Presentation is loading. Please wait.

Presentation is loading. Please wait.

MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.

Similar presentations


Presentation on theme: "MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454."— Presentation transcript:

1 MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454

2 Roadmap Brief overview of Steganography What is Steganography? Techniques of Steganography Steganography tools Short video of steganography Steganalysis Steganalysis tools Steganalyst and forms of attack Questions? References

3 Overview Steganography originated from the Greek words Stegnos meaning “Covered or Protected” The word graphein is used in Greeks meaning “write” The use of Steganography was first recorded around 440BC when Demaratus sent a warning message about a forthcoming attack to Greece Forms of steganography used back then: Tattooing information on their body Using invisible Ink Writing it directly on the wooden back of a wax tablet before applying beeswax surface

4 What is Steganography? Steganography is the science of hiding information within cover object It involves the alteration of bits in an image, sound document or even a text file The main purpose or goal of steganography is to hide the data from third party Simple steganography process: Cover_ medium + hidden_data + stego_key = stego_medium Cover_ medium => File to hide the hidden_data Stego_key => A form of encryption Stego_medium => The resultant file same as the Cover_medium In addition, the Cover_medium or Stego_medium are the audio files or image files

5 Techniques of Steganography Physical techniques Digital messages Digital text Social steganography Network steganography Printed steganography Using puzzles

6 Physical Techniques Invisible Ink Wax tablet Messenger’s body On envelopes Messages on paper written in secrets Ink Null ciphers (using the first letter of each words to form a hidden message in an otherwise innocuous text)

7 Digital Messages Concealing hidden messages in Images or sound files Tampered executable files, exploiting redundancy in the targeted instruction set Data within encrypted data or within random data Pictures embedded in video material Modifying the echo of a sound file Ignored sections of a file, such as after the logical end of the carrier file Steganography for audio signals

8 Steganography Tools Xiao steganography Hide secret files in BMP images or in WAV file with encryption support Open Stego Supports 203kb in size, password protected, it supports BMP, GIF, JPEG, JPG, PNG and WBMP. The output stego file can be save in PNG Camouflage Hide text file in JPEG, the resulting file can be called camouflaged and it behaves and looks like normal file Silent Eye Cross platform, hides sensitive messages behind image or audio file supports BMP, JPG, PNG, GIF, TIF and WAV

9 OpenPuff Supports up to 256 bytes of target data in one carrier BMP file. We also have: Steghide Our Secret Shusssh! Image Steganography SSuite Picsel Steganofile Clotho S-Tools

10 https://www.youtube.com/watch?v=_2kMY0yLXcs&list=PLkEqMIqA8TUnSC4f_Km0MGU FxNhPHJsRY

11 Steganalysis Steganalysis is the study of detecting messages hidden using steganography The goal of steganalysis is to identify suspected packages, determine whether or not they have a payload encoded into them, and, if possible, recover that payload Various Detection Tools Guidance Software, Inc (Encase) ILook Investigator Comparing the MD5 hash values of two files with the program, md5sum.exe Stegdetect and Xsteg Stego Watch from WetStone Technologies Inc

12 Steganalyst and forms of attack A person skilled at finding messages hidden using steganography Attacks used by steganalyst: Stego-only attack: only the stego – object is available for analysis such as the stego- carrier and hidden information are available known cover attack: comparing original image with the stego-object and pattern differences are detected Known message attack: is the analysis of known patterns that correspond to hidden information, which may help against attacks in the future Chosen stego attack: the steganography tool and object are known Chosen message attack: goal is to determine corresponding patterns in the stego-object that may point to the use of specific stego tools or algorithms Known stego attack: stego tool is known and both the original and stego-object are available

13 Questions?

14 References http://www.sans.org/reading-room/whitepapers/stenganography/steganalysis-detecting-hidden- information-computer-forensic-analysis-1014 http://en.wikipedia.org/wiki/Steganography http://www.garykessler.net/library/steganography.html http://en.wikipedia.org/wiki/Steganography_tools https://www.youtube.com/watch?v=_2kMY0yLXcs&list=PLkEqMIqA8TUnSC4f_Km0MGU FxNhPHJsRY


Download ppt "MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454."

Similar presentations


Ads by Google