Presentation is loading. Please wait.

Presentation is loading. Please wait.

Steganography Nathan Shirley

Similar presentations


Presentation on theme: "Steganography Nathan Shirley"— Presentation transcript:

1 Steganography Nathan Shirley

2 Any attempt to hide information

3 Ancient Steganography
Greece – head tattoos France – Tattoos on Messenger's backs Mixing Fonts – printing presses Micro Dots – Small ink dots Jeremiah Denton – POW Morse Code with his eyes on international tv

4 Digital Steganography
Most Common - Images, Video, and Sound files (lowest bit) Printers – Use small yellow dots to encode serial number and timestamp Delays in network packets

5 Lowest Bit Steganography
Pixels represented by 32 bits 8 for each: Red Green Blue Alpha 32 Bit Format: 0xAARRGGBB If we flip the lowest bit (or two) it will only change the value by 1/256th

6 Lowest Bit Steganography
Bits available to store information: Lowest Bit Lowest 2 Bits

7 Viewing only the 2 least significant bits
Basic Example Viewing only the 2 least significant bits Original Image

8 Stegosaurus (Steganography Tool)

9 The Secret Data 14 KB of Christmas ASCII Art

10 Before and After Adding Data
SteganographySimple.java

11 LSB Before and After LSBViewer.java

12 Diff between images ImageDiff.java

13 New Method Randomize Position of Points using SHA1 based PRNG to generate random x and y coords Store Hash Map of all previously “used” bits to prevent collisions In the case of a collision, skip that point and generate the next

14 Basically Connect the Dots

15 New Method Before and After
SteganographyAdvanced.java

16 New Method LSB LSBViewer.java

17 New Method Diff ImageDiff.java

18 The New Secret Data 140 KB of NMAP man pages

19 Disadvantages: Adding too much Data
140 KB – NMAP man page Original Simple Sequential Connect The Dots

20 GitHub

21 Demo


Download ppt "Steganography Nathan Shirley"

Similar presentations


Ads by Google