Download presentation
Presentation is loading. Please wait.
1
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin
2
Project Description ➲ Provide an overview of steganography; its uses, how it has adapted to computers, how it works, and steganalysis ➲ Use knowledge gained from online research ➲ Computer steganography is hard to detect and the more one knows about it the better the chance of detecting it
3
History ➲ In ancient times messages would be written on wood or stone tablets then covered in wax ➲ Messages would be tattooed on slaves heads, covered by hair, hair shaved off to read. ➲ Invisible ink
4
Example ➲ Haha you cant ➲ See this
5
Facts ➲ Steganography is closely related to cryptography ➲ Used by artists/developers to insert digital watermarks into their work ➲ There are tools that allow steg to be used with almost any file type: audio, graphics, text, video, executable, ect ➲ Steg used in graphics hides data by inserting it piece by piece into the last couple of bits that make up pixels
6
Steganalysis ➲ Steganalysis is the detection of steganography ➲ Many tools available to detect/decode/destroy steganography
7
Tools ➲ Puff: Italian program, hides files in bmp, jpg, pcx, png, tga, aiff, mp3, next/sun, wav, and Win pe. Provides 16 different encryption algorithms ➲ Invisible Secrets: hides in hpeg, png, bmp, html, and wav. Encryption + other fun tools ➲ TextHide: Scrambles text to hide data within any text file ➲ Stegdetect: Detects steganography In jpeg images
8
Outcomes ➲ Good: ➲ Fun to research ➲ Good sources of data (FBI website) ➲ Understanding of something most people do not know ➲ Bad: ➲ Procrastination ➲ Writers block ➲ Did not meet my own expectations
9
Lessons Learned ➲ Do not procrastinate ➲ Steganography is interesting
10
Resources ➲ http://home.comcast.net/~ebm.md/stego/sof twarewindows.html http://home.comcast.net/~ebm.md/stego/sof twarewindows.html ➲ http://www.securityfocus.com/infocus/1684 http://www.securityfocus.com/infocus/1684 ➲ http://home.comcast.net/~ebm.md/stego/sof twarewindows.html http://home.comcast.net/~ebm.md/stego/sof twarewindows.html ➲ http://www.fbi.gov/hq/lab/fsc/backissu/july20 04/research/2004_03_research01.htm http://www.fbi.gov/hq/lab/fsc/backissu/july20 04/research/2004_03_research01.htm
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.