Download presentation
Presentation is loading. Please wait.
Published byPierce Chapman Modified over 9 years ago
1
Steganography Ryan Sacksteder
2
Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future
3
What is Steganography? Comes from Greek ("Wikipedia: The Free Encyclopedia") – steganos = “covered” – graphei = “writing” The practice of writing hidden messages in such a way that no one but the sender/receiver suspect the existence of the message. Steganography vs. Cryptography (Morgan) – Hiding vs. Altering – Obscuring Means of Communication vs. Obscuring Data – Deterring Attacks vs. Defending Attacks
4
History of Steganography Term – 15 th Century Concept – 2500 years (Greene) Let’s take a look at two early instances of steganography…
5
Early Instances of Steganography Ancient Greek Histiaeus’ and His Slave Planning Revolt Against King of Persia Same Trick Repeated with a Rabbit (Greene) We must revolt against the King of Persia. Are you with me? Image Source: http://www.groomingguys.com/grooming-tips/the-bald-truth/
6
Early Instances of Steganography 5 th Century B.C. Exiled Greek Demaratus Warned Sparta of Persians Planned Attack Wax Tablet Concealed Message 300! (Greene)
7
Steganography Past and Current Uses (Trapani) – Hiding Personal Private Data – Embedding Copyright Information – Exchanging Passwords/Confidential Information Misuses (Marcus) – Terrorist Interaction September 11, 2011 – Child Pornography
8
Forms of Steganography Physical Printed Network Digital Etc.
9
Physical Steganography Secret Inks on Paper Concealing Messages Under Postage Stamps Morse Code on Clothing ("Wikipedia: The Free Encyclopedia") Image Source: http://media.photobucket.com/image/recent/kneesocky/morsecode.jpg
10
Printed Steganography Subset Technique - Ex: last word of every line Null Cipher - 1 st Letter (Morgan) Image Source: http://homepage.smc.edu/morgan_david/linux/a24-steganography.pdf
11
Network Steganography Unused Bits in Packet Headers/Payload IP Identification Field TCP Sequence Number Field Port Knocking (Morgan) – Ex: port 83, 69, 67, 85, 82, 73, 84, 89 – ASCII –> “SECURITY”
12
Digital Steganography Altering File Headers/Footers (Villinger) Echo Steganography Audio/Image-Based Steganography (Wikipedia) – Normally Hiding a Text File – Makes Use of LSB(s) Images Source: http://en.wikipedia.org/wiki/Steganography#Digital
13
LSB Image-Based Steganography Each pixel is a combination of 24 bits ("Under Your Hat Security") – 1 byte (8 bits) for each of the RGB values 00010100 11100101 01111101 20 229 125 Image Source: http://www.colorspire.com/rgb-color-wheel/
14
LSB Image-Based Steganography Modifying LSB Results in Minor RGB Change – Unnoticeable Change? 0001010 0 1 1110010 1 0 1 0 0111110 1 0 21 228 124 x x x OriginalLSB Modified Image Source: http://www.colorspire.com/rgb-color-wheel/
15
LSB Image-Based Steganography (“Under Your Hat Security”) Hide the Word “Hi” Convert “Hi” to Binary using ASCII (72 105) – 0100 1000 0110 1001 Using LSB, Requires 16 bytes of Existing Data xxxxxxx0 xxxxxxx1 xxxxxxx0 xxxxxxx1 xxxxxxx0 xxxxxxx1 xxxxxxx0 xxxxxxx1 xxxxxxx0 xxxxxxx1
16
LSB Image-Based Steganography Advantages (Morgan) – No File Size Change – Hard to Detect Disadvantages – Hiding/Revealing Must be Done Same Requires Use of Same Program/Method – Image Format Conversion – Size of Carrier Required to Hide Data
17
LSB Image-Based Steganography Which Image Uses Steganography?
18
Steganalysis The Process of Detecting Steganography ("Wikipedia: The Free Encyclopedia“) Visual Detection – Rare (Marcus) Statistical Analysis – More Common ("Wikipedia: The Free Encyclopedia") – Examining file size/Checksum Requires Knowledge of Original Size – Pixel Pairs
19
Tools/Programs Steganography (“Under Your Hat Security”) – Stepic – Outguess – Steghide Steganalysis – Stegdetect – StegSecret (Munoz) – VSL ("sourceforge.net")
20
The Future of Stegonagraphy Still Pretty New Stronger, Harder to Detect Constant Advancements – Hopeful Advancement: Easier Detection of Small Files
21
Recap Overview History Forms/Examples LSB Image-Based Steganography Steganalysis Tools/Programs Steganography’s Future
22
Questions?
23
Works Cited "Steganography." Wikipedia: The Free Encyclopedia. Wikimedia Foundation, Inc., 2012. Web. 21 Nov 2012.. Morgan, David. "Steganography." David Morgan, Computer Science Department, Santa Monica College. Santa Monica College. Web. 21 Nov 2012.. Greene, Tim. "The history of steganography." Network World. Network World, Inc., 2012. Web. 21 Nov 2012.. Villinger, Sandro. "Crash course: Digital steganography.“ itworld.com. ITworld, 2011. Web. 23 Nov 2012.. "Tutorial: What Is Steganography? How Does It Work?."Under Your Hat Security. underurhat.com, 2012. Web. 23 Nov 2012.. Marcus, Ilana. "Steganography Detection.". University of Rhode Island, 2003. Web. 24 Nov 2012.. Munoz, Alfonso. "StegSecret. A simple steganalysis tool ;)."sourceforge.net. SourceForge, 2007. Web. 24 Nov 2012.. "Virtual Steganographic Laboratory for Digital Images (VSL): Free tool for steganography and steganalysis." sourceforge.net. SourceForge, 2011. Web. 24 Nov 2012.. Trapani, Gina. "Geek to Live: Hide data in files with easy steganography tools." Lifehacker. Lifehacker, 2007. Web. 24 Nov 2012..
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.