Download presentation
Presentation is loading. Please wait.
1
Steganography Nathan Shirley
2
Any attempt to hide information
3
Ancient Steganography
Greece – head tattoos France – Tattoos on Messenger's backs Mixing Fonts – printing presses Micro Dots – Small ink dots Jeremiah Denton – POW Morse Code with his eyes on international tv
4
Digital Steganography
Most Common - Images, Video, and Sound files (lowest bit) Printers – Use small yellow dots to encode serial number and timestamp Delays in network packets
5
Lowest Bit Steganography
Pixels represented by 32 bits 8 for each: Red Green Blue Alpha 32 Bit Format: 0xAARRGGBB If we flip the lowest bit (or two) it will only change the value by 1/256th
6
Lowest Bit Steganography
Bits available to store information: Lowest Bit Lowest 2 Bits
7
Viewing only the 2 least significant bits
Basic Example Viewing only the 2 least significant bits Original Image
8
Stegosaurus (Steganography Tool)
9
The Secret Data 14 KB of Christmas ASCII Art
10
Before and After Adding Data
SteganographySimple.java
11
LSB Before and After LSBViewer.java
12
Diff between images ImageDiff.java
13
New Method Randomize Position of Points using SHA1 based PRNG to generate random x and y coords Store Hash Map of all previously “used” bits to prevent collisions In the case of a collision, skip that point and generate the next
14
Basically Connect the Dots
15
New Method Before and After
SteganographyAdvanced.java
16
New Method LSB LSBViewer.java
17
New Method Diff ImageDiff.java
18
The New Secret Data 140 KB of NMAP man pages
19
Disadvantages: Adding too much Data
140 KB – NMAP man page Original Simple Sequential Connect The Dots
20
GitHub
21
Demo
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.