STEGANOGRAPHY IN IMAGES

Slides:



Advertisements
Similar presentations
Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
BMP Hide ‘n’ Seek What is BMP Hide ‘n’ Seek ? –It’s a tool that lets you hide text messages in BMP files without much visible change in the picture. –Change.
F5 A Steganographic Algorithm
Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Steganography and Network Security
Khan, Mohammed Minhajuddin
Steganography The Art of Hiding Messages
Skills: none Concepts: the amount of information in an image This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 License.
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Have you ever wanted to hide something from: Your friends? Your family? The Government?
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Computer Concepts 2014 Chapter 8 Digital Media. 8 Chapter Contents  Section B: Bitmap Graphics  Section C: Vector and 3-D Graphics Chapter 8: Digital.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Graphic Format Factors
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization G. Sahoo1 and R. K. Tiwari2 Presented by Pan Meng.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
FOOTPRINTING STEGANOGRAPHY.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Introduction to Steganography
Steganography in WebP image using LSB embedding
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Steganography Example
1.01 Investigate graphic types and file formats.
Computers Talk Binary.
Steganography.
Steganography & Digital Watermarfking
Department of Computer and Information Sciences
Visit for more Learning Resources
WYSIWG – not quite More than displayed information in files
Khan, Mohammed Minhajuddin
Parag Agarwal Digital Watermarking Parag Agarwal
WYSIWG – not quite More than displayed information in files
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

STEGANOGRAPHY IN IMAGES - annie calpe

OVERVIEW Steganography Defined Examples in History Digital Approaches Reasons For Using Digital Images Image Attributes Popular Techniques That Use Images

STEGANOGRAPHY DEFINED Greek for “covered writing” “The art and science of writing hidden messages in such a way that no one apart from the intended recipient even knows that a message has been sent.”

EXAMPLES IN HISTORY Tattoos on shaved heads Wax-covered tablets Microdots – shrunken pictures Invisible Inks - milk, fruit juice, urine

DIGITAL APPROACHES Today, it often exists within digital formats It makes use of seemingly innocent cover files such as text, audio, and image files The embedded message may be anything that can be encoded in binary

REASONS FOR USING DIGITAL IMAGES It is the most widely used medium being used today Takes advantage of our limited visual perception of colors This field is expected to continually grow as computer graphics power also grows Many programs are available to apply steganography

IMAGE ATTRIBUTES Digital images are made up of pixels The arrangement of pixels make up the image’s “raster data” 8-bit and 24-bit images are common The larger the image size, the more information you can hide. However, larger images may require compression to avoid detection

IMAGE-BASED TECHNIQUES Least Significant Bit Insertion Masking and Filtering

LSB INSERTION Replaces least significant bits with the message to be encoded Most popular technique when dealing with images Simple, but susceptible to lossy compression and image manipulation

LSB - Example A sample raster data for 3 pixels (9 bytes) may be: Inserting the binary value for A (10000001) changes 4 bits 00100111 11101001 11001000 00100111 11001000 11101001 11001000 00100111 11101011 00100111 11101000 11001000 00100110 11001000 11101000 11001001 00100111 11101011

LSB Continued… Best to use a grayscale palette or one with gradual changes in shades Otherwise, it is best to use images with “noisy areas” – areas with ample color variation and without large areas of solid color

GRAYSCALE PALETTE

NEBULA PALETTE

“NOISY AREAS” - Example Renoir painting

LSB - Uses Storing passwords and/or other confidential information Covert communication of sensitive data Speculated uses in terrorist activities Being widely used to hide and/or transfer illegal content

MASKING & FILTERING Masks secret data over the original data by changing the luminance of particular areas During masking, it embed the message within significant bits of the cover image Not susceptible to lossy techniques because image manipulation does not affect the secret message

MASKING & FILTERING - Uses Digital Watermarking – provides identification pertaining to the owner; i.e. license or copyright information - Invisible vs Visible Fingerprinting – provides identification of the user; used to identify and track illegal use of content

Visible Watermark - Example

SUMMARY Steganography as a whole has existed in many forms throughout much of history. Lossless compression of images with a great deal of color variation work best as a cover image to embed a message. Steganography can be used as benefitial tool for privacy.

REFERENCES Wikipedia Exploring Steganography: Seeing the Unseen – N. Johnson & S. Jajodia www.jjtc.com/stegdoc/steg1995.html Information Hiding: Techniques for Steganography and Digital Watermarking” – S. Katzenbeisser, F. Petitcolas Digital Watermarking – H. Bergel, L. O’Gorman