Professional Documents
Culture Documents
STEGANOGRAPHY
The Art of Hiding Data
Steganography-Outline
Definition And Origin?? History Goals Stego Vs Crypto Steganalysis Steganography - Types Steganography - Common Techniques The Embedding Model LSB Steganography An example Steganography Performance Modern Day Uses - Legitimate Modern Day Uses - Illegitimate Conclusion References
History of Steganography
The concept of message hiding is not new its been around for centuries A Greek shaved the head of a slave, wrote a message, then waited for the hair to grow back before sending the slave to his destination Steganography (in the form of invisible ink) was used by Washington in the Revolutionary War Deliberate Mispellings or Errors, e.g., errors in trivia books, logtables, etc.
Steganography Goals
Primary goal: Steganographys primary goal is to hide data within some other data such that the hidden data cannot be detected even if it is being sought
Secondary goals: prevent extraction from the cover file without destroying the cover prevent destruction of the stego-message without destroying the cover
Steganography Vs Cryptography
Same Purpose To hide/protect important information But different approach
Steganography conceals information, making it unseen Cryptography encrypts information, making it unreadable.
Steganalysis
Definition Identifying the existence of a message Not extracting the message Note: Technically, Steganography deals with the concealment of
Steganalysis essentially deals with the detection of hidden content By identifying the existence of a hidden message, perhaps we can
identify the tools used to hide it. If we identify the tool, perhaps we can use that tool to extract the original message
Steganography Types
Mainly deals with hiding information within other files
Text, Image, Audio, Video
Types
Hiding in Text
By manipulating the lines and words, in HTML file
Hiding in Images
LSB insertion, Masking, Filtering, New File
Steganography Techniques
Three common techniques used
Substitution: LSB Method replaces the last bit in a byte
Advantage: Simplest approach to hide data in an image file Disadvantage: does not take well for large file
Working Principle
The Embedding Model
INFO
Encryption Key
STEGO OUTPUT
COVER MEDIUM
Steganography Example
Can you spot the difference? One of them has a hidden message
Before Encryption
After Encryption
LSB Steganography
Consider a 24 bit picture Data to be inserted: character A: (10000011) Host pixels: 3 pixel will be used to store one character of 8bits The pixels which would be selected for holding the data are chosen on the basis of the key which can be a random number. Ex: 00100111 11101001 11001000 00100111 11001000 11101001 11001000 00100111 11101001 Embedding A 00100111 11101000 11001000 00100110 11001000 11101000 11001001 00100111 11101001 According to researchers on an average only 50% of the pixels actually change from 0-1 or 1-0.
Performance
The below graph shows orientation of Pixels in an image in X-axis & Y-axis before encryption of image using data.
Performance
The below graph shows orientation of Pixels in an image in X-axis & Y-axis after encryption of image using data.
Provide explanatory information with an images (like doctors notes accompanying an X-Ray) Printers
Tiny Yellow dots, barely visible, contains date & time-stamps, encoded serial numbers
Terrorism
USA today article by Jack Kelly Terror groups hide behind Web encryption (February 5, 2001) Hiding secrets in websites like E-Bay, Amazon, transmission via chat rooms, P2P sharing networks, etc. However, no official proof or record has been produced
Advantage
The advantage of steganography is that it can be used to secretly transmit messages without the fact of the transmission being discovered.
Often, using encryption might identify the sender or receiver as somebody with something to hide. For example, that picture of your cat could conceal the plans for your company's latest technical innovation.
Disadvantage
Steganography Conclusion
Steganography in its multitude of forms can be equally effective in being constructive as well as destructive This presentation covers only a tiny fraction of the whole gamut that might go well beyond digital images, text, audio, and video only. Like, voice, communication channels, protocols (TCP/IP), other text and binaries
Inherently, it is neither good or bad. It is the manner in which it is used that will decide the outcome
References
[1] Mohammad Shirali-Shahreza , A new method for real time steganography, ICSP 2006 Proceedings of IEEE . [2] Yuk Ying Chung, fang Fei Xu , Development of video watermarking for MPEG2 video City university of Hong Kong ,IEEE 2006. [3] C. Lu, J. Chen and K. Fan, "Real-time Frame-Dependent Video Watermarking in VLC Domain", Signal Processing : Image Communication 20, 2005, pp. 624642.
[4] Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett, Steganography and digital watermarking School of Computer Science, The University of Birmingham. 2003. www.cs.unibo.it/people/phdstudents/scacciag/home_files/teach/datahide.pdf.
[5] Ravi shah , Abhinav Agraval & subramaniam Ganesham, Frequency domain real time digital image watermarking Oakland university. [6] C. Lu, J. Chen, H. M. Liao, and K. Fan, "Real-Time MPEG2 Video Watermarking in the VLC Domain", Proc.of 16th International Conference on Pattern Recognition, Vol. 2, 11-15 August 2002, pp. 552-555.
[7] J. Haitsma and T. Kalker, "A Watermarking Scheme for Digital Cinema", Proceedings of the IEEE International Conference on Image Processing, Vol. 2, 2001, pp. 487489. [8] Christoph Busch ,Wolfgang Funk & Stephen Wolthusen ,Digital Watermarking from concepts to Real - Time Video applications, IEEE Computer graphics and applications 1999.
The End