Steganography Rayan Ghamri.

Slides:



Advertisements
Similar presentations
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Advertisements

Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
An Introduction to Steganography
Steganography and Network Security
An Introduction Steganography with A Case Study of Steganalysis
Khan, Mohammed Minhajuddin
1 Adnan Gutub Computer Engineering King Fahd University of Petroleum & Minerals Saudi Arabia A Novel Arabic Text Steganography Method Using Letter Points.
Security 3 Distributed Systems Lecture # 16. Overview Steganography Digital Watermarking.
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
One possible way to encode information in text is print it in two slightly different typefaces. The secret message is decoded by ignoring one of the typefaces.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Chapter 11 Fluency with Information Technology 4 th edition by Lawrence Snyder (slides by Deborah Woodall : 1.
1 Perception, Illusion and VR HNRS 299, Spring 2008 Lecture 14 Introduction to Computer Graphics.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Steganography. Outline What is Steganography? History Steganography used nowadays? Terms Steganography methods Steganography Available Software Steganalysis.
Have you ever wanted to hide something from: Your friends? Your family? The Government?
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Information Hiding Nattawat Laksanawisit At National Chi Nan University.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
Topic 10a Introduction to Steganography 454 NOTE: some of the enclosed information was adapted from slides created by Professor Gary C. Kessler of Champlain.
Steganography Leo Lee CS 265, Section 2 Dr. Stamp April 5, 2004.
Cryptographic Anonymity Project Alan Le
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Information in Computers. Remember Computers Execute algorithms Need to be told what to do And to whom to do it.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
Steganography Ryan Albright.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
STEGANOGRAPHY Sibaka Mahapatra Computer Science 3rd Year, Sec-E
2 nd lecture.  Plaintext – ciphertext – encryption – decryption.  Cryptography – cryptanalysis – cryptanalyst – cryptology.  Authentication – Integrity.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Introduction to Steganography
Vocabulary byte - The technical term for 8 bits of data.
Computer Science Higher
Welcome
Steganography Example
Vocabulary byte - The technical term for 8 bits of data.
Computers Talk Binary.
Steganography.
Steganography & Digital Watermarfking
Department of Computer and Information Sciences
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
Steganography Techniques and their use in Anonymity
“Hiding in Plain Sight”
STEGANOGRAPHY IN IMAGES
Chapter 1: Introduction
Presentation transcript:

Steganography Rayan Ghamri

Introduction Steganography from the Greek word steganos meaning “covered” and the Greek word graphie meaning “writing” Steganography is the process of hiding of a secret message within an ordinary message and extracting it at its destination Anyone else viewing the message will fail to know it contains hidden/encrypted data

Cryptography VS Steganography Steganography is the science of hiding information in such a way that no one suspects the information exists. With cryptography the information is known to exist, but it is encoded in such a way that only the intended recipient can read it. Steganography is usually combined with cryptography.

Continued

Steganography - Carrier Files bmp jpeg gif wav mp3

Why Images? It is the most widely used medium being used today Takes advantage of our limited visual perception of colors This field is expected to continually grow as computer graphics power also grows Many programs are available to apply steganography

Some tools: Steganos S-Tools (GIF, JPEG) StegHide (WAV, BMP) Invisible Secrets (JPEG) JPHide Camouflage Hiderman And many others…

Why Images.. Digital images are made up of pixels The arrangement of pixels make up the image’s “raster data” 8-bit and 24-bit images are common The larger the image size, the more information you can hide.

Why Steganography… Hiding data is better than moving it shown and encrypted. To hide data in a popular object that will not attract any attention. In case the data is extracted, it will be encrypted.

Steganography Techniques Physical Printed Digital (Modern)

Examples in History (Physical) Tattoos on shaved heads Wax-covered tablets Microdots – shrunken pictures Invisible Inks - milk, fruit juice.

Printed Steganography These messages were sent by the German embassy in World War I. This is called a null cipher. PRESIDENT'S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT IMMENSELY. APPARENTLY NEUTRAL'S PROTEST IS THOROUGHLY DISCOUNTED AND IGNORED. ISMAN HARD HIT. BLOCKADE ISSUE AFFECTS PRETEXT FOR EMBARGO ON BYPRODUCTS, EJECTING SUETS AND VEGETABLE OILS. Taking the first letter in each word of message 1 or second letter in message 2 reveals the hidden text. PERSHING SAILS FROM NY JUNE 1.

Digital Steganography Modern digital steganography data is encrypted then inserted and hidden, using a special algorithm which may add and/or modify the contents of the file This technique may simply append the data to the file, or disperse it throughout Carefully crafted programs apply the encrypted data such that patterns appear normal.

Example: Left image is original JPEG file Right image is with hidden message

Methods for hiding data in Digital Image: Least significant bit (LSB) Discrete Cosine Transform (DCT)

Least significant bit (LSB) Replaces least significant bits with the message to be encoded Most popular technique when dealing with images Simple, but susceptible to lossy compression and image manipulation

Example for LSB The simplest and most common type of steganography is LSB (least significant bit). The one’s bit of a byte is used to encode the hidden information. Suppose we want to encode the letter A (ASCII 65 or binary 01000001) in the following 8 bytes of a carrier file. 01011101 11010000 00011100 10101100 11100111 10000111 01101011 11100011 becomes 01011100 11010001 00011100 10101100 11100110 10000110 01101010 11100011

RGB Color Model in Image Files red, green, and blue light are added together in various ways to reproduce a broad array of colors. (0, 0, 0) is black (255, 255, 255) is white (255, 0, 0) is red (0, 255, 0) is green (0, 0, 255) is blue (255, 255, 0) is yellow (0, 255, 255) is cyan (255, 0, 255) is magenta

N color bytes = N *1/8 message bytes Encoding Process Step 1: Convert image to pixels. Then these pixels split to R, G and B bytes Step 2: In this step secret message is converted to bytes. Step 3: Actual data hiding occurs when each bit of secret message is inserted to least significant bit of color byte. So one byte of message is inserted in 8 color bytes. By using this formula N color bytes = N *1/8 message bytes

Example..

Example..

Methods of detecting Visual Detection (JPEG, BMP, GIF, etc.) Audible Detection (WAV, MPEG, etc.) Structural Detection - View file properties/contents size difference date/time difference

Decoding algorithm

Finally.. Steganography as a whole has existed in many forms throughout much of history. Lossless compression of images with a great deal of color variation work best as a cover image to embed a message. Steganography can be used as benefitial tool for privacy.