Download presentation
Presentation is loading. Please wait.
Published byPatrick Benson Modified over 9 years ago
1
Steganography Kati Reiland CS 419 April 7, 2003
2
What is Steganography? Technically meaning “covered writing” Anything that hides information in another media without making any visible changes to the media. Not cryptography
3
History of Steganography In 440 b.c. Demeratus warned Sparta Shaved messenger’s head “Invisible Inks” A Beautiful Mind Hidden Data in i’s, j’s, and periods Today, used to protect currency from counterfeiting
4
Uses of Steganography Hiding of information to avoid observation or detection Protection of intellectual property rights.
5
Possible Uses of SteganographyDrawbacks Used to combine explanatory information with an image (e.g. doctor’s notes with an x-ray) Could accidentally degrade or render an image misleading Embedding corrective audio or image data in case corrosion occurs from a poor transmission or connection Could counteract with the original image Peer-to-peer private communicationsDoesn’t hide the fact that an e-mail was sent Posting secret communications on the web to avoid transmission Anyone with a cracking tool could expose and read the message Copyright protectionHardware tools needed to protect the watermarking. Maintaining AnonymityIt is easier to use free web-based e-mail or cloaked e-mail Hiding data on the network in case of a breach Better to understand and effectively use standardized encryption Table from ComputerWorld, 2002
6
Avoiding Detection Binary Data –ASCII text –Graphics Cover Object Where is it hidden? –TCP/IP Headers –Spaces in Text –“Noise” in sound files –Least Significant Bits in image files
7
Example of Hidden Data Camouflaging –Fishing freshwater bends and saltwater coasts rewards anyone feeling stressed. Resourceful anglers usually find masterful leapers fun and admit swordfish rank overwhelming anyday. Fishing freshwater bends and saltwater coasts rewards anyone feeling stressed. Resourceful anglers usually find masterful leapers fun and admit swordfish rank overwhelming anyday.
8
An Easier Example After the theater, all clients keep a tab down at Wesley’s Nook. ATTACK AT DAWN
9
Data in Audio Uses Least Significant Bits to hold data May retain data in the “unhearable” areas of the audio file
10
Data in Images Large files offer the best option for concealment but they are also the most difficult to transmit. –Compression Lossless Lossy 3 Types of Hiding in Digital Images –Least Significant Bit (LSB) Insertion –Masking and Filtering –Algorithms and Transformations
11
From Protecting Personal Data
12
Various Color Palettes
13
LSB Insertion Can be destroyed by any compression On average, only alters 50% of the bits Works best with 24-bit cover images Undetectable to the human eye
14
From Protecting Personal Data
15
Masking and Filtering Used for 24-bit and Gray- scale images “Watermarking” Extend the image to include the information as a part of the cover image. Generally unchanged by compression
16
Algorithms and Transformations Discrete Cosine Transform –A lossy compression (cosines are not exact calculations) Redundant Pattern Encoding –Also called Spread Spectrum Methods –Scatters info in the image and “marks” the significant areas –The rules for scattering and swapping are kept by the “stego-key”
17
Most Popular Stego Tools StegoDos White Noise Storm S-Tools Hide and Seek
18
Protection of Rights Digital Watermarking Digital Fingerprinting
19
Uses Copyright Information –Integrity –Informs of Ownership Stop Piracy –Ruins the use of pirated software, music, or data –Simply doesn’t allow duplicates to be made Keep track of where the music/software is being used
20
Digital Watermarking Places a piece of information, usually copyright information about the owner, repeated within the data. MagicGate and OpenMG MP3Stego PictureMarc
21
Digital Fingerprinting An embedded unique pattern into each distributed copy of the data. The unique data needs to appear normal to the user.
22
Steganalysis The process of finding hidden data in other media. Corporate Data Theft 4 Types of Attacks –Stego-only Attack –Chosen Stego Attack –Known Cover Attack –Known Stego Attack
23
Bibliography The Code Book by Simon Singh Steganography and Steganalysis by Joshua Silman Steganography by Neil Johnson Steganography: The New Terrorist Tool? By Danley Harrison TechTV’s various articles on Copy Protection and Digital Watermarking Protecting Personal Data by Simone Fischer-Hubner
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.