Module Nine - Steganography Highline Community College Seattle University University of Washington in conjunction with the National Science Foundation.

Slides:



Advertisements
Similar presentations
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
BMP Hide ‘n’ Seek What is BMP Hide ‘n’ Seek ? –It’s a tool that lets you hide text messages in BMP files without much visible change in the picture. –Change.
Grover Kearns, PhD, CPA, CFE Class What is Forensic Accounting? Forensic accounting is accounting that is suitable for legal review, offering the.
Steganography and Network Security
What is Steganography? def’n: the art and science of hiding information by embedding it in some other data. cryptography - render message unintelligible.
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Steganography, Steganalysis, & Cryptanalysis
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Steganography Part 2 – Detection and Research. Introduction to Steganalysis What is steganalysis?  The art of detecting messages hidden by steganography.
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
Steganography Rayan Ghamri.
Steganography and Data Hiding Presented for CRIME by Steven Russelle Detective (retired) Forensic Computer Analysis Police Bureau Portland, OR Box 277.
Module 2 Timelines and Such Highline Community College Seattle University University of Washington in conjunction with the National Science Foundation.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
Bob Sherman, MCSE, CISSP Sinclair Community College Dayton, OH
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
Digital Watermarking Parag Agarwal
A Steganography Project Project By: Awadesh Madhogaria.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Digital Steganography
University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot May 2011 May 2011 Steganalysis ITSS 4201 Internet Insurance and Information.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Information Hiding Nattawat Laksanawisit At National Chi Nan University.
IEEE-WVU, Anchorage  1 Steg in the Real World Two examples that move the work of steganalysis out of the lab –The massive data survey of Provos.
Computer Forensics, Steganography and Cryptography and Related Ethical Issues. Edilasio Pereira Russell Braun Team 8.
1 Formatted Text Document Data Hiding Robust to Printing,Copying and Scanning Speaker:Fanjia Yen Adviser:Quincy Wu Date:2008/04/10.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
1.1 Chapter 1 Introduction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
1 Intrusion Detection Auditing, Watermarking Dec 7, 2006 Lecture 10 IS 2150 / TEL 2810 Introduction to Security.
Steganography Yaniv Miron aka Lament 24/5/09. Whois /me Entrepreneur & Organizer of The IL.Hack 2009 Convention Publisher of information security flaws.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
Discrete Mathematical Structures: Theory and Applications 1 Cryptography (advanced extra curricular topic)  Cryptography (from the Greek words Kryptos,
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
FOOTPRINTING STEGANOGRAPHY.
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
2 nd lecture.  Plaintext – ciphertext – encryption – decryption.  Cryptography – cryptanalysis – cryptanalyst – cryptology.  Authentication – Integrity.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Introduction to Steganography
Cracking Encrypted Systems
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
Cryptography And Network Security
STEGANOGRAPHY.
Digital Forensics 2 Lecture 2B: Steg Tools Presented by : J.Silaa
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Digital Forensics 2 (DFC721S)
Information and Network Security
Steganography.
Visit for more Learning Resources
Encryption, Cryptography, and Steganography:
Steganography Techniques and their use in Anonymity
Steganography in digital images
Parag Agarwal Digital Watermarking Parag Agarwal
“Hiding in Plain Sight”
Computer Security Chapter Two
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Module Nine - Steganography Highline Community College Seattle University University of Washington in conjunction with the National Science Foundation

Definition of Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message; this is in contrast to cryptography, where the existence of the message is clear, but the meaning is obscured.

Steg defined The name comes from Johannes Trithemius's Steganographia: a treatise on cryptography and steganography disguised as a book on black magic, and is Greek for "hidden writing." Read more here

Uses of Steganography Watermarking of digital art Other data Data hiding Labels

Basics of Data Hiding Carrier file graphic or other document graphic or other document used to hide the confidential document used to hide the confidential document Hidden file Students can hide a document in a graphic and then hide that graphic in another graphic

Steg tools Truly good steganography tools do not change the size of the carrier file The forensic hash value, however, will change

Finding Hidden Data Your first clue will be the discovery of steganography tools Another clue may be two graphic files of different sizes or different file types It may or may not be password protected It may or may not be encrypted

Feasibility Finding items in files is time consuming Tools such as stegdetect may find them It currently will undo the following techniques jsteg, jsteg, jphide (unix and windows), jphide (unix and windows), invisible secrets, invisible secrets, outguess 01.3b, outguess 01.3b, F5 (header analysis), F5 (header analysis), appendX and camouflage appendX and camouflage

Stegspy hunter.com/stegspydownload.htm hunter.com/stegspydownload.htm Finds items using these methods Hiderman Hiderman JPHideandSeek JPHideandSeek Masker Masker JPegX JPegX Invisible Secrets Invisible Secrets

Other sources ganography/steganalysis.htm ganography/steganalysis.htm /info.html /info.html