What is Steganography? def’n: the art and science of hiding information by embedding it in some other data. cryptography - render message unintelligible.

Slides:



Advertisements
Similar presentations
Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Information Hiding: Watermarking and Steganography
Steganography and Network Security
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
Steganography and Data Hiding. Introduction Steganography is the science of creating hidden messages. Sounds like crypto, but… In traditional crypto,
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Khan, Mohammed Minhajuddin
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Steganography The Art of Hiding Messages
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Module Nine - Steganography Highline Community College Seattle University University of Washington in conjunction with the National Science Foundation.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Covert Channels John Dabney. Covert Channels   “... any communication channel that can be exploited by a process to transfer information in a manner.
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
Reza Mohammadi Shiraz University Of Technology
Steganography detection Roland Cmorik, Martin Šumák.
A Steganography Project Project By: Awadesh Madhogaria.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Information Hiding Nattawat Laksanawisit At National Chi Nan University.
1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
Implementation of Steganographic Techniques Danny Friedheim pd. 2.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
FOOTPRINTING STEGANOGRAPHY.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
2 nd lecture.  Plaintext – ciphertext – encryption – decryption.  Cryptography – cryptanalysis – cryptanalyst – cryptology.  Authentication – Integrity.
Introduction to Steganography
Steganography in WebP image using LSB embedding
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Steganography Example
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Steganography.
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
Steganography Techniques and their use in Anonymity
Parag Agarwal Digital Watermarking Parag Agarwal
Unit 2- Lesson 1 & 2- Bytes and File Sizes / Text Compression
Information Hiding and Its Applications
STEGANOGRAPHY IN IMAGES
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

What is Steganography? def’n: the art and science of hiding information by embedding it in some other data. cryptography - render message unintelligible steganography - conceal the existence of the message

Some History Steganographica, Gaspari Schotti 400 B.C. - writings of Herodotus The Pigeon Post into Paris “Steganographia”, Trithemius - steganography and magic A Beautiful Mind

Low-tech Methods of Steganography Message hidden Message hidden as Message written in invisible ink ID# etched into

The cover provides a host for transporting the hidden info. info embed -file extract info

Digital Steganography HTML message as cover? computer program as cover? network protocol headers white space in text unused space in buffer least significant bits of image slight distortion in sound file “Easter eggs”

Easter egg from the Simpsons In episode 7F19, Dustin Hoffman supplied the voice for Lisa's substitute teacher, but was not credited on screen. Instead, they used the phony name Sam Etic. In the next season (episode 7F24), Michael Jackson supplied the voice for a man in an insane asylum that thought he was Michael Jackson. Due to contractual obligations, they were unable to give Jackson on-screen credit. Instead, the show credited John Jay Smith, another person that doesn't exist. The egg lies in episode 9F09 when Lisa says, "It was the greatest movie I've ever seen in my life! And you wouldn't believe the celebrities who did cameos. Dustin Hoffman, Michael Jackson...of course they didn't use their real names, but you could tell it was them."

Steganography in Images Two types of compression: lossless (gif) lossy (jpeg) Sometimes concealed message inserted as a comment. Sometimes the accuracy of the image is sacrificed slightly. Common Tools StegoDOS White Noise Storm S-tools outguess steghide

Three Types of Steganography 1) Covert Channel conceal message so only sender and recipient know Watermarking concealed message contains its source ID 2) ___________ Watermarking designed for concealed message to survive 3) (Semi-)___________ Watermarking designed so concealment is corrupted whenever stego-file is modified.

Applications of Steganography Covert exchange of information Establish identity Combat illegal copying Steg____________ How would you? Comparison of files for statistical differences What files are available?