Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.

Slides:



Advertisements
Similar presentations
Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
Advertisements

Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
F5 A Steganographic Algorithm
Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Information Hiding: Watermarking and Steganography
Watermarking & Steganography
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
Khan, Mohammed Minhajuddin
Watermarking & Steganography Sanjay Goel University at Albany, SUNY.
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Survey on Information Assurance TEL 581 Presented by Viswesh Prabhu Subramanian Gregory Michel Lincoln Jean Louis Steganography.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Video Data Hiding using Forbidden Zone and Selective Embedding Submitted Under Team Members.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Steganography Leo Lee CS 265, Section 2 Dr. Stamp April 5, 2004.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
Implementation of Steganographic Techniques Danny Friedheim pd. 2.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.
FOOTPRINTING STEGANOGRAPHY.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
STEGANOGRAPHY Sibaka Mahapatra Computer Science 3rd Year, Sec-E
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Introduction to Steganography
Steganography in WebP image using LSB embedding
Welcome
Steganography Example
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Computers Talk Binary.
Steganography.
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
Steganography Techniques and their use in Anonymity
Information Hiding and Its Applications
Image Based Steganography Using LSB Insertion Technique
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text or an image is inserted into another image. However there are permutations where video is hidden in another video, or sound in sound or even sound in video. The image/sound/video that the underlying message is hidden in is referred to as a carrier or cover file or signal. The most common implementation of steganography utilizes the least significant bits in a file in order to store data. By altering the least significant bit one can hide additional data without altering the original file in any noticeable way.

Historical Steganography The ancient Chinese wrapped notes in wax and swallowed them for transport. In ancient Greece a messenger’s head might be shaved, a message written on his head, then his hair was allowed to grow back. In 1518 Johannes Trithmeus wrote a book on cryptography and described a technique where a message was hidden by having each letter taken as a word from a specific column.

Historical Steganography - Continued During WW II the French Resistance sent messages written on the backs of couriers using invisible ink Microdots are images/undeveloped film the size of a typewriter period, embedded on an innocuous documents. These were said to be used by spy's during the Cold War.

Steganography Terms Steganophony - the concealment of messages in Voice-over-IP conversations. Payload is the data to be covertly communicated. The carrier is the signal, stream, or data file into which the payload is hidden. This is also sometimes called the cover object. The channel is the type of medium used.

Steganography details With least significant bit (lsb) replacement, certain bits in the carrier file are replaced.

Other forms of Steganography Echo Hiding: This method adds extra sound to an echo inside an audio file, that extra sound conceals information. Discrete Cosine Transform is often used for Video steganography. This method alters values of certain parts of the individual frames. The usual method is to round up the values.

Demonstration I began with an image, a jpeg that was 68.3 K in size.

Demonstration Continued I took a text document that was 3,741 words/ 26 KB and hid it in this image using various tools. Using Invisible Secrets the resulting image was 77.4 KB, an increase of 9.1 KB. Using QuickStego the resulting image was a 520 KB bitmap, a more than 7 fold increase.

Steganography Implementations QuickStego – very easy to use but very limited. Invisible Secrets – much more robust with both a free and commercial version. MP3Stego – specifically for hiding payload in MP3 files. Snow – hides data in whitespace. StegVideo – hides data in a video sequence.

Steganalysis By analyzing changes in an image's close color pairs, the steganalyst can determine if LSB substitution was used. Close color pairs consist of two colors whose binary values differ only in the LSB.

Steganalysis - RQP The Raw Quick Pair method Based on statistics of the numbers of unique colors and close-color pairs in a 24-bit image. Analyzes the pairs of colors created by LSB embedding Countermeasure - Maintaining the color palette without creating new colors

Steganalysis - Chi-Square Analysis Chi-Square Analysis calculates the average LSB and builds a table of frequencies and Pair of Values. Then it performs a chi-square test on these two tables. Essentially it measures the theoretical vs. calculated population difference

Steganalysis - Audio Steganalysis Examine noise distortion in the carrier file. Noise distortion could indicate the presence of a hidden signal.

Steganography Detection Tools Outguess’s StegDetect is an easy to use but limited tool http://www.outguess.org/detection.php StegSpy has fewer limitations than StegDetect http://www.spy- hunter.com/stegspydownload.htm AccessData's Forensic Toolkit and Guidence Software’s Encase can detect steganography.

Detection Demo I used StegDetect on both files. It errorred out on the jpeg and could not read the bitmap. I used StegSpy and it discovered the bitmap stegonography but not the jpeg.

Distributed Steganography Provisional Patent 61/379,087 http://ip.com/IPCOM/000204600

Distributed Steganography (Continued)

Distributed Steganography (Continued)

Additional Resources A white paper on a steganographic method http://www.scribd.com/doc/3367439/Steganography ABC story on steganography http://www.abc.net.au/catalyst/stories/s1320215.htm Technical paper on steganography http://www.jjtc.com/stegdoc/ ComputerWorld article on steganography http://www.computerworld.com/s/article/71726/Steganography_Hi dden_Data RQP Paper - http://www.ws.binghamton.edu/fridrich/Research/acm_2001_03.pd f Detection of LSB steganography http://www.cecs.uci.edu/~papers/icme06/pdfs/0001377.pdf Detection of audio steganography http://www.ece.ucdavis.edu/~yliu/pub/papers/Tracy_ISC08.pdf