Have you ever wanted to hide something from: Your friends? Your family? The Government?

Slides:



Advertisements
Similar presentations
Looking At Other Digipacks/CD‘s
Advertisements

Starter for 10 Unit 9: Using a digital or video camera Transform IT SFT09_camera_video.
BMP Hide ‘n’ Seek What is BMP Hide ‘n’ Seek ? –It’s a tool that lets you hide text messages in BMP files without much visible change in the picture. –Change.
Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Why Does Our Mind See Illusions?
Steganography and Network Security
This would be the area for your title Authors, authors authors Department of XXXXXXXXXXXX, University of North Dakota School of Medicine & Health Sciences.
Overview of Digital Stenography
Computer Vision. How would a human think of this picture? We might think of this picture as something like “an orange smiley face with black eyes, lighter.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
{ Etiquette Handbook. Feature Creating an Font, colour and sizes etc Sending an Sending using Cc Sending using Bcc Creating a signature.
Create your first document
Binary “There are 10 types of people in the world… those that understand binary and those that don’t.”
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
The workspace for your life’s work! Download EVERNOTE from the App Store or from 1- Create a New Notebook Create.
Adding Content To Your Faculty Page 1.Login 2.Create your Faculty Page 3.
Microsoft ® Office Word 2007 Training Create Your First Document ICT Staff Development presents:
This would be the area for your title, which should be at least 72 ppi tall, which is equal to one inch (this is 87 point). This font is 72 ppi. If you.
Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:
How to use the internet The internet is a wide ranging network that thousands of people use everyday. It is a useful tool in modern society that once one.
Binary Arithmetic In today’s lesson we will look at: a reminder of how binary works adding binary numbers overflow complements negative numbers and subtraction.
Thursday, 15 October 2015 PowerPoint Tips 3 Click your level above smart smarter smartest Press escape on the keyboard to close this presentation. This.
Fraction Easy for you!!
Digital Media Lecture 3: Image Encoding Bitmapped images Georgia Gwinnett College School of Science and Technology Dr. Jim Rowan.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
Data Representation The storage of Text Numbers Graphics.
Photo Story Creating your own!. What is Photo Story? Photo Story is a way to create slideshows with added narration, effects, transitions and background.
Sight Words.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Higher Dimensions. x Let's say we use a pencil to mark a point on paper. x is this point. We pick a direction and move the pencil along this direction.
BBC One Ident Research. BBC Eastenders Ident This Ident appeals to me because I think it is good how they use a show of theirs as there Ident. It appeals.
Cryptographic Anonymity Project Alan Le
Know what a computer is used for Understand the difference between hardware and software Be able to describe the way that data is stored in a computer.
Data Representation. How is data stored on a computer? Registers, main memory, etc. consists of grids of transistors Transistors are in one of two states,
A Principle of Design.  The principle of proximity states that you group related items together, move them physically close to each other, so the related.
BINARY Toby Wilson. LEARNING OBJECTIVES  Be able to convert binary to denary  Be able to convert denary into binary  Be able to explain how computers.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
screen shots Emma Jarman. Adding attachments What is an attachment? An attachment is an that has a file attached to it. The file could be.
Information in Computers. Remember Computers Execute algorithms Need to be told what to do And to whom to do it.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
Grid Method For Drawing. Using a ruler, measure and make marks ½” apart across the bottom of the picture. You may use your pencil to draw right on the.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
Steganography Example
Computers Talk Binary.
This would be the area for your title, which should be at least 72 ppi tall, which is equal to one inch (this is 87 points). This font is 72 ppi. If you.
This would be the area for your title Authors, authors authors Department of XXXXXXXXXXXX, University of North Dakota School of Medicine & Health Sciences.
Andrew Hanson & Michael de Podesta
Introduce as appropriate, and explain this assembly will be all about understanding our feelings and how we cope with them.
What do these words mean to you?
This would be the area for your title, which should be at least 72 ppi tall, which is equal to one inch (this is 100 points). This font is 72 ppi. If.
Scientific Notation 1) Students will write numbers in scientific notation. 2) Students will write numbers in standard form. Lesson objectives Teachers'
Steganography ETPRO 2010.
Fundamentals of Data Representation
Go to =>
Why Does Our Mind See Illusions?
Why Does Our Mind See Illusions?
Why Does Our Mind See Illusions?
Creating a Simple Game in Scratch
STEGANOGRAPHY IN IMAGES
Year 8 Unit 2 Bitmap Graphics
This would be the area for your title Authors, authors authors Department of XXXXXXXXXXXX, University of North Dakota School of Medicine & Health Sciences.
This would be the area for your title, which should be at least 72 ppi tall, which is equal to one inch (this is 87 points). This font is 72 ppi. If you.
This would be the area for your title, which should be at least 72 ppi tall, which is equal to one inch (this is 100 points). This font is 72 ppi. If.
This template is UND branded. It is built 36”x20
Presentation transcript:

Have you ever wanted to hide something from: Your friends? Your family? The Government?

If the answer is yes, then you need to learn about Steganography Steganography has nothing to do with dinosaurs! Steganography is the study of hiding information

Thousands of years ago, the Greeks used steganography to hide information from their enemies. One hiding method was to engrave a message in a block of wood, then cover it with wax, so it looked like a blank wax tablet. When they wanted to retrieve the message, they would simply melt off the wax.

You can try steganography at home by writing on a piece of paper with lemon juice. If you heat the paper with a hair dryer the juice will burn and reveal the hidden message. Note for those who wish to try this at home: Paper burns too, so stop heating the paper before it catches fire!

We can also perform steganography using a computer. Everything in a computer is stored as 1’s and 0’s (a bit). Bits are grouped in sets of eight, one set is called a byte = A = B = C Bits One byte can be used to represent each letter of the alphabet. This is what is used in text files Bytes

Pictures are made up of lots of little dots called pixels. Each pixel is represented as 3 bytes – one for red, one for green and one for blue. Each byte is interpreted as a number, which is how much of that colour is used to make the final colour of the pixel = Orange Colour

The difference between two colours that differ by one in either one red, green or blue value is impossible to see with the human eye = Original Colour = Red = Blue +1 If we change the least significant (last) bit in a byte, we either add or subtract one from the value it represents. This means we can overwrite the last bit in a byte without affecting the colour it appears to be.

We can use images to hide things if we replace the last bit of every colour’s byte with a bit from the message Message: A Image with 3 pixels: Pixel 1: Pixel 2: Pixel 3: Now we hide our message in the image: Pixel 1: Pixel 2: Pixel 3: New image:

Even if we do this across a big image and with a really large message, it is still hard to tell that anything is wrong. OriginalWith Hidden Message

Normally when we hide a message in an image we just start at the top left pixel and keep writing across the image until we are done. Example: This may appear to work quite well, but if we zoom right in and look at the pixels in a block of plain colour then we can see that some pixels aren’t all the same. Plain blue sky from image of the Mount Look here

So what we want to do is hide in the edges of a picture because then we can avoid hiding in blocks of colour. Image we want to hide a message in Where we want to hide the message If we change an edge it is harder to notice because two pixels next to each other will already have very different colours.

This method of hiding is called FilterFirst, because we filter the image to find the edges before we start picking the order of pixels to hide in Example: Imagine our example (above) has a pink square in the middle. The algorithm will write to the edges of the square before moving out and writing around the rest of the image.

And if you don’t believe it’s any of this, you can try it out yourself! There’s a free program you can download called “Digital Invisible Ink Toolkit”, which can hide a computer file inside a colour image.

Can you pick the picture with the hidden message?

Can you pick the picture with the hidden message? If you guessed this one, you were right.

A proud University of Waikato, School of Computing and Mathematical Sciences Honours Project,