Cryptographic Anonymity Project Alan Le

Slides:



Advertisements
Similar presentations
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Advertisements

F5 A Steganographic Algorithm
Steganography - A review Lidan Miao 11/03/03. Outline History Motivation Application System model Steganographic methods Steganalysis Evaluation and benchmarking.
Information Hiding: Watermarking and Steganography
Khan, Mohammed Minhajuddin
-Archana Sapkota -Deepti Reddy Steganography 1 CS691 Summer 2009.
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Pictures Worth More Than 1000 Words
Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.
Steganography Rayan Ghamri.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Steganography detection Roland Cmorik, Martin Šumák.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Center for Information Security Technologies, Korea University Digital Image Steganalysis Kwang-Soo Lee.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Have you ever wanted to hide something from: Your friends? Your family? The Government?
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Bit-4 of Frequency Domain-DCT Steganography Technique 1 Nedal M. S. Kafri and Hani Y. Suleiman Networked Digital Technologies, NDT '09. First International.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Introduction to Steganalysis Schemes Multimedia Security.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Group 6 Arthur Garza Lizeth Gonzalez Javier Guzman.
STEGANOGRAPHY Sonya Febiatiningsih ( ) for further detail, please visit
Several Steganography Techniques 1. Write secret messages using invisible ink. 2.The hidden message in the body of delegates: also in ancient Greece.
Distributed Key Based Steganography Implementation and Analysis Mayur Mehta
Implementation of Steganographic Techniques Danny Friedheim pd. 2.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran.
Designing an Embedded Algorithm for Data Hiding using Steganographic Technique by File Hybridization G. Sahoo1 and R. K. Tiwari2 Presented by Pan Meng.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
DATA EMBEDDING IN SCRAMBLED DIGITAL VIDEO -BY 08L31A L31A L31A L31A0487 UNDER THE GUIDENCE OF Y.SUKANYA.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Steganography Secure Communication
Introduction to Steganography
Steganography in WebP image using LSB embedding
Welcome
STEGANOGRAPHY.
Model-based Steganography
Advisor: Chin-Chen Chang1, 2 Student: Yi-Hui Chen2
Steganography.
Visit for more Learning Resources
Steganography with Digital Images
Khan, Mohammed Minhajuddin
Steganography Techniques and their use in Anonymity
Steganography in digital images
Data hiding based Hamming code
Information Hiding and Its Applications
JPEG Steganalysis Statistical Offset Tests
Image Based Steganography Using LSB Insertion Technique
STEGANOGRAPHY IN IMAGES
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

Cryptographic Anonymity Project Alan Le Image Steganography Cryptographic Anonymity Project Alan Le

A little background Steganography originates from historical times. (invisible ink as an example) Steganography is the practice of concealing secret data in non-secret data. The “carrier” should look unsuspicious. Data like audio, text, or video, can be hidden in most file formats if the carrier size is large enough.

Project Goals Learn more about Steganography in general Implement some sort of Image Steganography program (LSB method) Learn about how it applies to anonymity and how effective it is Find out what steganalysis is about

Basic LSB Steganography Implementation My program can encode a text message in a BMP file and decode it later to retrieve the text. I used a C++ library called EasyBMP to process BMP files My algorithm stores one byte in the least significant bits of two pixels (one bit for each RGBA component). Places each byte sequentially from the first pixel (top left corner). Currently only works with BMP. BMP files were easier to transform than other image formats, like JPEG.

Demo

Steganalysis Detecting hidden messages is easiest when you have the original image for comparison. For other cases, various kinds of statistical analysis can be used to detect steganography, such as RS analysis, Sample Pairs analysis, Chi Square analysis.

Steganography in Anonymity context Hiding messages in carrier files doesn’t necessarily give anonymity. An attacker can still see that files are being sent between users Combining Steganography with encryption and other anonymity protocols we’ve discussed in class can be great for privacy LSB Steganography is pretty easy to detect nowadays. (it was more useful in the past). More complex Stenographic methods can be useful to avoid detection.

Conclusion I learned a lot about Steganography in my research. For future work, I would add more features to my implementation, namely steganalysis for other kinds of secret messages, more format support (PNG, JPEG, MP3), different embedding techniques, obfuscation/encryption

Literature Sources Fridrich, J., Goljan, M., & Du, R. (n.d.). Detecting LSB steganography in color, and gray-scale images. IEEE Multimedia, 22-28. Ker, A. (2004). Quantitative evaluation of pairs and RS steganalysis. Security, Steganography, and Watermarking of Multimedia Contents VI. Rodriguez, B., Peterson, G., & Bauer, K. (n.d.). Fusion of Steganalysis Systems Using Bayesian Model Averaging. IFIP — The International Federation for Information Processing Advances in Digital Forensics IV, 345-355. El_Rahman, S. (2015). A Comprehensive Image Steganography Tool using LSB Scheme. International Journal of Image, Graphics and Signal Processing IJIGSP, 10-18. Newman, R., Moskowitz, I., Chang, L., & Brahmadesam, M. (2002). A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis. Information Hiding Lecture Notes in Computer Science, 258-277. Boehm, B. (2014). StegExpose - A Tool for Detecting LSB Steganography. http://arxiv.org/pdf/1410.6656v1.pdf Westfeld, A., & Pfitzmann, A. (n.d.). Attacks on Steganographic Systems. Information Hiding Lecture Notes in Computer Science, 61-76. Macklin, P. EasyBMP. http://easybmp.sourceforge.net/ Fridrich, J., Goljan, M., & Du, R. (n.d.). Reliable detection of LSB steganography in color and grayscale images. Proceedings of the 2001 Workshop on Multimedia and Security New Challenges - MM&Sec '01.