You are on page 1of 23

WELCOME

STEGANOGRAPHY
The Art of Hiding Data

Mrs.Jyothi Dwivedi Seminar Guide By Malatesh S


1ST08CS049

Steganography-Outline
Definition And Origin?? History Goals Stego Vs Crypto Steganalysis Steganography - Types Steganography - Common Techniques The Embedding Model LSB Steganography An example Steganography Performance Modern Day Uses - Legitimate Modern Day Uses - Illegitimate Conclusion References

Steganography Definition and Origin


The art of hiding messages in such a way that no one but the sender and the intended recipient knows about the very existence of the message.
Greek Word, Steganos covered, Graphie writing The strength of Steganography is Stealth

History of Steganography
The concept of message hiding is not new its been around for centuries A Greek shaved the head of a slave, wrote a message, then waited for the hair to grow back before sending the slave to his destination Steganography (in the form of invisible ink) was used by Washington in the Revolutionary War Deliberate Mispellings or Errors, e.g., errors in trivia books, logtables, etc.

Steganography Goals
Primary goal: Steganographys primary goal is to hide data within some other data such that the hidden data cannot be detected even if it is being sought

Secondary goals: prevent extraction from the cover file without destroying the cover prevent destruction of the stego-message without destroying the cover

Steganography Vs Cryptography
Same Purpose To hide/protect important information But different approach
Steganography conceals information, making it unseen Cryptography encrypts information, making it unreadable.

Crypto + Steno = Added layer of security (one complements the other)

Steganalysis
Definition Identifying the existence of a message Not extracting the message Note: Technically, Steganography deals with the concealment of

a message, not the encryption of it

Steganalysis essentially deals with the detection of hidden content By identifying the existence of a hidden message, perhaps we can

identify the tools used to hide it. If we identify the tool, perhaps we can use that tool to extract the original message

Steganography Types
Mainly deals with hiding information within other files
Text, Image, Audio, Video

Types
Hiding in Text
By manipulating the lines and words, in HTML file

Hiding in Images
LSB insertion, Masking, Filtering, New File

Hiding in Disk Space


Unused or reserved disk space

Hiding in Network packets Hiding in strands of Human DNA (Genome Steg.)

Steganography Techniques
Three common techniques used
Substitution: LSB Method replaces the last bit in a byte
Advantage: Simplest approach to hide data in an image file Disadvantage: does not take well for large file

Injection: embedding the message directly into the carrier object


Disadvantage: Makes the file size much larger

Generation of a new file: Start from scratch

Working Principle
The Embedding Model

INFO

Encryption Key

HIDDEN INFO Stego


Key

STEGO OUTPUT

COVER MEDIUM

Steganography Example
Can you spot the difference? One of them has a hidden message

Before Encryption

After Encryption

LSB Steganography
Consider a 24 bit picture Data to be inserted: character A: (10000011) Host pixels: 3 pixel will be used to store one character of 8bits The pixels which would be selected for holding the data are chosen on the basis of the key which can be a random number. Ex: 00100111 11101001 11001000 00100111 11001000 11101001 11001000 00100111 11101001 Embedding A 00100111 11101000 11001000 00100110 11001000 11101000 11001001 00100111 11101001 According to researchers on an average only 50% of the pixels actually change from 0-1 or 1-0.

Performance
The below graph shows orientation of Pixels in an image in X-axis & Y-axis before encryption of image using data.

Performance
The below graph shows orientation of Pixels in an image in X-axis & Y-axis after encryption of image using data.

Steganography Modern Day Uses


Legitimate Usage
Digital Watermarking
Prevent illegal modification, copying, distribution
e.g. DVD recorders detect copy protection on DVDs that contain embedded authorizations

Identify in Ownership disputes, content authentication

Provide explanatory information with an images (like doctors notes accompanying an X-Ray) Printers
Tiny Yellow dots, barely visible, contains date & time-stamps, encoded serial numbers

Used to hide the existence of sensitive files on storage media

Steganography Modern Day Uses


Illegitimate Usage
Corporate Espionage
Theft of Trade Secrets

Terrorism
USA today article by Jack Kelly Terror groups hide behind Web encryption (February 5, 2001) Hiding secrets in websites like E-Bay, Amazon, transmission via chat rooms, P2P sharing networks, etc. However, no official proof or record has been produced

Advantage

The advantage of steganography is that it can be used to secretly transmit messages without the fact of the transmission being discovered.

Often, using encryption might identify the sender or receiver as somebody with something to hide. For example, that picture of your cat could conceal the plans for your company's latest technical innovation.

Disadvantage

Steganography has a number of disadvantages as well.


Unlike encryption, it generally requires a lot of overhead To hide a relatively few bits of information. Also, once a steganographic system is discovered, It is rendered useless. This problem, too, can be overcome if the hidden data depends on some sort of key for its insertion and extraction.

Steganography Conclusion
Steganography in its multitude of forms can be equally effective in being constructive as well as destructive This presentation covers only a tiny fraction of the whole gamut that might go well beyond digital images, text, audio, and video only. Like, voice, communication channels, protocols (TCP/IP), other text and binaries

Inherently, it is neither good or bad. It is the manner in which it is used that will decide the outcome

References
[1] Mohammad Shirali-Shahreza , A new method for real time steganography, ICSP 2006 Proceedings of IEEE . [2] Yuk Ying Chung, fang Fei Xu , Development of video watermarking for MPEG2 video City university of Hong Kong ,IEEE 2006. [3] C. Lu, J. Chen and K. Fan, "Real-time Frame-Dependent Video Watermarking in VLC Domain", Signal Processing : Image Communication 20, 2005, pp. 624642.

[4] Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett, Steganography and digital watermarking School of Computer Science, The University of Birmingham. 2003. www.cs.unibo.it/people/phdstudents/scacciag/home_files/teach/datahide.pdf.

[5] Ravi shah , Abhinav Agraval & subramaniam Ganesham, Frequency domain real time digital image watermarking Oakland university. [6] C. Lu, J. Chen, H. M. Liao, and K. Fan, "Real-Time MPEG2 Video Watermarking in the VLC Domain", Proc.of 16th International Conference on Pattern Recognition, Vol. 2, 11-15 August 2002, pp. 552-555.

[7] J. Haitsma and T. Kalker, "A Watermarking Scheme for Digital Cinema", Proceedings of the IEEE International Conference on Image Processing, Vol. 2, 2001, pp. 487489. [8] Christoph Busch ,Wolfgang Funk & Stephen Wolthusen ,Digital Watermarking from concepts to Real - Time Video applications, IEEE Computer graphics and applications 1999.

The End

Any Q ?? Thank You Again.

You might also like