Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss Authors: Avinash Srinivasan, Jie Wu, and Justin.

Slides:



Advertisements
Similar presentations
Steganography University of Palestine Eng. Wisam Zaqoot April 2011 ITSS 4201 Internet Insurance and Information Hiding.
Advertisements

Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Information Hiding: Watermarking and Steganography
Steganography and Network Security
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
Blue Spike © 2001 Blue Spike, Inc. - 1 Copyright Protection? What are the technologies which can address copyright management in a world of digital copies?
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:
Cryptography, Authentication and Digital Signatures
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Steganography for Secure Digital Watermarking 1 Pratheepan Yogarajah, Dr. Joan Condell, Dr. Kevin Curran, Prof. Paul Mc Kevitt.
Damageless Information Hiding Technique using Neural Network Keio University Graduate School of Media and Governance Kensuke Naoe.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
1 Wave Steganography Approach by Modified LSB 2009 Adviser: 吳坤熹 Student: 陳奕君 Presentation Data:2013/11/5 Second International Conference on Emerging Trends.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
University of Massachusetts Amherst · Department of Computer Science Square Root Law for Communication with Low Probability of Detection on AWGN Channels.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
Protocol Analysis. CSCE Farkas 2 Cryptographic Protocols Two or more parties Communication over insecure network Cryptography used to achieve goal.
Cryptographic Anonymity Project Alan Le
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
Digital Steganography
Introduction to Steganography
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Information and Network Security
Steganography.
Visit for more Learning Resources
Steganography with Digital Images
A Data Hiding Scheme Based Upon Block Truncation Coding
Steganography Techniques and their use in Anonymity
Parag Agarwal Digital Watermarking Parag Agarwal
Information Hiding and Its Applications
De-clustering and Its Application to Steganography
Information Hiding Techniques Using Magic Matrix
Image Based Steganography Using LSB Insertion Technique
Department of Computer Science, University of Central Florida ,Orlando
STEGANOGRAPHY IN IMAGES
Introduction to Multimedia Security Topics Covered in this Course
Chair Professor Chin-Chen Chang Feng Chia University Jan. 2008
Presentation transcript:

Android-Stego: A Novel Service Provider Imperceptible MMS Steganography Technique Robust to Message Loss Authors: Avinash Srinivasan, Jie Wu, and Justin Shi Temple University Computer and Information Sciences Philadelphia – USA Presenter: Lei Chen Temple University College of Science and Technology Computer and Information Sciences

Presentation Roadmap Background Steganography 101 Android-Stego – Overview, Salient Features, Process – Implementation – Robust to Operator Manipulation Conclusion Srinivasan, Wu, Shi - MobiMedia 20152

Background Information hiding (IH) – – extensively researched for over two decades Steganography – – one type of IH – yet to be fully explored on smartphones over cellular carrier networks Smartphones – – epitome of ubiquitous and pervasive computing – continue being the locus of one-device-for-all-needs – make steganography an easily accessible CC channel. Srinivasan, Wu, Shi - MobiMedia 20153

Steganography 101

The practice of concealing messages or information within other non-secret text or data. Simple embedding techniques – – data are often hidden through the use of mathematical techniques – imperceptible to the naked eye Sophisticated embedding techniques – – degradation in quality – payload change are perceptible Srinivasan, Wu, Shi - MobiMedia 20155

Steganography + Encryption – problem just got harder…..rather lot harder Message encryption – – substantially harder to detect, extract, and recover message. – harder to use entropy-based statistical analysis – all encrypted data have very high entropy bits-per-byte Srinivasan, Wu, Shi - MobiMedia 20156

Steganography drawbacks – Broad techniques have remained unchanged – Offer limited number of possibilities and algorithms Srinivasan, Wu, Shi - MobiMedia 20157

Steganography – Key Requirements Cover file should be popular – its usage should not in itself be considered an anomaly. – AndroidStego meets this requirement. Resultant modifications to the cover file should be imperceptible to a third-party – AndroidStego meets this requirement. Srinivasan, Wu, Shi - MobiMedia 20158

Android-Stego Prototype

Assumptions and Threat Model Alice (sender) and Bob (receiver) use a PKI-based digital certificate for mutual authentication. Alice and Bob can negotiate a shared session key spontaneously over an unsecured communication channel. Unsecured channel is a channel that is vulnerable to sniffing/monitoring by – service provider, attacker, etc. Srinivasan, Wu, Shi - MobiMedia

Process Overview Splitting and encoding a secret message on the sender side – can be multi-part depending on message size; operator restrictions Encoded secret message successfully traverses the cellular networks – transparent to network restrictions and operator manipulations Decoding the received secret message on the receiver side – reassembly necessary if it is a multi-part message Srinivasan, Wu, Shi - MobiMedia

Android-Stego Implementation Insertion of a secret message into a single instance of the cover file is upper bound by the imperceptibility threshold (T imp ) to modifications. AndroidStego meets this requirement by incorporating: – multi-part, segmented, and distributed capabilities into the LSB encoding algorithm. – can hide arbitrary binary data of arbitrary length – additional cover file instances are used if the secret message size > T imp Srinivasan, Wu, Shi - MobiMedia

Prototype is features: – robust to message loss resulting from cellular operator manipulations of MMS messages. – a segmented and distributed implementation built with LSB as the core encoding technique. Prototype implementation- – real world working prototype – custom LSB implementation – modular, built with existing Android APIs – new features can be easily introduced, making it more capable in hiding, as well as robust to detection Srinivasan, Wu, Shi - MobiMedia

Generating MMS Stego Srinivasan, Wu, Shi - MobiMedia

Embedding Secret Message Srinivasan, Wu, Shi - MobiMedia

Extracting Secret Message Srinivasan, Wu, Shi - MobiMedia

Table 2: Summary of cellular carrier restriction on in-coming MMS message size for four major cellular service providers in North America. Srinivasan, Wu, Shi - MobiMedia

Conclusion(s) Smartphones will increasingly be the locus of one-device-for- all-needs. Steganography most easily accessible alternative for covert communication over smartphones. Built a real-world working prototype – robust to cellular operator manipulations of MMS messages – results of of our prototype’s survival over four major cellular operators in North America has been analyzed and presented. Srinivasan, Wu, Shi - MobiMedia