Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.

Slides:



Advertisements
Similar presentations
Classical Encryption Techniques Week 6-wend. One-Time Pad if a truly random key as long as the message is used, the cipher will be secure called a One-Time.
Advertisements

Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
BMP Hide ‘n’ Seek What is BMP Hide ‘n’ Seek ? –It’s a tool that lets you hide text messages in BMP files without much visible change in the picture. –Change.
Data Representation COE 202 Digital Logic Design Dr. Aiman El-Maleh
The Binary Numbering Systems
Steganography and Network Security
Khan, Mohammed Minhajuddin
Connecting with Computer Science, 2e
Overview of Digital Stenography
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Security by obscurity. Greek “Concealed Writing” Steganography – the science of hiding a message so that only the recipient and sender are aware that.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
Image processing Lecture 4.
Connecting with Computer Science 2 Objectives Learn why numbering systems are important to understand Refresh your knowledge of powers of numbers Learn.
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
MATH 224 – Discrete Mathematics
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
IT253: Computer Organization
Chapter 11 Fluency with Information Technology 4 th edition by Lawrence Snyder (slides by Deborah Woodall : 1.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot May 2011 May 2011 Steganalysis ITSS 4201 Internet Insurance and Information.
Steganography. Outline What is Steganography? History Steganography used nowadays? Terms Steganography methods Steganography Available Software Steganalysis.
Key Words: File systems, Steganography, Encrypted Communications, RAID, Information Hiding, Intelligence, Instagram, flickr Original can be found at:
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Digital Logic Lecture 4 Binary Codes The Hashemite University Computer Engineering Department.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Module :MA3036NI Cryptography and Number Theory Lecture Week 3 Symmetric Encryption-2.
Steganography Kati Reiland CS 419 April 7, What is Steganography? Technically meaning “covered writing” Anything that hides information in another.
Chapter 1 Data Storage © 2007 Pearson Addison-Wesley. All rights reserved.
Introduction to Programming Instructor: Yong Tang Brookhaven National Laboratory Working on accelerator control (BNL Phone #)
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
©Brooks/Cole, 2003 Chapter 2 Data Representation.
Image File Formats. What is an Image File Format? Image file formats are standard way of organizing and storing of image files. Image files are composed.
Data Representation. What is data? Data is information that has been translated into a form that is more convenient to process As information take different.
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Cryptographic Anonymity Project Alan Le
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Implementation of Steganographic Techniques Danny Friedheim pd. 2.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
DATA Unit 2 Topic 2. Different Types of Data ASCII code: ASCII - The American Standard Code for Information Interchange is a standard seven-bit code that.
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Computer Science: An Overview Eleventh Edition
Steganography in WebP image using LSB embedding
Welcome
Steganography Example
STEGANOGRAPHY.
Hidden Communications: The Effectiveness of Steganography
Steganography.
Visit for more Learning Resources
Khan, Mohammed Minhajuddin
Ch2: Data Representation
Student: Ying Hong Course: Database Security Instructor: Dr. Yang
Steganography Techniques and their use in Anonymity
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter

Goals To conceal a text message into a "carrier" image with Least Significant Bit Steganography To detect that an image has been compromised or altered and to extract that message To extend the method to apply to various image formats To make the program usable with a Graphical User Interface (GUI)

Literally means "concealed writing" in Greek Opposite of cryptography, in which a message is made unintelligible, but transmitted through public means Steganography is the concealment of the fact that a message is even being transferred. What is Steganography?

Historical Methods Shaving hair Wax tablets Jargon Cardano grille Invisible Inks Thermo-activated inks Micro dots Enigma Machine All of the above have been used for espionage and for coordinating attacks on other bodies.

Current Method Hiding an entire text or image binary in either an image or audio “carrier” using Least Significant Bit encoding Previously done as a Senior Technology Lab using the same technique with.wav audio files in There is currently no established method for encoding something with steganography because better encoding methods translate to lower carrier image capacity. There is no established method for universally detecting steganography because of the variety of methods.

Least Significant Bit Encoding Images on computers are made out of pixels Each pixel is represented by three byte s Each byte is composed of eight bits or 1s and 0s The second set of bytes represents the encoded ASCII character “G” ( )

Program Design in JAVA Create a GUI Dropdown menu Input a suspected image Attempt to detect if it has been compromised Place the two image next to each other for visual comparison when extraction is finished.

Inputing the Image Read the binary of the image using Buffered Reader, DataBufferByte, and WritableRaster into a three dimensional array (data cube) with the row, column and corresponding color value (depends on image format). Alter every Least Significant Bit in each byte in order to spell out the word. The ASCII values are understood by DataBufferByte instead of having me define each one. Save the altered image because it is ready to be sent Saving should be done using a “lossless” image standard because this form of steganography exploits the “noise” of an image. Therefore,.PNG is a good start.

Steganalysis Detecting a message encoded using steganography is only feasible if the original image is available or if the exact encoding method is known. The program will still be able to detect if an image has been compromised by converting the suspected image into hexadecimal but the message may not be extracted. This method won’t work if a proper LSB is done, since the encoding starts after the data for the hex tags, thus not altering them.

Decoding Just attempt to reverse the process of Least Significant Bit encoding. This method is always tried by commercial software but hardly works if the LSB is done differently. The suspected image is inputted, converted to binary, the length of the message was hidden in the first 32 bytes, that length is the parameter for the for-loop which traverses the rest of the image extracting the least significant bits in the same manner they were isolated when they were inserted The output is the original ASCII message inputted by the first user

Possible Problems Steganography is an increasingly complex field because of new algorithms and unique ways of analyzing images There are many methods to inconspicuously hide an image or text message with computer science, some are less complex (microdots) and some use higher level mathematical algorithms (stochastic modulation) The Least Significant Bit method is an established method and can be detected at 80% accuracy using highly advanced math but not the human eye

Learned Concepts How images of various formats are constructed, especially.PNG. How to determine a file's extension using JAVA How to manipulate binary code and understanding the role of bits within bytes. Binary operations such as AND, OR, ADD. Various methods of Steganography and Steganalysis and which are the most effective

Future Projects Extend the program to work with other image formats and improve the algorithms susceptibility to common detection methods (using padding and random byte locations) Extend the steganography to another medium Pairing the steganography with a simple encryption algorithm