Download presentation
Presentation is loading. Please wait.
Published byChester Park Modified over 9 years ago
1
Security by obscurity
2
Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that a message exists. TERMS: Payload – message to be hidden and sent Carrier – overlying message to conceal the payload Channel – type of message the carrier is (i.e. slave, JPEG, WAV) Package – carrier containing payload Suspect – intercepted message which is thought to have a payload
3
Wax tablets print message on underlying wood, cover in wax and write false message Shaved Slaves Shave a slave, tattoo a message, send him out once hair grows back Invisible Ink Write a message in lemon juice in between lines of a phony message, recipient heats to reveal the secret message. Morse Code Yarn Create a length of yarn such that there is a Morse code message in the colors of the yarn, weave it into some booties and send them as a gift.
4
When an analog signal is converted into digital, there can be “noise” which causes a small corruption of some data. Think of a tape player hissing when no noise had been recorded. When a camera takes a picture, there are minute variations in the data after being converted even if all variables of the picture being taken were the same. What if we took this random, corrupted data and replaced it with something meaningful? As long as an interceptor does not know where to look, and assumes this noise is just noise, our message is kept secret.
5
1. Hiding in pictures and video 2. Watermarking 3. Blog Steganography 4. CAPTCHA 5. Bacon’s Cipher
6
Pictures are represented in your computer as a header and zounds of RGB values. -24 bit color means 2^8 shades of each color. -Human eye cannot tell the difference between shade of 11111111 and 11111110, so why not omit this last bit of information, and insert something sneaky? -ASCII is represented by numbers 0-127, or 8 bits. If we drop each low order bit for each of the three colors every pixel, we can insert an ASCII character every 3 pixels! -To insert a message like “Sneaky Hello World!” we would only need a picture 19x3 or 57 pixels. The bigger the picture, the bigger the message you can hide without it being noticeable! - Note that it does not have to be an ASCII message! We can hide anything that can be represented in binary (which, according to Claude Shannon, is everything) inside of a picture.
7
This is a normal cake picture. This is a cake picture that has “SNEAKY HELLO WORLD” embedded in it. Can you tell the difference? A computer could, if it knew where to look.
8
A video is simply a rapid succession of pictures being displayed. If we can hide long messages in a picture, imagine what we could hide in a two hour long movie with ~30 frames per second! -OR - Subliminal Message – pictures inserted into a frame of video. Your brain recognizes the image, but you are not consciously aware of it. If the video were slowed down, you would have the time to recognize this image consciously. As long as the video remains at normal speed, the message remains hidden. You can also retrieve information by speeding up the video, if it was hidden for such purpose. Think of flip books where each page has a small amount of information, and they converge into a full picture when viewed rapidly.
9
Watermark – embedded message containing the source of the object Currency – if you hold a $50 bill to the light, you can see bands of text that appear to be *inside* the paper. These bands make it extremely difficult to counterfeit the bills. Printers – tiny yellow dots are printed on the bottom of pages. They can contain anything including the serial number of the printer, the user who printed the page, and a timestamp. Dots seen through a microscope:
10
Completely Automated Public Turing test to tell Computers and Humans Apart Why is this Steganography? It hides information from computers, but not from (most) humans.
11
1.Translate payload into As and Bs using Baconian Alphabet 2.Two typefaces (fonts) much be chosen 3.Construct a carrier message with the same length as the payload 4.Use typeface1 for A and typeface2 for B 5.Transmit A AAAAAG AABBAN ABBAAT BAABA B AAAABH AABBBO ABBABU-V BAABB C AAABAI-J ABAAAP ABBBAW BABAA D AAABBK ABAABQ ABBBBX BABAB E AABAAL ABABAR BAAAAY BABBA F AABABM ABABBS BAAABZ BABBB
12
Payload = “ATTACK AT DAWN” Font1 (A) = Bold Font2 (B) = Regular Translated payload = “AAAAA BAABA BAABA AAAAA AAABA ABAAB AAAAA BAABA AAABB AAAAA BABAA ABBAA”, length = 12x5 = 60 characters Carrier: “Hello Mr. Honeydew, how are you holding up after your operation? Let me know.” Package: “Hello Mr. Honeydew, how are you holding up after your operation? Let me know.”
13
"Baconian Cipher." Purple Hell. Web. 07 Oct. 2009.. "Bacon's cipher -." Wikipedia, the free encyclopedia. Web. 07 Oct. 2009.. "CAPTCHA -." Wikipedia, the free encyclopedia. Web. 07 Oct. 2009.. "Portal-cake." Armchair Generalist. Web. 07 Oct. 2009.. "Steganography -." Wikipedia, the free encyclopedia. Web. 07 Oct. 2009.. "Steganography_Encode - Utility Mill - Utility." Utility Mill - Makes Utilities. Web. 07 Oct. 2009..
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.