Download presentation
Presentation is loading. Please wait.
Published byPatrick Bruce Modified over 9 years ago
1
What is Steganography? def’n: the art and science of hiding information by embedding it in some other data. cryptography - render message unintelligible steganography - conceal the existence of the message
2
Some History 1665 - Steganographica, Gaspari Schotti 400 B.C. - writings of Herodotus 1870 - The Pigeon Post into Paris 1499 - “Steganographia”, Trithemius - steganography and magic 2001 - A Beautiful Mind
3
Low-tech Methods of Steganography Message hidden Message hidden as Message written in invisible ink ID# etched into
4
The cover provides a host for transporting the hidden info. info embed -file extract info
5
Digital Steganography HTML message as cover? computer program as cover? network protocol headers white space in text unused space in buffer least significant bits of image slight distortion in sound file “Easter eggs”
6
Easter egg from the Simpsons In episode 7F19, Dustin Hoffman supplied the voice for Lisa's substitute teacher, but was not credited on screen. Instead, they used the phony name Sam Etic. In the next season (episode 7F24), Michael Jackson supplied the voice for a man in an insane asylum that thought he was Michael Jackson. Due to contractual obligations, they were unable to give Jackson on-screen credit. Instead, the show credited John Jay Smith, another person that doesn't exist. The egg lies in episode 9F09 when Lisa says, "It was the greatest movie I've ever seen in my life! And you wouldn't believe the celebrities who did cameos. Dustin Hoffman, Michael Jackson...of course they didn't use their real names, but you could tell it was them."
7
Steganography in Images Two types of compression: lossless (gif) lossy (jpeg) Sometimes concealed message inserted as a comment. Sometimes the accuracy of the image is sacrificed slightly. Common Tools StegoDOS White Noise Storm S-tools outguess steghide
8
Three Types of Steganography 1) Covert Channel conceal message so only sender and recipient know Watermarking concealed message contains its source ID 2) ___________ Watermarking designed for concealed message to survive 3) (Semi-)___________ Watermarking designed so concealment is corrupted whenever stego-file is modified.
9
Applications of Steganography Covert exchange of information Establish identity Combat illegal copying Steg____________ How would you? Comparison of files for statistical differences What files are available?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.