December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.

Slides:



Advertisements
Similar presentations
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Advertisements

Computers Talk Binary. nd/Binary_Conversion/Binary_to_Text.asp Send me a polite or write me a polite coded.
Information Hiding: Watermarking and Steganography
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
Steganography and Data Hiding. Introduction Steganography is the science of creating hidden messages. Sounds like crypto, but… In traditional crypto,
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Khan, Mohammed Minhajuddin
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Steganography The Art of Hiding Messages
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Digital Watermarking Parag Agarwal
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Paul Krzyzanowski
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Steganography “Hiding in Plain Sight” Gary Alan Davis, D.Sc. Department of Computer & Information Systems.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Submitted By: Varun Singh Roll no.: MRT09UGBCS036.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
 Steganography security through obscurity Ryan Zoellner CS 534 Final Project Fall 2013.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
By, Harshada Mangesh Kshirsagar. TE Computer Bhatati Vidyapeeth’s College of Engg For Women,Pune-43.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Implementation of Steganographic Techniques Danny Friedheim pd. 2.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
FOOTPRINTING STEGANOGRAPHY.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
STEGANOGRAPHY Sibaka Mahapatra Computer Science 3rd Year, Sec-E
Out of site… Out of Mind. By Fred A. DuBrock COSC-356 Steganography.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Introduction to Steganography
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Welcome
STEGANOGRAPHY.
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Computers Talk Binary.
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
Steganography Techniques and their use in Anonymity
Parag Agarwal Digital Watermarking Parag Agarwal
“Hiding in Plain Sight”
STEGANOGRAPHY IN IMAGES
Presentation transcript:

December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young

What is Steganography? The art of writing in code Hiding information by embedding messages within other messages Only the person receiving the message can decode it, but they have to have to the proper code or software to do so.

Background Dates back as early as Ancient Rome where they would inscribe messages on stone tablets and then pour wax over it  The wax would be scraped off to read the message  Mostly used for military intelligence  Another method used in ancient Greece, tattooing a message on someone’s head and then allowing their hair to grow back then the receiver of the message would shave their head Chinese used messengers on foot where they would hide messages on silk cased in wax and the messengers sometimes carried it in them

Applications for Steganography  Hide and Seek (versions 4.1 and 5.0) By Colin Maroney Images 320x480 Spreads data throughtout the GIF in a random fashion  StegoDos Also known as Black Wolf’s Picture Encoder Public Domain software by an anonymous person Works with images that are 320x200 with 256 colors  Steganos is a LSB embedding system that embeds data into images  SecurEngine, an application in which small text files are hidden in larger text files  White Noise By Ray Arachelian

White Noise Example White Noise was the first software tested that could embed this message (to the left) into the picture above.

Other Examples Invisible Ink  Can be used in documents or even clothing Fingerprinting Peers communicating  Doesn’t stop the fact that there is a message being sent between the peers, which can obviously be detected Chaffing and winnowing  Where the recipient receives multiple messages where they can identify the true meaning, but only one of the messages is authentic and the rest are bogus Microdots  Where only a microscope can read the message

Pros Used for:  Watermaking images for copyright protection Example: holding a $20 bill up to the light and seeing a watermark  Hidden in images, video files, and audio files  Confidentiality of valuable information to prevent theft

Cons Unfortunately, steganography can also be used for illegal purposes:  Concealing a plan for terroristic threats It is believed that al-Qaeda used steganographic software to communicate plans with each other before the 9-11 attacks, this has not yet been confirmed This is a huge threat to the gorvernment  Hiding harmful files  Stealing data

Steganalysis Steganalysis is a way to defeat steganography Stegdetect is a tool used for detecting the content in images. The only con to steganalysis is that steganography cannot always be detected Techniques on attack approach is important depending on what information is available:  Steg-only attack: steganographic medium is available  Known-carrier attack: the original cover and the medium are available  Known message attack: when the hidden message is known  Chosen message attack: when the steganalyst knows the message and has access to the steganography tool and can embed and analyze messages

Applications for Steganalysis EnCase, by Guidance Software Inc. Ilook Investigator, by Electronic Crimes Program This is an example of a file without embedded text This is an example of a file with embedded text

Algorithms Are step-by-step procedures in solving a problem It is used by steganalysts in decoding messages from images where the focus is right now

Compare/contrast Stenography  defined by dictionary.com, is “a person who specializes in taking dictation in shorthand” Cryptography  transforming information into an unreadable format Digital Watermarking  When an image is embedded with copyright information

Stenography A stenographer should not be confused for a steganographer because they do not conceal messages they write in shorthand coding For example, court reporters  They use stenotype machines to type up what the people are saying  Type in codes, some reporters actually have a dictionary of codes that consist of common words, phrases, etc.  Type up to 300 words per minute, the average is 230  In heated court cases up to 250 words can be said

Cryptography Cryptography is transforming information into an unreadable format It is used to protect information such as credit card information, messages, etc. Unlike steganography, you can tell a message has been encrypted, but in order to decode it you need to have the proper key Cryptanalysis is the code breaking method

Digital Watermarking Digital watermarking is a pattern of bits inserted into a picture or file to identify the copyright information. Like steganography, it is meant to be invisible The bits within the image have to be scattered so that they cannot be tampered with or identified The actual watermark also has to be robust enough so that if the image is changed, the watermark is still there. Examples

Sources hy.php hy.php ography.shtml ography.shtml