Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.

Slides:



Advertisements
Similar presentations
Unit 30- Digital Graphics THEORY P2 and D2
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
BMP Hide ‘n’ Seek What is BMP Hide ‘n’ Seek ? –It’s a tool that lets you hide text messages in BMP files without much visible change in the picture. –Change.
F5 A Steganographic Algorithm
F5 a Steganographic algorithm - andreas westfeld
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Steganography and Network Security
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
Steganography and Data Hiding. Introduction Steganography is the science of creating hidden messages. Sounds like crypto, but… In traditional crypto,
Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed By: Randy Grubb Armstrong Atlantic State University – Cyber.
Steganography The Art of Hiding Messages
“The Art of Hiding Data”
Overview of Digital Stenography
Steganography Part 2 – Detection and Research. Introduction to Steganalysis What is steganalysis?  The art of detecting messages hidden by steganography.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
Bob Sherman, MCSE, CISSP Sinclair Community College Dayton, OH
Russell Taylor Week 3. Image File Formats - TIF, JPG, PNG, GIF - which to use? The three most common and important image file formats for for printing,
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Steganography detection Roland Cmorik, Martin Šumák.
Steganography.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Common file formats  Lesson Objective: Understanding common file formats and their differences.  Learning Outcome:  Describe the type of files which.
Data Compression. Compression? Compression refers to the ways in which the amount of data needed to store an image or other file can be reduced. This.
Image formats. Basic terminologies… Pixels: Pixels are the building blocks of every digital image. a pixel is a single point in a graphic image. Resolutions:
Guide to Computer Forensics and Investigations, Second Edition Chapter 11 Recovering Image Files.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Introduction to Steganalysis Schemes Multimedia Security.
Image File Formats. What is an Image File Format? Image file formats are standard way of organizing and storing of image files. Image files are composed.
Cryptographic Anonymity Project Alan Le
Digital Graphics for Computer Games Pixels Types of Digital Graphics (Raster and Vector) Compression.
Image File Formats By Dr. Rajeev Srivastava 1. Image File Formats Header and Image data. A typical image file format contains two fields namely Dr. Rajeev.
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Information Systems Design and Development Media Types Computing Science.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.
FOOTPRINTING STEGANOGRAPHY.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Component 1.9 Security and Data Management
Digital Steganography
Introduction to Steganography
Sampling, Quantization, Color Models & Indexed Color
Computer Science Higher
Welcome
Raster Images CPSC 1030.
"Digital Media Primer" Yue-Ling Wong, Copyright (c)2013 by Pearson Education, Inc. All rights reserved.
Steganography.
Image File Size and File Compression
Visit for more Learning Resources
Representing Images 2.6 – Data Representation.
Steganography with Digital Images
Steganography in digital images
"Digital Media Primer" Yue-Ling Wong, Copyright (c)2013 by Pearson Education, Inc. All rights reserved.
Image Based Steganography Using LSB Insertion Technique
STEGANOGRAPHY IN IMAGES
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

Digital Steganography Jared Schmidt

In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting steganography OpenPuff Demo Conclusion / Questions

Digital Steganography The art of hiding data in a file so that only the sender and intended recipient suspect the presence of hidden data o A form of security through obscurity Very easy to accomplish Harder to detect and decrypt BMP, JPG, TXT, HTML/XML, PDF, PNG, GIF, AU, WAV, MP3, AVI, TIF, TGA, DLL, EXE

LSB Method Most common form of digital steganography In a RGB image, Information is hidden in the LSB[s] of the RGB values of each pixel o In a 24-bit bitmap, each pixel represented by 3 bytes. 8 bits representing red value = 2^8 = 256 shades of RED 8 bits representing green value = 2^8 = 256 shades of GREEN 8 bits representing blue value = 2^8 = 256 shades of BLUE 16,777,216 possible colors Effectively have 3-4 bits of data to hide information in for every pixel o 32bpp format contains an alpha channel 8 required for ASCII character

Color Perception Changing the LSB of the Red value by 1 (in 24-bit color depth) is undetectable by the human eye. Nokia 808 PureView: 41 megapixel camera phone. 41 megapixels / (3 pixels/byte) = 13.66MB of data can be hidden in a single image.

JPEG Steganography Most common image format o Lossy compression Uses type-II DCT to achieve compression. o Neighboring pixels typically have similar color values. o Information less important to human eye (sharp transitions in brightness, color hue) is discarded Steganographic methods work by manipulating rounding in the DCT coefficient matrix of a JPEG file

JPEG Encoding/Decoding Process

Comparison of JPEG Compression Higher qualityLower Quality A blocking effect occurs with higher compression creating “artifacts”

Network Steganography Modifying network packet’s header or payload o In TCP/IP networks, unused bits in the IP and TCP header may be used Packet based length steganography o Manipulation of the MTU (Maximum Transmission Unit) VoIP - Lost Audio Packets Steganographic Method (LACK) o Transmitter intentionally delays packets by an “excessive” amount of time. o Payload of these lost packets contains the secret information

Uses Individuals or organizations storing sensitive information in steganographic carriers. Layered encryption / decoy data Digital watermarking to verify intellectual ownership or authenticity Open Source Steganography Tools OpenPuff, S-Tools

Illegitimate Uses Terrorist Organizations o Easy form of covert communication o May 16, 2012 – Over 100 Al-Qaeda training manuals and detailed future plots discovered in a porn video found on an operative’s flash drive. Stealing/transmitting confidential data or corporate plans

Finding Steganography on the Web Provos and Honeyman, researchers at the University of Michingan, conducted a scan of 2 million Ebay images and 1 million USENET images in 2001 and found no suspect images. UN report title “Use of Internet for Terrorist Purposes” o Members of a Colombian guerilla group found communicating using steganographic spam s

Steganalysis Analyzing images for possible hidden data Many algorithms perform a statistical analysis to detect anomalies in the cover object o E.g. repetitive patterns could indicate use of a steganography tool or hidden message Investigating pixel “neighborhoods” to find inconsistencies with ways files are compressed.

Problems with Detecting Steganography Impractical to actively scan all internet content for steganography Data is likely encrypted Data can be hidden in certain parts of image or scattered based on a random seed Messages can be hidden in chains of files o Can be hidden in several files using different techniques for each Time consuming

Cover and Stego Image Comparison Original Image (cover)Stego Image (with hidden data)

Conclusion How digital steganography is achieved o Images, audio, video o Network methods (manipulation of packets) Uses of Steganography o Legitimate / Illegitimate How it can be detected o Challenges with detection Questions?