on the Internet are listed here. http://www.stego.com Romana Machado distributes the Java ver- sion of her Stego and EzStego software from here. This cross-platform tool hides information in the least significant bit of an image after the colors in the image are sorted. This usually works quite well, but there can be some inconsistencies. See Sections 9.2 and 17.4. The software is distributed with the GNU Public License.
22
Thanks. © 2004 Fred A. DuBrock
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.