SlideShare a Scribd company logo
1 of 24
cryptography

                 κρυπό σ         γραφία



               hidden         writing



A secret manner of writing, … Generally, the art of
writing or solving ciphers.
                            — Oxford English Dictionary
cryptology

                  κρυπόσ            λογια



                hidden         speaking

1967 D. Kahn, Codebreakers p. xvi, Cryptology is the
science that embraces cryptography and cryptanalysis,
but the term ‘cryptology’ sometimes loosely designates
the entire dual field of both rendering signals secure
and extracting information from them.
                               — Oxford English Dictionary
steganography

      ςτεγανόσ        γραφία



    covered         writing



The art of secret (hidden) writing
Steganography
Art and science of communicating in a way that
hides the existence of a message
   signal or pattern imposed on content

  – persistent under transmission
  – not encryption
     • original image/file is intact
  – not fingerprinting
     • fingerprinting leaves separate file describing contents
Classic techniques
• Invisible ink (1st century AD - WW II)
• Tatoo message on head
• Overwrite select characters in printed type in
  pencil
   – look for the gloss
• Pin punctures in type
• Microdots (WW II)
• Newspaper clippings, knitting instructions, XOXO
  signatures, report cards, …
Motivation
• Steganography received little attention in computing
• Renewed interest because of industry desire to protect
  copyrighted digital work
   –   audio
   –   images
   –   video
   –   Text
• Detect counterfeiter, unauthorized presentation, embed
  key, embed author ID
• Steganography ≠ Copy protection
Null Cipher
• Hide message among irrelevant data
• Confuse the cryptoanalyst
Null Cipher
• Hide message among irrelevant data
• Confuse the cryptoanalyst

  Big rumble in New Guinea.
  The war on
  celebrity acts should end soon.
  Over four
  big ecstatic elephants replicated.
Null Cipher
• Hide message among irrelevant data
• Confuse the cryptoanalyst

  Big rumble in New Guinea.
  The war on
  celebrity acts should end soon.
  Over four
  big ecstatic elephants replicated.

  Bring two cases of beer.
BBC News 27 April 2006
Judge creates own Da Vinci code

The judge who presided over the failed Da Vinci Code plagiarism case at
London's High Court hid his own secret code in his written judgement.

Seemingly random italicised letters were included in the 71-page
judgement given by Mr Justice Peter Smith, which apparently spell out a
message.

Mr Justice Smith said he would confirm the code if someone broke it.

"I can't discuss the judgement, but I don't see why a judgement should
not be a matter of fun," he said.

Italicised letters in the first few pages spell out "Smithy Code", while the
following pages also contain marked out letters.
                                                 http://news.bbc.co.uk/go/pr/fr/-/1/hi/entertainment/4949488.stm
Chaffing & Winnowing
• Separate good messages from the bad ones
• Stream of unencoded messages with signatures
     – Some signatures are bogus
     – Need key to test
       Alice                                                 Bob

M3   M2    M1   M0                                     M3   M2   M1    M0

                                        Irene          ×    OK     ×   ×

                                   M3   M2   M1   M0

                                   ?    ?    ?    ?
Image watermarking
• Spatial domain watermarking
   – bit flipping
   – color separation
• Frequency domain watermarking
   – embed signal in select frequency bands (e.g. high
     frequency areas)
   – apply FFT/DCT transform first

   – e.g. Digimarc
   – watermark should alter the least perceptible bits
       • these are the same bits targeted by lossy image compression
         software
UV Watermarking
Machine ID codes in laser printers




            See http://www.eff.org/Privacy/printers/
Machine ID codes in laser printers
Machine ID codes in laser printers
Machine ID codes in laser printers
Text
• Text lines shifted up/down (40 lines text 240
  codes)
• word space coding
• character encoding - minor changes to shapes
  of characters
Text
• Text lines shifted up/down (40 lines text 240
  codes)
• word space coding
• character encoding - minor changes to shapes
  of characters




• works only on “images” of text e.g., PDF, postscript
Audio
Perceptual coding
   – inject signal into areas that will not be detected by humans
   – may be obliterated by compression


Hardware with copy-protection
   –   not true watermarking - metadata present on media
   –   DAT
   –   minidisc
   –   presence of copy protection mechanisms often failed to give the
       media wide-spread acceptance
Video
• Coding still frames - spatial or frequency
• data encoded during refresh
  – closed captioning
• visible watermarking
  – used by most networks (logo at bottom-right)
Watermarking vs. Steganography
Goal of steganography
 – Intruder cannot detect a message
 – Primarily 1:1 communication


Goal of watermarking
 – Intruder cannot remove or replace the message
 – Primarily 1:many communication
The end.

More Related Content

Viewers also liked (7)

Steganography
SteganographySteganography
Steganography
 
Cryptography
CryptographyCryptography
Cryptography
 
Ch06
Ch06Ch06
Ch06
 
Blowfish Cryptosystem
Blowfish Cryptosystem Blowfish Cryptosystem
Blowfish Cryptosystem
 
RC-5
RC-5RC-5
RC-5
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Steganography

CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
ijcisjournal
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryption
Rebecca Jones
 
Chapter_three - Computer Security.pdf
Chapter_three -      Computer Security.pdfChapter_three -      Computer Security.pdf
Chapter_three - Computer Security.pdf
AschalewAyele2
 

Similar to Steganography (20)

18-steganography.ppt
18-steganography.ppt18-steganography.ppt
18-steganography.ppt
 
Steganography
SteganographySteganography
Steganography
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganography
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
 
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETYCRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
CRYPTOLOGY AND INFORMATION SECURITY - PAST, PRESENT, AND FUTURE ROLE IN SOCIETY
 
Encryption
EncryptionEncryption
Encryption
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
steganography
steganographysteganography
steganography
 
Securityand encryption
Securityand encryptionSecurityand encryption
Securityand encryption
 
Cryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptxCryptography and steganography lesson and discription.pptx
Cryptography and steganography lesson and discription.pptx
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography & Digital certificate
Cryptography & Digital certificateCryptography & Digital certificate
Cryptography & Digital certificate
 
Cryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding informationCryptology - The practice and study of hiding information
Cryptology - The practice and study of hiding information
 
OpenCard hack (projekt chameleon)
OpenCard hack (projekt chameleon)OpenCard hack (projekt chameleon)
OpenCard hack (projekt chameleon)
 
My cryptography
My cryptographyMy cryptography
My cryptography
 
Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?Wikileaks: secure dropbox or leaking dropbox?
Wikileaks: secure dropbox or leaking dropbox?
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
 
Chapter_three - Computer Security.pdf
Chapter_three -      Computer Security.pdfChapter_three -      Computer Security.pdf
Chapter_three - Computer Security.pdf
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 

Steganography

  • 1.
  • 2. cryptography κρυπό σ γραφία hidden writing A secret manner of writing, … Generally, the art of writing or solving ciphers. — Oxford English Dictionary
  • 3. cryptology κρυπόσ λογια hidden speaking 1967 D. Kahn, Codebreakers p. xvi, Cryptology is the science that embraces cryptography and cryptanalysis, but the term ‘cryptology’ sometimes loosely designates the entire dual field of both rendering signals secure and extracting information from them. — Oxford English Dictionary
  • 4. steganography ςτεγανόσ γραφία covered writing The art of secret (hidden) writing
  • 5. Steganography Art and science of communicating in a way that hides the existence of a message signal or pattern imposed on content – persistent under transmission – not encryption • original image/file is intact – not fingerprinting • fingerprinting leaves separate file describing contents
  • 6. Classic techniques • Invisible ink (1st century AD - WW II) • Tatoo message on head • Overwrite select characters in printed type in pencil – look for the gloss • Pin punctures in type • Microdots (WW II) • Newspaper clippings, knitting instructions, XOXO signatures, report cards, …
  • 7. Motivation • Steganography received little attention in computing • Renewed interest because of industry desire to protect copyrighted digital work – audio – images – video – Text • Detect counterfeiter, unauthorized presentation, embed key, embed author ID • Steganography ≠ Copy protection
  • 8. Null Cipher • Hide message among irrelevant data • Confuse the cryptoanalyst
  • 9. Null Cipher • Hide message among irrelevant data • Confuse the cryptoanalyst Big rumble in New Guinea. The war on celebrity acts should end soon. Over four big ecstatic elephants replicated.
  • 10. Null Cipher • Hide message among irrelevant data • Confuse the cryptoanalyst Big rumble in New Guinea. The war on celebrity acts should end soon. Over four big ecstatic elephants replicated. Bring two cases of beer.
  • 11. BBC News 27 April 2006 Judge creates own Da Vinci code The judge who presided over the failed Da Vinci Code plagiarism case at London's High Court hid his own secret code in his written judgement. Seemingly random italicised letters were included in the 71-page judgement given by Mr Justice Peter Smith, which apparently spell out a message. Mr Justice Smith said he would confirm the code if someone broke it. "I can't discuss the judgement, but I don't see why a judgement should not be a matter of fun," he said. Italicised letters in the first few pages spell out "Smithy Code", while the following pages also contain marked out letters. http://news.bbc.co.uk/go/pr/fr/-/1/hi/entertainment/4949488.stm
  • 12. Chaffing & Winnowing • Separate good messages from the bad ones • Stream of unencoded messages with signatures – Some signatures are bogus – Need key to test Alice Bob M3 M2 M1 M0 M3 M2 M1 M0 Irene × OK × × M3 M2 M1 M0 ? ? ? ?
  • 13. Image watermarking • Spatial domain watermarking – bit flipping – color separation • Frequency domain watermarking – embed signal in select frequency bands (e.g. high frequency areas) – apply FFT/DCT transform first – e.g. Digimarc – watermark should alter the least perceptible bits • these are the same bits targeted by lossy image compression software
  • 15. Machine ID codes in laser printers See http://www.eff.org/Privacy/printers/
  • 16. Machine ID codes in laser printers
  • 17. Machine ID codes in laser printers
  • 18. Machine ID codes in laser printers
  • 19. Text • Text lines shifted up/down (40 lines text 240 codes) • word space coding • character encoding - minor changes to shapes of characters
  • 20. Text • Text lines shifted up/down (40 lines text 240 codes) • word space coding • character encoding - minor changes to shapes of characters • works only on “images” of text e.g., PDF, postscript
  • 21. Audio Perceptual coding – inject signal into areas that will not be detected by humans – may be obliterated by compression Hardware with copy-protection – not true watermarking - metadata present on media – DAT – minidisc – presence of copy protection mechanisms often failed to give the media wide-spread acceptance
  • 22. Video • Coding still frames - spatial or frequency • data encoded during refresh – closed captioning • visible watermarking – used by most networks (logo at bottom-right)
  • 23. Watermarking vs. Steganography Goal of steganography – Intruder cannot detect a message – Primarily 1:1 communication Goal of watermarking – Intruder cannot remove or replace the message – Primarily 1:many communication