Presentation is loading. Please wait.

Presentation is loading. Please wait.

Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin.

Similar presentations


Presentation on theme: "Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin."— Presentation transcript:

1 Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin

2 Project Description ➲ Provide an overview of steganography; its uses, how it has adapted to computers, how it works, and steganalysis ➲ Use knowledge gained from online research ➲ Computer steganography is hard to detect and the more one knows about it the better the chance of detecting it

3 History ➲ In ancient times messages would be written on wood or stone tablets then covered in wax ➲ Messages would be tattooed on slaves heads, covered by hair, hair shaved off to read. ➲ Invisible ink

4 Example ➲ Haha you cant ➲ See this

5 Facts ➲ Steganography is closely related to cryptography ➲ Used by artists/developers to insert digital watermarks into their work ➲ There are tools that allow steg to be used with almost any file type: audio, graphics, text, video, executable, ect ➲ Steg used in graphics hides data by inserting it piece by piece into the last couple of bits that make up pixels

6 Steganalysis ➲ Steganalysis is the detection of steganography ➲ Many tools available to detect/decode/destroy steganography

7 Tools ➲ Puff: Italian program, hides files in bmp, jpg, pcx, png, tga, aiff, mp3, next/sun, wav, and Win pe. Provides 16 different encryption algorithms ➲ Invisible Secrets: hides in hpeg, png, bmp, html, and wav. Encryption + other fun tools ➲ TextHide: Scrambles text to hide data within any text file ➲ Stegdetect: Detects steganography In jpeg images

8 Outcomes ➲ Good: ➲ Fun to research ➲ Good sources of data (FBI website)‏ ➲ Understanding of something most people do not know‏ ➲ Bad: ➲ Procrastination ➲ Writers block ➲ Did not meet my own expectations

9 Lessons Learned ➲ Do not procrastinate ➲ Steganography is interesting

10 Resources ➲ http://home.comcast.net/~ebm.md/stego/sof twarewindows.html http://home.comcast.net/~ebm.md/stego/sof twarewindows.html ➲ http://www.securityfocus.com/infocus/1684 http://www.securityfocus.com/infocus/1684 ➲ http://home.comcast.net/~ebm.md/stego/sof twarewindows.html http://home.comcast.net/~ebm.md/stego/sof twarewindows.html ➲ http://www.fbi.gov/hq/lab/fsc/backissu/july20 04/research/2004_03_research01.htm http://www.fbi.gov/hq/lab/fsc/backissu/july20 04/research/2004_03_research01.htm


Download ppt "Steganography Greg Mitchell COS413 Computer Forensics Professor Tony Gauvin."

Similar presentations


Ads by Google