Presentation is loading. Please wait.

Presentation is loading. Please wait.

Module Nine - Steganography Highline Community College Seattle University University of Washington in conjunction with the National Science Foundation.

Similar presentations


Presentation on theme: "Module Nine - Steganography Highline Community College Seattle University University of Washington in conjunction with the National Science Foundation."— Presentation transcript:

1 Module Nine - Steganography Highline Community College Seattle University University of Washington in conjunction with the National Science Foundation

2 Definition of Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message; this is in contrast to cryptography, where the existence of the message is clear, but the meaning is obscured.

3 Steg defined The name comes from Johannes Trithemius's Steganographia: a treatise on cryptography and steganography disguised as a book on black magic, and is Greek for "hidden writing." Read more here http://en.wikipedia.org/wiki/Steganography

4 Uses of Steganography Watermarking of digital art Other data Data hiding Labels

5 Basics of Data Hiding Carrier file graphic or other document graphic or other document used to hide the confidential document used to hide the confidential document Hidden file Students can hide a document in a graphic and then hide that graphic in another graphic

6 Steg tools Truly good steganography tools do not change the size of the carrier file The forensic hash value, however, will change

7 Finding Hidden Data Your first clue will be the discovery of steganography tools Another clue may be two graphic files of different sizes or different file types It may or may not be password protected It may or may not be encrypted

8 Feasibility Finding items in files is time consuming Tools such as stegdetect may find them http://www.outguess.org/detection.php http://www.outguess.org/detection.php http://www.outguess.org/detection.php It currently will undo the following techniques jsteg, jsteg, jphide (unix and windows), jphide (unix and windows), invisible secrets, invisible secrets, outguess 01.3b, outguess 01.3b, F5 (header analysis), F5 (header analysis), appendX and camouflage appendX and camouflage

9 Stegspy http://www.spy- hunter.com/stegspydownload.htm http://www.spy- hunter.com/stegspydownload.htm Finds items using these methods Hiderman Hiderman JPHideandSeek JPHideandSeek Masker Masker JPegX JPegX Invisible Secrets Invisible Secrets

10 Other sources http://www.infosyssec.com/infosyssec/Ste ganography/steganalysis.htm http://www.infosyssec.com/infosyssec/Ste ganography/steganalysis.htm http://home.earthlink.net/~emilbrandt/stego /info.html http://home.earthlink.net/~emilbrandt/stego /info.html


Download ppt "Module Nine - Steganography Highline Community College Seattle University University of Washington in conjunction with the National Science Foundation."

Similar presentations


Ads by Google