SlideShare a Scribd company logo
1 of 57
Steganography  and   Steganalysis Boonlia Prince Komal ,[object Object],[object Object],[object Object]
The Presentation Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Steganogrphy The art of data hiding in carrier files ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Essentials before we begin ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The process ,[object Object],[object Object],[object Object]
Section 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pixel: The building block of Image
BMP files ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GrayscaleImages with colour palettes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RGB colour images with colour palette ,[object Object],[object Object],[object Object]
24 bit BMP image with the palette ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Section 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bitmap image ,[object Object],BMP File Header Stores general information about the BMP file. Bitmap Information  (DIB header) Stores detailed information about the bitmap image. Color Palette Stores the definition of the colors being used for indexed color bitmaps. (At times not needed) Bitmap Data Stores the actual image, pixel by pixel.
The BMP header This is intel Processor  so Use little Endian system
The DIB header Offset # Size Purpose Eh 4 the size of this header (40 bytes) 12h 4 the bitmap width in pixels  16h 4 the bitmap height in pixels. 1Ah 2 the number of color planes being used. Must be set to 1. 1Ch 2 the number of bits per pixel, which is the color depth of the image. Typical values are 1, 4, 8, 16, 24 and 32. 1Eh 4 the compression method being used.  22h 4 the image size. This is the size of the raw bitmap data , and should not be confused with the file size. 26h 4 the horizontal resolution of the image. (pixel per meter, signed integer) 2Ah 4 the vertical resolution of the image. (pixel per meter, signed integer) 2Eh 4 the number of colors in the color palette, or 0 to default to 2 n . 32h 4 the number of important colors used, or 0 when every color is important; generally ignored.
With the structure ready its time to fill the pixels in the image ,[object Object],Pixel No Red value Green Value Blue Value Colour of pixel 1 8B=139 87 = 135 A0=160 2 8D=141 89=137 A2=162 3 8F=143  8B=139 A4=164 .. .. .. .. n C6=198 F7=247 FF=255
The JPEG File Format ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
JPEG File structure (JFIF) Source: Wikipedia Bytes Payload Name Comments 0xFFD8 none Start Of Image 0xFFC0 variable  Start Of Frame (Baseline DCT) Indicates that this is a baseline DCT-based JPEG, and specifies the width, height, number of components, and component subsampling (e.g., 4:2:0). 0xFFC2 variable  Start Of Frame (Progressive DCT) Indicates that this is a progressive DCT-based JPEG, and specifies the width, height, number of components, and component subsampling (e.g., 4:2:0). 0xFFC4 variable  Huffman Table(s) Specifies one or more Huffman tables. 0xFFDB variable  Quantization Table(s) Specifies one or more quantization tables. 0xFFDD 2 bytes Define Restart Interval Specifies the interval between RST n  markers, in macroblocks. This marker is followed by two bytes indicating the fixed size so it can be treated like any other variable size segment. 0xFFDA variable  Start Of Scan Begins a top-to-bottom scan of the image. In baseline DCT JPEG images, there is generally a single scan. Progressive DCT JPEG images usually contain multiple scans. This marker specifies which slice of data it will contain, and is immediately followed by entropy-coded data. 0xFFD0 … 0xFFD7 none Restart Inserted every  r  macroblocks, where  r  is the restart interval set by a DRI marker. Not used if there was no DRI marker. The low 3 bits of the marker code, cycles from 0 to 7. 0xFFE n variable  Application-specific For example, an  Exif  JPEG file uses an APP1 marker to store metadata, laid out in a structure based closely on  TIFF . 0xFFFE variable  Comment Contains a text comment. 0xFFD9 none End Of Image
The Compression Process Colour space transformation from RGB to YCbCr (Optional) Down Sampling (4:4:4 or 4:2:2 or 4:2:0) (Optional) Block Splitting (8X8, 16 X8 or 16X16) Discrete Cosine transform Quantization Entropy Coding Final JPEG image data Results in higher values at top left of the matrix and a lot of low value at the bottom right The division table resulting in actual compression with lot of zero values at the bottom right corner Arranging the values in zig zag manner to get all the zero values at the end. Thus using a single byte to represent them Data hiding in LSB’s here
The JPEG Compression at work ,[object Object],[object Object],DCT 8 X 8 Pixel data for one component e.g “Y” Averaged out matrix DCT Coefficients of the block
Cont…. Round off quantized DCT Coefficients DCT Coefficients of the block Quantization table
Cont…. ,[object Object],[object Object],-26, -3, 0, -3, -2, -6, 2, -4, 1, -4, 1, 1, 5, 1, 2, -1, 1, -12, 0, 0, 0, 0, 0, -1, -1, EOB Round off quantized DCT Coefficients Zig-Zag  arrangement of binaries Finally compressed block
GIF image ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Steganography techniques ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Section 3
Appending data at the end of the file ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Inserting data in comment or junk field ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data hiding with LSB ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Concept of LSB ,[object Object],01111111 10111111 11011111 11101111 11110111 11111011 11111101 11111110 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data hiding with LSB ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Image date in hex before hiding data Image date in Binary before hiding data Image date in Binary after hiding data Image date in hex after hiding data
Palette manipulation ,[object Object],[object Object],[object Object]
Palette manipulation ,[object Object],[object Object],[object Object],[object Object],[object Object],A better variation can be not using the exact colour but using the near approximation of that colour
Data Hiding strategies ,[object Object],[object Object],[object Object],[object Object],[object Object]
Section 4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
LSB Enhancement File: test.bmp  (Contains no hidden data) File: test1.bmp  (Contains hidden data)
Launch an LSB enhancement attack (Replacing all the bits in every byte with the LSB of that Byte) ,[object Object],[object Object],[object Object],[object Object]
Explanation ,[object Object],[object Object],[object Object]
Why this pattern emerge  (Nature of the ASCII ) Char Decimal Binary Hex a 97 011 00001  61  b 98 011 00010  62  c 99 011 00011  63  d 100 011 00100  64  e 101 011 00101  65  f 102 011 00110  66  g 103 011 00111  67  h 104 011 01000  68  I 105 011 01001  69  j 106 011 01010  6A  k 107 011 01011  6B  l 108 011 01100  6C  m 109 011 01101  6D  Char Decimal Binary Hex n 110 011 01110  6E  o 111 011 01111  6F  p 112 011 10000  70  q 113 011 10001  71  r 114 011 10010  72  s 115 011 10011  73  t 116 011 10100  74  u 117 011 10101  75  v 118 011 10110  76  w 119 011 10111  77  x 120 011 11000  78  y 121 011 11001  79  z 122 011 11010  7A
Data encryption  (The new challenge that defeats LSB enhancement attack) ,[object Object],[object Object],[object Object],[object Object]
Same text with various encryption and LSB enhanced images Text encrypted as ASCII Text encrypted as Binary with IDEA encryption  (S-Tools) Image with no data hidden
Which is the better option for hiding the data 1 2 3 4
Take a break and look at this Image ,[object Object],[object Object]
Chi square test ,[object Object],[object Object]
How chi square works in steganalysis ,[object Object],[object Object],[object Object],[object Object],[object Object]
Lets see the chi square result of the images shown
Chi square with encrypted data in pure black image ,[object Object],[object Object]
Cracking the algorithm Jsteg ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Camouflage ,[object Object],[object Object],[object Object],[object Object],[object Object]
Other Methods ,[object Object],[object Object],[object Object],File with no Hidden data File with Hidden data
Other methods ,[object Object],[object Object],[object Object],With no data hidden it was compressed to 98.4% with Winrar With 5 MB of data hidden the file could not  achieve any compression with winrar If the hidden data is more than the file size in JPEG the compression will be close to 0
Other methods ,[object Object],[object Object],[object Object],Plain white BMP image of 1.42 MB was compressed to 2 kb with winrar Plain white BMP image of 1.42 MB with 18 KB of hidden data was compressed to 48 kb with winrar Extremely colorful image  of 2.25 MB without any data hidden was compressed to 43.5% with winrar Extremely colorful image  of 2.25 MB with 500 KB of hidden datwithout any data hidden was compressed to 46.8% with winrar
Other Methods ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other Methods ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Check these palettes Palette of complete black image original Palette of complete black image as changed by S-tools after hiding the data
Check these palettes ,[object Object],[object Object],Original Palette of image with Black red and a custom colour Palette as changed by S-tools
Other Methods and tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Few Steganalysis tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],You can reach us at [email_address] [email_address] ,[object Object],[object Object],[object Object]

More Related Content

What's hot

Compression of digital voice and video
Compression of digital voice and videoCompression of digital voice and video
Compression of digital voice and video
sangusajjan
 
Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 Method
Kaushik Chakraborty
 
Data Compression Project Presentation
Data Compression Project PresentationData Compression Project Presentation
Data Compression Project Presentation
Myuran Kanga, MS, MBA
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
Journal For Research
 
Data compression
Data compressionData compression
Data compression
Nizar Sbaih
 

What's hot (20)

Compression of digital voice and video
Compression of digital voice and videoCompression of digital voice and video
Compression of digital voice and video
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
data compression technique
data compression techniquedata compression technique
data compression technique
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
Fundamentals of Data compression
Fundamentals of Data compressionFundamentals of Data compression
Fundamentals of Data compression
 
Steganography
Steganography Steganography
Steganography
 
Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 Method
 
Data Compression Project Presentation
Data Compression Project PresentationData Compression Project Presentation
Data Compression Project Presentation
 
EFFICIENT DATA HIDING SYSTEM USING LZW CRYPTOGRAPHY AND GIF IMAGE STEGANOGRAPHY
EFFICIENT DATA HIDING SYSTEM USING LZW CRYPTOGRAPHY AND GIF IMAGE STEGANOGRAPHYEFFICIENT DATA HIDING SYSTEM USING LZW CRYPTOGRAPHY AND GIF IMAGE STEGANOGRAPHY
EFFICIENT DATA HIDING SYSTEM USING LZW CRYPTOGRAPHY AND GIF IMAGE STEGANOGRAPHY
 
DWT based approach for steganography using biometrics
DWT based approach for steganography using biometricsDWT based approach for steganography using biometrics
DWT based approach for steganography using biometrics
 
Hk3312911294
Hk3312911294Hk3312911294
Hk3312911294
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
 
Data compression
Data compressionData compression
Data compression
 
Gg3311121115
Gg3311121115Gg3311121115
Gg3311121115
 
first_assignment_Report
first_assignment_Reportfirst_assignment_Report
first_assignment_Report
 
3 mathematical priliminaries DATA compression
3 mathematical priliminaries DATA compression3 mathematical priliminaries DATA compression
3 mathematical priliminaries DATA compression
 
Data compression
Data compressionData compression
Data compression
 
Compression
CompressionCompression
Compression
 
Crypt-Steganography
Crypt-SteganographyCrypt-Steganography
Crypt-Steganography
 
Data compression
Data compressionData compression
Data compression
 

Similar to Image stegnography and steganalysis

Compression presentation 415 (1)
Compression presentation 415 (1)Compression presentation 415 (1)
Compression presentation 415 (1)
Godo Dodo
 
File types photorestoration and panoramics
File types photorestoration and panoramicsFile types photorestoration and panoramics
File types photorestoration and panoramics
daviddiener
 

Similar to Image stegnography and steganalysis (20)

nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Pe...
nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Pe...nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Pe...
nullcon 2010 - Steganography & Stegananalysis: A Technical & Psychological Pe...
 
Dip
DipDip
Dip
 
//STEIM Workshop: A Vernacular of File Formats
//STEIM Workshop: A Vernacular of File Formats//STEIM Workshop: A Vernacular of File Formats
//STEIM Workshop: A Vernacular of File Formats
 
Lecture 2-2023.pdf
Lecture 2-2023.pdfLecture 2-2023.pdf
Lecture 2-2023.pdf
 
Lecture 2-2023.pdf
Lecture 2-2023.pdfLecture 2-2023.pdf
Lecture 2-2023.pdf
 
Multimedia Object - Image
Multimedia Object - ImageMultimedia Object - Image
Multimedia Object - Image
 
Image compression and jpeg
Image compression and jpegImage compression and jpeg
Image compression and jpeg
 
Compression presentation 415 (1)
Compression presentation 415 (1)Compression presentation 415 (1)
Compression presentation 415 (1)
 
Commonly Used Image File Formats
Commonly Used Image File FormatsCommonly Used Image File Formats
Commonly Used Image File Formats
 
Unit i mm_chap3_graphics and image data representation
Unit i mm_chap3_graphics and image data representationUnit i mm_chap3_graphics and image data representation
Unit i mm_chap3_graphics and image data representation
 
Digital image formats
Digital image formatsDigital image formats
Digital image formats
 
File types photorestoration and panoramics
File types photorestoration and panoramicsFile types photorestoration and panoramics
File types photorestoration and panoramics
 
Jpeg
JpegJpeg
Jpeg
 
Image Compression
Image CompressionImage Compression
Image Compression
 
Image Files Formats
Image Files FormatsImage Files Formats
Image Files Formats
 
Data compression
Data compressionData compression
Data compression
 
Lec2
Lec2Lec2
Lec2
 
Jpegxr readme
Jpegxr readmeJpegxr readme
Jpegxr readme
 
Image compression
Image compressionImage compression
Image compression
 
Chapter 3 data representations
Chapter 3 data representationsChapter 3 data representations
Chapter 3 data representations
 

More from Prince Boonlia (6)

Windows Forensics
Windows ForensicsWindows Forensics
Windows Forensics
 
Browser forensics
Browser forensicsBrowser forensics
Browser forensics
 
Memory Forensics
Memory ForensicsMemory Forensics
Memory Forensics
 
Winter 2012-poster
Winter 2012-posterWinter 2012-poster
Winter 2012-poster
 
Google cheat sheet
Google cheat sheetGoogle cheat sheet
Google cheat sheet
 
Registry forensics
Registry forensicsRegistry forensics
Registry forensics
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Image stegnography and steganalysis

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Pixel: The building block of Image
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. The BMP header This is intel Processor so Use little Endian system
  • 15. The DIB header Offset # Size Purpose Eh 4 the size of this header (40 bytes) 12h 4 the bitmap width in pixels 16h 4 the bitmap height in pixels. 1Ah 2 the number of color planes being used. Must be set to 1. 1Ch 2 the number of bits per pixel, which is the color depth of the image. Typical values are 1, 4, 8, 16, 24 and 32. 1Eh 4 the compression method being used. 22h 4 the image size. This is the size of the raw bitmap data , and should not be confused with the file size. 26h 4 the horizontal resolution of the image. (pixel per meter, signed integer) 2Ah 4 the vertical resolution of the image. (pixel per meter, signed integer) 2Eh 4 the number of colors in the color palette, or 0 to default to 2 n . 32h 4 the number of important colors used, or 0 when every color is important; generally ignored.
  • 16.
  • 17.
  • 18. JPEG File structure (JFIF) Source: Wikipedia Bytes Payload Name Comments 0xFFD8 none Start Of Image 0xFFC0 variable Start Of Frame (Baseline DCT) Indicates that this is a baseline DCT-based JPEG, and specifies the width, height, number of components, and component subsampling (e.g., 4:2:0). 0xFFC2 variable Start Of Frame (Progressive DCT) Indicates that this is a progressive DCT-based JPEG, and specifies the width, height, number of components, and component subsampling (e.g., 4:2:0). 0xFFC4 variable Huffman Table(s) Specifies one or more Huffman tables. 0xFFDB variable Quantization Table(s) Specifies one or more quantization tables. 0xFFDD 2 bytes Define Restart Interval Specifies the interval between RST n markers, in macroblocks. This marker is followed by two bytes indicating the fixed size so it can be treated like any other variable size segment. 0xFFDA variable Start Of Scan Begins a top-to-bottom scan of the image. In baseline DCT JPEG images, there is generally a single scan. Progressive DCT JPEG images usually contain multiple scans. This marker specifies which slice of data it will contain, and is immediately followed by entropy-coded data. 0xFFD0 … 0xFFD7 none Restart Inserted every r macroblocks, where r is the restart interval set by a DRI marker. Not used if there was no DRI marker. The low 3 bits of the marker code, cycles from 0 to 7. 0xFFE n variable Application-specific For example, an Exif JPEG file uses an APP1 marker to store metadata, laid out in a structure based closely on TIFF . 0xFFFE variable Comment Contains a text comment. 0xFFD9 none End Of Image
  • 19. The Compression Process Colour space transformation from RGB to YCbCr (Optional) Down Sampling (4:4:4 or 4:2:2 or 4:2:0) (Optional) Block Splitting (8X8, 16 X8 or 16X16) Discrete Cosine transform Quantization Entropy Coding Final JPEG image data Results in higher values at top left of the matrix and a lot of low value at the bottom right The division table resulting in actual compression with lot of zero values at the bottom right corner Arranging the values in zig zag manner to get all the zero values at the end. Thus using a single byte to represent them Data hiding in LSB’s here
  • 20.
  • 21. Cont…. Round off quantized DCT Coefficients DCT Coefficients of the block Quantization table
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. LSB Enhancement File: test.bmp (Contains no hidden data) File: test1.bmp (Contains hidden data)
  • 35.
  • 36.
  • 37. Why this pattern emerge (Nature of the ASCII ) Char Decimal Binary Hex a 97 011 00001 61 b 98 011 00010 62 c 99 011 00011 63 d 100 011 00100 64 e 101 011 00101 65 f 102 011 00110 66 g 103 011 00111 67 h 104 011 01000 68 I 105 011 01001 69 j 106 011 01010 6A k 107 011 01011 6B l 108 011 01100 6C m 109 011 01101 6D Char Decimal Binary Hex n 110 011 01110 6E o 111 011 01111 6F p 112 011 10000 70 q 113 011 10001 71 r 114 011 10010 72 s 115 011 10011 73 t 116 011 10100 74 u 117 011 10101 75 v 118 011 10110 76 w 119 011 10111 77 x 120 011 11000 78 y 121 011 11001 79 z 122 011 11010 7A
  • 38.
  • 39. Same text with various encryption and LSB enhanced images Text encrypted as ASCII Text encrypted as Binary with IDEA encryption (S-Tools) Image with no data hidden
  • 40. Which is the better option for hiding the data 1 2 3 4
  • 41.
  • 42.
  • 43.
  • 44. Lets see the chi square result of the images shown
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53. Check these palettes Palette of complete black image original Palette of complete black image as changed by S-tools after hiding the data
  • 54.
  • 55.
  • 56.
  • 57.