Steganography and Data Hiding. Introduction Steganography is the science of creating hidden messages. Sounds like crypto, but… In traditional crypto,

Slides:



Advertisements
Similar presentations
Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Information Hiding: Watermarking and Steganography
Steganography and Network Security
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
Khan, Mohammed Minhajuddin
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Survey on Information Assurance TEL 581 Presented by Viswesh Prabhu Subramanian Gregory Michel Lincoln Jean Louis Steganography.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Watermarking Relational Databases CSC 574/474 Information System Security.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
© Keith Vander Linden, 2005 Jeremy D. Frens, Open up the box of a computer, and you won't find any numbers in there. You'll find electromagnetic.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
© Keith Vander Linden, 2005 Jeremy D. Frens, Open up the box of a computer, and you won't find any numbers in there. You'll find electromagnetic.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
Classical Crypto By: Luong-Sorin VA, IMIT Dith Nimol, IMIT.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
University of Massachusetts Amherst · Department of Computer Science Square Root Law for Communication with Low Probability of Detection on AWGN Channels.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
Software Security Seminar - 1 Chapter 10. Using Algorithms 발표자 : 이장원 Applied Cryptography.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Introduction to Steganography
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Computers Talk Binary.
Steganography.
Visit for more Learning Resources
Encryption, Cryptography, and Steganography:
Parag Agarwal Digital Watermarking Parag Agarwal
STEGANOGRAPHY IN IMAGES
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

Steganography and Data Hiding

Introduction Steganography is the science of creating hidden messages. Sounds like crypto, but… In traditional crypto, the challenge is to obscure the contents of a message from an adversary. Steganography seeks to obscure the very existence of the message itself. It’s often used in tandem with crypto: crypto obscures the message, then steganography is used to conceal the message’s existence. Why is this necessary? For applications where the existence of a transmission is incriminating, whether or not the transmission can be decrypted and read.

History Ancient Greece: –messages etched on wood, covered with wax to make tablet look unused. –Herodotus tells of tattooing message on a messenger’s shaved head, waiting for his hair to regrow, sending him off. World War II: –disappearing inks and microdots used by operatives to conceal transmissions. Recent Developments: –U.S. Military uses “spread spectrum” radio transmissions to prevent detection and jamming. –October 2001: NY Times reports Al-Qaeda may have used steganography to hide transmissions related to 9/11. Unsubstantiated, but has gotten a lot of attention.

Modern Stego Methodology ciphertext + covertext stegotext ciphertext plaintext encryption decryption injection recovery

Example: Hiding a Message in a Bitmap 24 Bit RGB Bitmap uses 8 bits of red, blue, and green intensity to describe the color of a pixel. A blue pixel might look like: ( , , ) Suppose we want to conceal the data “101” Overwrite the least significant bits of the color values with the bits representing our data: ( , , )  ( , , ) The difference in 1 bit of color intensity is imperceptible to the human eye. Three pixels can hide one ASCII character (7 bits) What if we overwrote more digits?

Example: Hiding a Message in a Bitmap Original Image1 bit-plane used 5 bit-plane used7 bit-plane used

Other Implementations Using graphics as a covertext is currently getting a lot of attention because of the Times article & fears of terrorists using eBay to transmit messages But there’s virtually an unlimited number of alternatives. Freeware programs available that hide data in: –MP3 audio –MPEG video –HTML files –PDF files –ASCII text –Spam! (

Steganalysis Cryptography has cryptanalysis, steganography has steganalysis. Governments & companies are very interested in finding stego messages. Inherent difficulty of steganalysis: there’s usually a set of potential covertexts (i.e. eBay, the personals), but little info about which of them carry a payload. Not only that, but… –the volume of potential covertexts may be enormous. –there’s usually no “clean” file available for comparison. –the payload is probably encrypted – how will you know if you’ve found it? –adversary may purposely encode noise, irrelevant data. One useful attack is statistical analysis: find “unlikely” compression artifacts in JPEGs, for instance.

Steganalysis: A Thought Experiment Isn’t steganography just security through obscurity? Suppose Bob is using steganography to hide a message in an MPEG he posts on his website. Charley, the adversary, knows that the MPEG probably contains a payload, and even knows the stego algorithm Bob is using. He wins, right? What’s a one-time pad? Bob used a one-time time pad to encode each bit of the message in the n th pixel of the k th frame of the MPEG, where n, k are taken from the pad. Alice downloads the MPEG from Bob’s website, uses her one-time pad to recover the message.

Steganalysis: A Thought Experiment Charley is screwed –one-time pad means Charley doesn’t know which frames and pixels store part of the ciphertext. –statistical analysis is unlikely to help: too much entropy in an MPEG to find which pixel in which frame is “suspicious” –even if Charley is a quantum computer from the future and can try all stego keys instantly, he will only get back the set of all possible messages Bob could have encoded. –Charley can try to destroy the message by compressing the MPEG and dropping random frames, but data density is low and Bob might be using redundancy, error correction codes. recovered ciphertext

Watermarking Why would Charley want to destroy the message instead of recovering it? Suppose Bob isn’t a terrorist, but is instead a content provider who wants to watermark his content. It’s unclear how much stego is being used to communicate today, for all the reasons we’ve mentioned, but watermarking is a huge issue. Who needs watermarks? MPAA, Margaret Thatcher. Ideal watermark is imperceptible to a discriminating user, but is impossible to detect or destroy. It’s a subset of steganography where the adversary attempts to purge the covertext of its payload.

Watermarking Unfortunately for content providers, it’s much easier to degrade steganography than to crack it. –inherent property of compression: removes redundancy. –if you make an unobtrusive watermark in a photo (1 bit plane encoding, for instance), simple compression should be able to get rid of it while preserving the image. –don’t need to know the location of the watermark to cripple it: can attack it indirectly, or add enough noise to make it impossible to recover the true mark. i.e. Margaret Thatcher’s ministers could have put random spaces into the documents they wanted to leak. –tradeoff: can make the watermark harder to remove/degrade, but the more bits you use, the more the content is degraded. Digimarc is a leading provider of image watermarking services. Digimarc spiders crawl the web, looking for marked content. –“watermarks can survive copying, renaming, file format changes, rotation and a range of compression and scaling.” –what about cropping, slightly changing color balance, etc.?

Conclusions Who wins from steganography? criminalsgovernmentpirates Who loses from steganography? governmentcorporationsartists