Download presentation
Presentation is loading. Please wait.
Published byAustin Morrison Modified over 9 years ago
2
Steganography “Hiding in Plain Sight” Gary Alan Davis, D.Sc. Department of Computer & Information Systems
3
Steganography – what is it? Covered Writing (Berinato, 2003) –from Greek “steganos” & “graphie” Earliest example (May, 1997) –Greece, 500 B.C. –Message tattooed on shaved head of slave –Message sent when hair grew back Goal: Hide the fact that message even exists (Glass, 2002)
4
Steganography in Technology Hiding messages within legitimate files –Picture (.bmp,.jpeg,.gif) –Audio (.wav,.mp3) –Video (.mpeg,.avi) Messages could be... (Fisher, 2004) –Trademark/copyright information –Communication to others –Malicious code
5
Good Steganography Watermarks –Identify copyrighted material –Deter unlicensed use –Deter piracy Digital Watermarks (Glass, 2002) –Robust Watermarks – use blocked if mark is detected –Fragile Watermarks – use blocked if mark is corrupted
6
Bad Steganography Malicious code (Fisher, 2004) –Viruses –Spyware Terrorist Communications (Kolata, 2001) –“Dead Drop” (e.g., eBay) –No direct communication –Difficult to detect hidden messages in files
7
Steganography Demo Steganography 1.7.1 15 day free trial $24.95 to purchase SecureKit, Inc. (www.securekit.com)
11
84
15
Thank you! Any Questions? davis@rmu.edu
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.