The role of steganography in secure information solutions (Prathepan yogarajah)

  • 393 views
Uploaded on

 

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
393
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
13
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • Secret Data can be image or text

Transcript

  • 1. http://isrc.ulster.ac.uk9th May 2013www.hidinimage.co.ukPratheepan YogarajahThe role of Steganography inSecure Information solutions
  • 2. http://isrc.ulster.ac.ukSecuring Digital Information2
  • 3. http://isrc.ulster.ac.ukSecuring Digital InformationPaper documentDigital documentServer
  • 4. http://isrc.ulster.ac.uk4Securing Digital InformationClosed System Open System
  • 5. http://isrc.ulster.ac.uk5If we don’t secure information…Scenario 1:
  • 6. http://isrc.ulster.ac.uk6
  • 7. http://isrc.ulster.ac.uk7
  • 8. http://isrc.ulster.ac.uk8
  • 9. http://isrc.ulster.ac.uk9Integrity—How do weknow if the supportingdocuments have beenaltered?Client logs into ABC Insurance portal and fillsin a claim application and submits along withsupporting documents.Approved or rejectedapplication sent back to ClientScenario 2:If we don’t secure information…
  • 10. http://isrc.ulster.ac.uk10Scenario 3:If we don’t secure information…
  • 11. http://isrc.ulster.ac.ukSteganography11
  • 12. http://isrc.ulster.ac.uk12SteganographyKeyEncoderCoverImageSecretDataStego ObjectDecoderSecretDataCommunicationsChannel
  • 13. http://isrc.ulster.ac.ukHidInImage HidInImage enables the encryption and hidingof secret information (text or images) insideimages using Steganography techniques. Secret information is hidden imperceptibly inthat it cannot be detected by the human eye. Our innovative Steganograpy-basedhiding solution plays a vital role in securingdigital media content.
  • 14. http://isrc.ulster.ac.ukWhy HidInImage is Unique? Revolutionary software algorithm forencryption Novel technique for embedding of data inimages using Steganography techniquePatented Encryption SoftwarePatented Embedding Software
  • 15. http://isrc.ulster.ac.uk15Cover ImageProtected ImageWhat does HidInImage do?+ Key =>Secret Data
  • 16. http://isrc.ulster.ac.ukHidInImage Video16
  • 17. http://isrc.ulster.ac.uk 17Embedding EPRs data in innocuous looking image: (a) shows a CT scan image of a patient with herinformation details, (b) encrypted secret data (payload) of (a), a clean image showing nature in whichthe encrypted data will be embedded to and finally (d) shows the stego-image carrying the encryptedpatient dataSecret Communication
  • 18. http://isrc.ulster.ac.uk18Secret Data Cover Image Stego ObjectDocument authentication
  • 19. http://isrc.ulster.ac.uk19How to detect alterationsAltered Document Recovered DocumentGrayscale image ofAltered DocumentFinal Result
  • 20. http://isrc.ulster.ac.ukReceived Document Extracted original contentfrom received DocumentDocument authentication
  • 21. http://isrc.ulster.ac.ukAnti-Counterfeit & Track and TraceSolution
  • 22. http://isrc.ulster.ac.ukSolutions for Digital Imagesimages used by creative individuals, enterprises,governments and law enforcement• Copyright Communication– Identifies content owner and rights• Copy Protection– Controls copying of content• Classification– Classifies content so it is used appropriately;• Authentication– Verifies that content is genuine, from an authorizedsource and has not been altered
  • 23. http://isrc.ulster.ac.uk23Thank You