By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.

Slides:



Advertisements
Similar presentations
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Information Hiding: Watermarking and Steganography
Steganography and Network Security
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Khan, Mohammed Minhajuddin
Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed By: Randy Grubb Armstrong Atlantic State University – Cyber.
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Survey on Information Assurance TEL 581 Presented by Viswesh Prabhu Subramanian Gregory Michel Lincoln Jean Louis Steganography.
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Reza Mohammadi Shiraz University Of Technology
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Steganography “Hiding in Plain Sight” Gary Alan Davis, D.Sc. Department of Computer & Information Systems.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss Authors: Avinash Srinivasan, Jie Wu, and Justin.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
FOOTPRINTING STEGANOGRAPHY.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
2 nd lecture.  Plaintext – ciphertext – encryption – decryption.  Cryptography – cryptanalysis – cryptanalyst – cryptology.  Authentication – Integrity.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Introduction to Steganography
Welcome
Steganography Example
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Computers Talk Binary.
Steganography.
Khan, Mohammed Minhajuddin
Steganography ETPRO 2010.
Steganography Techniques and their use in Anonymity
“Hiding in Plain Sight”
Image Based Steganography Using LSB Insertion Technique
STEGANOGRAPHY IN IMAGES
Presentation transcript:

By Colton Delman COSC 316

Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many different binary file formats/ object in such a way that it will not be noticed Watermarks –Watermarking an image is the same thing and using the same technology and methods –Used to deal with digital rights, protect information, and conceal trade secrets –Copyright protection

Dates back to when man first began to publish books Ancient Greeks melted wax from their wax message tablets and scratched their covert communication on the wood of the tablet itself –This replacing the wax on the surface when done Shaved head of slaves, tattooed message to head, and sent slave with hair grown back

–Known:.bmp.jpg.gif.png.html.pcx.pdf.wav.mp3.au text documents Network traffic executables Most commonly in picture files

Text files –ex. Legal/business documents Other pictures –ex. Pictures of child pornography Messages Place ment zone

Most programs are simple drag and drop –Open original file –Drag and drop hidden file into original –save as new file LSB method –Least Significant Bit Append Method Encrypt and append file to end of the original file Plus encryption/password for the file

modifies the 1’s and 0’s from the secret message and inserts those into each pixel of an image, starting at the bit lest likely to make a noticeable change to the color of the pixel This changes the color so slightly that the human eye cant tell the difference

Used to transfer secret messages/data covertly –ex: trade secrets stolen from business by insider, sent to rival company via hidden document in a image in –Ex: sharing of child pornography hidden in normal images Freeware –S-Tools –JP Hide-and-Seek –Gif-it-up –wbStego4 Detection Software available –Stego Analyst™ –Gargoyle –Stego Watch –Stego Break –StegAlyzerAS –StegAlyzerRTS –StegAlyzerSS

Has been connected to the distribution of child pornography Secret message communication system for terrorist groups Stealing of government/corporate documents Files are hard to detect and go through firewalls

Unless program used is high end most of the time the file size changes dramatically (when compared to original file) But not always the case Simple algorithms and encryption but could lead to more robust forms Detection software confuses watermarks and legit files with legit Steganography files File size is limited for hidden files –Carrier file dictates amount of space for hidden data –Usually 25-30% of the size of carrier file –Anymore then that = high probability of detection

PhotoCrypt S-Tools4 The Third Eye winhip

Harris, Shon. "Steganography." CISSP All-in -One Exam Guide. Third ed. Emeryville: McGraw- Hill/Osborne, Print. McNamara, Joel. "Steganography." Secrets of Computer Espionage: Tactics and Countermeasures. Indianapolis, IN: Wiley, Print. Rogers, Russ. "Covert Channels." Hacking a Terror Network: The Silent Threat of Covert Channels. Rockland, MA: Syngress, Print. Rogers, Russ. "The Future of Steganography." Hacking a Terror Network: The Silent Threat of Covert Channels. Rockland, MA: Syngress, Print. Steganography and digital watermarking resource links, Johnson & Johnson Technology Consultants “Steganography Revealed,” by Kristy Westphal, SecurityFocus ( April 8, 2003)