Professional Documents
Culture Documents
G
E
O
N
P
A
R
Y
H
INTRODUCTION
STEGANOGRAPHY :
STEGANOGRAPHY
GREEK
COMES
FROM THE
OR SECRET WRITING.
S T E G A N - O - G RA P H Y
COVERED
WRITING
What is
Steganography?
Defn:
the art and science of hiding information by
embedding it in some other data.
Cryptography - render message unintelligible
Steganography - conceal the existence of the
message
Steganography
Some
400 B.C. - writings of Herodotus
History
1499 - Steganographia, Trithemius- steganography and magic
1665 - Steganographica, Gaspari Schotti
1870 - The Pigeon Post into Paris
2001 - A Beautiful Mind
Steganography
Low-tech Methods of
Message hidden
Steganography
Message hidden as
Steganography
Basics
Steganography
Early Examples
Steganography
Principles
Steganography
Process
Replace the least significant bit of each byte in the [carrier] with
a single bit for the hidden message.
Select certain bytes in which to embed the message using a
random number generator; resampling the bytes to pixel
mapping to preserve color scheme, in the case of an image...;
hiding information in the coefficients of the discrete cosine,
fractal or wavelet transform of an image; and applying mimic
functions that adapt bit pattern to a given statistical distribution."
Steganography
Software
encrypts files and then hides them within BMP, DIB, VOC,
WAV, ASCII and HTML files.
Steganography
info
info
-file
embed
extract
Steganography
Three Types of Steganography
1) Covert Channel
conceal message so only sender and recipient know
Watermarking
concealed message contains its source ID
2) ___________ Watermarking
designed for concealed message to survive
3) (Semi-)___________ Watermarking
designed so concealment is corrupted whenever
stego-file is modified.
W AY T H AT
M E S S A G E H A S B E E N S E N T.
T H I S C A N B E AC H I E V E BY C O N C E A L I N G
THE EXISTENCE OF
I N F O R M AT I O N
W I T H I N S E E M I N G LY H A R M L E S S C A R R I E R S
OR COVER
I T C A N B E U N D E R S TA N D B Y T H E
FOLLOWING FIGURE.
Steganography
Applications of Steganography
Covert exchange of information
Establish identity
Combat illegal copying
Steg____________
How would you?
Comparison of files for statistical differences
What files are available?
STEGANOGRAPHY UNDER
VARIOUS MEDIA
STEGANOGRAPHY
IN
TEXT
STEGANOGRAPHY
IN
IMAGES
STEGANOGRAPHY
IN
A U D I O
STEGANOGRAPHY IN IMAGES
IMAGE
COMPRESSION:
IMAGE
IMAGE
COMPRESSION
FILES.
LOSSLESS
S AV E
TWO
AND
OFFERS
KINDS
LOSSY
STORAGE
OF
SOLUTION
IMAGE
BUT
H AV E
LOSSY
F O R M AT
BOTH
DIFFERING
O N A N Y U N C O M P R E S S E D H I D D E N D ATA
LARGE
COMPRESSION
COMPRESSION.
S PAC E
TO
ARE
METHODS
EFFECTS
IN THEIMAGE.
J P E G ( J O I N T P H O T O G RA P H I C E X P E RT S G R O U P )
FILES,
OFFERS
HIGH
COMPRESSION,
BUT
M AY
N O T M A I N T A I N T H E O R I G I N A L I M A G E ' S I N T E G R I T Y. H E N C E
IT IS
CALLED LOSSY.
LOSSLESS
IMAGE
D ATA
COMPRESSION
E X A C T LY ,
IT
IS
M A I N TA I N S
THUS
MORE
THE
ORIGINAL
FAV O R E D
BY
S T E G A N O G RA P H I C T E C H N I Q U E S . E G : ( B M P ) , ( G I F ) F O R M AT S .
STEGANOGRAPHY IN IMAGES
IMAGE ENCODING TECHNIQUES
LE A ST SIG N IF IC AN T BI T IN SE RT IO N :
M A S K I N G A N D F I LT E R I N G :
A L G O R I T H M S A N D T R A N S F O R M AT I O N S :
Steganography
Steganography in Images
Two types of compression:
lossless (gif)
lossy (jpeg)
Sometimes concealed message inserted as a comment.
Sometimes the accuracy of the image is sacrificed slightly.
Common Tools
StegoDOS
White Noise Storm
S-tools
outguess
steghide
STEGANOGRAPHY IN AUDIO
AUDIO ENVIRONMENTS
D I G I TA L R E P R E S E N TAT I O N
S A M P L E Q U A N T I Z AT I O N M E T H O D :
T E M P O R A L S A M P L I N G R AT E :
A N O T H E R D I G I TA L R E P R E S E N TA T I O N
STEGANOGRAPHY IN AUDIO
T R A N S M I SS I O N M E D I U M :
B E N D E R S T RA N S M I S S I O N E N V I R O N M E N T S
D I G I TA L
E N D -T O - E N D
E N V I R O N M E N T.
INCREASED/DECREASED
R E S A M P L I N G E N V I R O N M E N T.
ANA LOG
T R A N S M I SS I O N
AND
RESAMPLING.
STEGANOGRAPHY IN AUDIO
M E T H O D S O F A U D I O D ATA
HIDING
L O W- B I T E N C O D I N G :
PHASE CODING :
E C H O D ATA H I D I N G :
Steganography
Digital
HTML message as
Steganography
cover?
STEGANALYSIS
S T E G A N A LY S I S I S T H E A R T A N D S C I E N C E O F
DETECTING A
HIDING
L E AV E
S E C R E T C O M M U N I C AT I O N .
MESSAGE
D E T E C TA B L E
WILL
TRACES
MOST
IN
THE
L I K E LY
COVER
MEDIUM.
THE
CHANGES
THE
I N F O R M AT I O N
THE
COVER,
HIDING
S TAT I S T I C A L
WHICH
IS
PROCESS
P R O P E RT I E S
OF
S T E G A N A LY S T
A T T E M P T S T O D E T E C T.
THE
PROCESS
S TAT I S T I C A L
OF
AT T E M P T I N G
TRACES
S T A T I S T I C A L S T E G A N A LY S I S .
IS
TO
DETECT
CALLED
STEGANALYSIS
I M P O RTA N T A S P E C T S O F
S T E G A N A LY S I S
D E T E C T I N G H I D D E N I N F O R M AT I O N
DI S AB L I NG S T E G ANO GRAP HY
APPLICATIONS
C O N F I D E N T I A L C O M M U N I C AT I O N A N D
S E C R E T D ATA S T O R I N G .
P R O T E C T I O N O F D ATA A LT E R AT I O N .
A C C E SS C O N T R O L S Y S T E M F O R
D I G I TA L C O N T E N T D I S T R I B U T I O N .
M E D I A D ATA B A S E S Y S T E M S .
D I F F I C U LT T O D E T E C T A N D O N LY R E C E I V E R C A N D E T E C T.
I T C A N B E D O N E FA S T E R W I T H L A R G E N O. O F S O F T WA R E S .
P R O V I D E S B E TT E R S E C U R I T Y F O R S H A R I N G D ATA I N
D I S A D VA N TA G E S :
T H E C O N F I D E N T I A L I T Y O F I N F O R M AT I O N I S M A I N TA I N E D
PA S S W O R D L E A K AG E M AY O C C U R A N D I T L E A D S T O T H E
UNAUTHORIZED
A C C E S S O F D ATA .
CONCLUSION
THIS
SEMINAR
PROVIDES
S T E G A N A LY S I S
AND
CHARACTERISTICS
OF
AN
OV E RV I EW
INTRODUCED
STEGANOGRAPHIC
OF
SOME
SOFTWARE
T H AT P O I N T S I G N S O F I N F O R M AT I O N H I D I N G .
THE
EASE
IN
USE
STEGANOGRAPHY
AND
ABUNDANT
TOOLS
HAS
AVA I L A B I L I T Y
L AW
OF
ENFORCEMENT
C O N C E R N E D I N T RA F F I C K I N G O F I L L I C I T M AT E R I A L V I A
WEB
PAG E
IMAGES,
AUDIO,
AND
OTHER
T R A N S M I S S I O N S O V E R T H E I N T E R N E T.
W H E R E S TA N DA R D C RY P T O G RA P H Y A N D E N C RY P T I O N
F O R M E R LY ,
JUST
AN
INTEREST
OF
THE
M I L I TA RY ,
K
O
D
H
T O R KH I L
O
Y Y: N
R
E
A
JA
A
K
A
6
H
R
2
Y
IW HO
T
L
T
W
K
A
I
Y
M
A
N
N
A
H
U
H
S
K
B
K
U
A
H
S
R
A
R
5
A