Overview of Digital Stenography

Slides:



Advertisements
Similar presentations
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Advertisements

Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Information Hiding: Watermarking and Steganography
Steganography and Network Security
Steganography and Data Hiding. Introduction Steganography is the science of creating hidden messages. Sounds like crypto, but… In traditional crypto,
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Khan, Mohammed Minhajuddin
Pictures Worth More Than 1000 Words
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Survey on Information Assurance TEL 581 Presented by Viswesh Prabhu Subramanian Gregory Michel Lincoln Jean Louis Steganography.
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Steganography detection Roland Cmorik, Martin Šumák.
A Steganography Project Project By: Awadesh Madhogaria.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Information Security Principles (ESGD4222)
Steganography “Hiding in Plain Sight” Gary Alan Davis, D.Sc. Department of Computer & Information Systems.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Have you ever wanted to hide something from: Your friends? Your family? The Government?
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
FOOTPRINTING STEGANOGRAPHY.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
STEGANOGRAPHY Sibaka Mahapatra Computer Science 3rd Year, Sec-E
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Steganography Nathan Shirley
Digital Steganography
Introduction to Steganography
Steganography Nathan Shirley
Welcome
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Computers Talk Binary.
Steganography.
Steganography & Digital Watermarfking
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
Steganography Techniques and their use in Anonymity
UIT Unconference December 06, 2018 Ian Redzic
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Overview of Digital Stenography Sheila Jeruto Magut CS5910,Fall 2010

Table of Contents Introduction What is Stenography History Stenographic Techniques Digital Steganography Methods Practical Uses Comparison with Cryptography Detection and Countermeasures Conclusion Sheila Magut CS5910 Fall 2010

Introduction Definition : The art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message http://en.wikipedia.org/wiki/Steganography A form of security through obscurity Sheila Magut CS5910 Fall 2010

History Early Steganography Early Greeks used Steganography : Shaved head of slave and tattooed a message. When hair grew back, slave sent to deliver the message. Inscribed message on wooden tablet and covered it with wax Sheila Magut CS5910 Fall 2010

Stenography Techniques Physical steganography Using a physical medium to hide messages with Network steganography Involves taking advantage of communication protocols Printed steganography Example : picture you stare at for a long time trying to see the image and your eyes finally adjust to it and you see a different shape appear out of the image Sheila Magut CS5910 Fall 2010

Stenography Techniques contd.. Digital Steganography : hiding data within data(i.e document file, image file, program or protocol) Replacing bits/bytes that are not hidden with secret information Sheila Magut CS5910 Fall 2010

Digital Steganography Methods Steganography in Images Hiding information in pictures Uses LSB (Least Significant Byte) method Red, Green, and Blue (8 bits each) for every pixel in Bitmap image replace last bit(s) of each RGB value with bit(s) from the secret message or replace every nth pixel with value of message Sheila Magut CS5910 Fall 2010

Digital Steganography Methods Steganography in Images contd… Example: this map of an airport………. Sheila Magut CS5910 Fall 2010

Digital Steganography Methods Steganography in Images contd… is embedded in this image Sheila Magut CS5910 Fall 2010

Digital Steganography Methods Steganography in Audio Depending on type of file Replace last bit(s) with bit(s) from the secret message Encode during compression Sheila Magut CS5910 Fall 2010

Digital Steganography Methods Steganography in Other ways Text (Null Ciphers) Use normal text to but change every nth letter of every mth work Example : “To human eyes, data usually contains known forms, like images, e-mail, sounds, and text. Most Internet data naturally includes gratuitous headers, too. These are media exploited using new controversial logical encodings: steganography and marking” Take first letter of every word. Reads “The duck flies at midnight. Tame uncle sam” Combining Cryptography with Steganography Sheila Magut CS5910 Fall 2010

Practical Uses Watermarking Branding/Copyright Identifier hidden in an image to track source Branding/Copyright Example: HP and Xerox printers. Tiny dots containing printer serial numbers on pages Alleged use by terrorist Alleged use in planning of 9/11 attacks Alleged use by intelligence services Alleged used by Russian foreign intelligence service to communicate with spies Sheila Magut CS5910 Fall 2010

Comparison with Cryptography Unlike cryptography, steganography conceals the fact that hidden information exists Different goals: Cryptography: prevent unintended recipient from knowing intended meaning of the message Steganography: prevent unintended recipient from suspecting that the hidden message even exists Sheila Magut CS5910 Fall 2010

Detection and Countermeasures Very difficult to do. Steganalysis : detection of steganographically encoded packages in computing Some tools available Stegdetect : compares images sets Gargoyle : determine probability of a medium being encoded Sheila Magut CS5910 Fall 2010

Conclusion Steganography ancient but still very much in use Digital advancement brings new methods of digital steganography Not to be confused with cryptography Cryptography : security through encryption Steganography : security through obscurity Sheila Magut CS5910 Fall 2010