SlideShare a Scribd company logo
Steganography

           By
      Harsh Madhani
   Computer Engineering




                          Page 1
cryptography

                 κρσπό ς         γραυία


              hidden          writing



A secret manner of writing, … Generally, the art of
writing or solving ciphers.
                            — Oxford English Dictionary


                                                          Page 2
cryptology

                  κρσπός            λογια


                hidden        speaking

1967 D. Kahn, Codebreakers p. xvi, Cryptology is the
science that embraces cryptography and cryptanalysis,
but the term ‘cryptology’ sometimes loosely designates
the entire dual field of both rendering signals secure
and extracting information from them.
                               — Oxford English Dictionary

                                                             Page 3
Steganography

      στεγαμός        γραυία


   covered          writing



The art of secret (hidden) writing




                                     Page 4
PATS A HORNY EGG
 STEGANOGRAPHY


                   Page 5
Steganography

 Art and science of communicating in a way that
 hides the existence of a message
    signal or pattern imposed on content

   – persistent under transmission
   – not encryption
      • original image/file is intact
   – not fingerprinting
      • fingerprinting leaves separate file describing contents




                                                                  Page 6
• Steganography includes the concealment of
  information within computer files.
• In digital Steganography, electronic
  communications may include steganographic
  coding inside of a transport layer, such as a
  document file, image file, program or protocol.
• Media files are ideal for steganographic
  transmission because of their large size.
• As a simple example, a sender might start
  with an innocuous image file and adjust the
  color of every 100th pixel to correspond to a
  letter in the alphabet, a change so subtle that
  someone not specifically looking for it is
  unlikely to notice it.

                                               Page 7
Classic techniques

 • Invisible ink (1st century AD - WW II)
 • Tatoo message on head
 • Overwrite select characters in printed type in
   pencil
   – look for the gloss
 • Pin punctures in type
 • Microdots (WW II)
 • Newspaper clippings, knitting instructions,
   XOXO signatures, report cards, …


                                                 Page 8
Digital Steganography

 • Modern Steganography entered the world in
   1985 with the advent of the personal
   computer being applied to classical
   Steganography problems.
 • Over 925 digital Steganography applications
   have been identified by the Steganography
   Analysis and Research Center.Digital
   Steganography techniques include:
 • Concealing messages within the lowest bits of
   noisy images or sound files.
 • Chaffing and winnowing.

                                               Page 9
• Concealed messages in tampered executable
  files, exploiting redundancy in the targeted
  instruction set.
• Pictures embedded in video material
  (optionally played at slower or faster speed).
• Injecting imperceptible delays to packets
  sent over the network from the keyboard.
• Delays in keypresses in some applications
  (telnet or remote desktop software) can mean
  a delay in packets, and the delays in the
  packets can be used to encode data.
• Image bit-plane complexity segmentation
  Steganography
                                              Page 10
Chaffing & Winnowing

 • Separate good messages from the bad ones
 • Stream of unencoded messages with signatures
      – Some signatures are bogus
      – Need key to test



       Alice                                            Bob
 M3   M2   M1   M0                                 M3   M2   M1   M0

                                    Irene          ×    OK   ×     ×
                               M3   M2   M1   M0

                                ?   ?    ?    ?
                                                                  Page 11
Null Cipher

 • Hide message among irrelevant data
 • Confuse the cryptoanalyst




                                        Page 12
Null Cipher

 • Hide message among irrelevant data
 • Confuse the cryptoanalyst


   Big rumble in New Guinea.
   The war on
   celebrity acts should end soon.
   Over four
   big ecstatic elephants replicated.




                                        Page 13
Null Cipher

 • Hide message among irrelevant data
 • Confuse the cryptoanalyst


   Big rumble in New Guinea.
   The war on
   celebrity acts should end soon.
   Over four
   big ecstatic elephants replicated.

   Bring two cases of beer.


                                        Page 14
Network Steganography

 • Network Steganography utilizes
   communication protocols' control elements
   and their basic intrinsic functionality.
 • Typical network Steganography methods
   involve modification of the properties of a
   single network protocol.
 • Moreover, it is feasible to utilize the relation
   between two or more different network
   protocols to enable secret communication.
   These applications fall under the term inter-
   protocol Steganography.[14]

                                                 Page 15
• Steganophony - the concealment of messages
  in Voice-over-IP conversations, e.g. the
  employment of delayed or corrupted packets
  that would normally be ignored by the
  receiver (this method is called LACK - Lost
  Audio Packets Steganography), or,
  alternatively, hiding information in unused
  header fields.




                                            Page 16
Image watermarking
 • Spatial domain watermarking
    – bit flipping
    – color separation
 • Frequency domain watermarking
    – embed signal in select frequency bands (e.g. high
      frequency areas)
    – apply FFT/DCT transform first

    – e.g. Digimarc
    – watermark should alter the least perceptible bits
       • these are the same bits targeted by lossy image
         compression software



                                                           Page 17
UV Watermarking




                  Page 18
Machine ID codes in laser printers




                See http://www.eff.org/Privacy/printers/

                                                    Page 19
Machine ID codes in laser printers




                                     Page 20
Machine ID codes in laser printers




                                     Page 21
Machine ID codes in laser printers




                                     Page 22
Text

 • Text lines shifted up/down (40 lines text 
   240 codes)
 • word space coding
 • character encoding - minor changes to shapes
   of characters




                                             Page 23
Text

 • Text lines shifted up/down (40 lines text 
   240 codes)
 • word space coding
 • character encoding - minor changes to shapes
   of characters




 • works only on “images” of text e.g., PDF, postscript   Page 24
Image Steganography




Image of a tree with a
steganographically hidden        Image of a cat extracted
image. The hidden image is
revealed by removing all but     from the tree image
the two least significant bits   besides.
of each color component and a
subsequent normalization.                             Page 25
Audio

 Perceptual coding
    – inject signal into areas that will not be detected by humans
    – may be obliterated by compression


 Hardware with copy-protection
    –   not true watermarking - metadata present on media
    –   DAT
    –   minidisc
    –   presence of copy protection mechanisms often failed to give
        the media wide-spread acceptance




                                                                 Page 26
Video

  • Coding still frames - spatial or frequency
  • data encoded during refresh
    – closed captioning
  • visible watermarking
    – used by most networks (logo at bottom-right)




                                                     Page 27
Data Embedding Security Schemes

 • One of the areas that improves
   steganographic robustness is usage of a key
   scheme for embedding messages.Key scheme
   term means a procedure of how to use key
   steganographic system based on the extent
   of its use. However, when the steganographic
   robustness is increased a bandwidth of the
   whole embedding system is decreased.
   Therefore the task of a scheme selection for
   achieving the optimal values of the
   steganographic system is not trivial.

                                             Page 28
The first level of protection is determined only by the choice of
embedding algorithm. This may be the least significant bits
modification algorithm, or algorithms for modifying the frequency or
spatial-temporal characteristics of the container. The first level of
protection is presented in any steganographic channel.
Steganographic system in this case can be represented as shown at
The First Protection Level Scheme figure.

                                                                 Page 29
The second protection level of the steganographic system, as well as all levels of
protection of the higher orders, is characterized by the use of Key (password)
via steganographic modification. An example of a simple key scheme, which
provides a second level of protection, is to write the unmodified or modified
password in the top or bottom of the message; or the distribution of the
password sign on the entire length of the steganographic channel. Such key
schemes do not affect the distribution of messages through the container and
do not use a message preprocessing according to the defined key (see figure The
Second Protection Level Scheme). This kind of steganographic systems are used
in such tasks as, for instance, adding a digital signature for proof of copyright.
Data embedding performance is not changed in comparison with the fastest
approach of the first protection level usage.                                  Page 30
Steganographic data channels that use key schemes based distribution of a
message through the container and or preprocessing of an embedded message for
data hiding are more secure. When the third protection level key scheme is used
it affects the distribution of a message through the container (see figure The
Third Protection Level Scheme, where F(P, L) – distribution function of a message
within a container; P – minimum number of container samples that are needed to
embed one message sample; L – step of a message distribution within a container).
Accordingly, the performance of container processing will be lower than in the
case of the first and the second key schemes. Taking into account that P≥L, the
simplest representation of the F(P, L) function could be as following:
F(P, L) = cycle*L + step*P,
                                                                           Page 31
The difference between the fourth protection level scheme and the
third one is that in steganographic system there are two
distribution functions of a message within a container are used. The
first is responsible for a message samples selection according to
some function G(Q, N), and the second function F(P, L) is responsible
for position selection in a container for message sample hiding. Here
Q – the size of message block to be inserted; N – the size (in bits)
of one sample of the message file (see figure The Fourth Protection
Level Scheme).
                                                                 Page 32
Countermeasures and detection

 • In computing, detection of steganographically
   encoded packages is called steganalysis. The
   simplest method to detect modified files,
   however, is to compare them to known
   originals.
 • For example, to detect information being
   moved through the graphics on a website, an
   analyst can maintain known-clean copies of
   these materials and compare them against the
   current contents of the site. The
   differences, assuming the carrier is the same,
   will compose the payload.
 • Steganalysis can have a two-sided approach  Page 33
• Steganalysis can have a two-sided approach
  that involves detecting both artifacts and
  signatures of known steganography
  applications.All files on a suspect filesystem
  can be hashed using a hash function and then
  compared to a hash table of known
  steganography applications to show that a
  particular steganography application is, or
  was, present on the system at some point in
  time. The second step in the steganalysis
  process is to search all files on a suspect
  filesystem for signatures (uniquely
  identifiable byte patterns) that act as
  identifiers that are embedded as a result of
  hiding the information.

                                               Page 34
• Difference between Cryptography and
  Steganography & Watermarking

• Cryptography hides the content of the
  message, but not the existence of the
  message; steganography & watermarking hide
  both the contents and existence of the
  message.




                                           Page 35
• Then what is the difference between
  Steganography and Watermarking?

• Steganography performs message hiding such
  that an attacker cannot detect the presence
  of the message in the image/video/audio;
  watermarking hides the message such that an
  attacker cannot tamper with the message
  contained within the image/video/audio.



                                            Page 36
Applications

 • Used in modern printers
 • Allegedly used by terrorists. e.g. It is alleged
   that Al-Queda used Chaffing to encrypt
   messages at time of 9/11 and exchanging images
   via ebay.com.
 • Alleged use by intelligence services:          In
   2010, the FBI revealed that the Russian foreign
   intelligence uses customized steganography
   software for embedding encrypted text
   messages inside image files for certain
   communications with "illegal agents“ stationed
   abroad.
 • Digital Watermarking

                                                   Page 37
The Conclusion
 • The conclusion is that in this world there are
                        still




      too many secrets
       setec astronomy
                                               Page 38
Hanky Out




IT MEANS: THANK YOU

                      Page 39

More Related Content

What's hot

Steganography
SteganographySteganography
Steganography
Jaykrishna Thakkar
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
BSheghembe
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data
Sanjay Bhoyar
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
Ashwin Prasad
 
Steganography
SteganographySteganography
Steganography
Prashant D Superstud
 
About Steganography
About SteganographyAbout Steganography
About Steganography
Sudhansh Gupta
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Ankit Gupta
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
TeachMission
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
James Ridgway
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
Sharath Reddy
 
Steganography.
Steganography.Steganography.
Steganography.
yprajapati
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
Sreelekshmi Sree
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
Image steganography
Image steganographyImage steganography
Image steganography
vaidya_sanyu
 
steganography
steganographysteganography
steganography
shiveverma
 

What's hot (20)

Steganography
SteganographySteganography
Steganography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Steganography - A smart way to hide data
Steganography - A smart way to hide data Steganography - A smart way to hide data
Steganography - A smart way to hide data
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Presentation On Steganography
Presentation On SteganographyPresentation On Steganography
Presentation On Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography.
Steganography.Steganography.
Steganography.
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Image steganography
Image steganographyImage steganography
Image steganography
 
steganography
steganographysteganography
steganography
 

Similar to Steganography

Steganography
SteganographySteganography
Steganography
Madhani Harsh
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
Mazin Alwaaly
 
Steganography
SteganographySteganography
Steganography
Madhani Harsh
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
Kiakaha17
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
Firdous Ahmad Khan
 
18-steganography.ppt
18-steganography.ppt18-steganography.ppt
18-steganography.ppt
Rakesh Kumar
 
art of Steganography
art of Steganography art of Steganography
art of Steganography
Joshpin Bala.B
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
sudip nandi
 
SteganographyonImage.ppt
SteganographyonImage.pptSteganographyonImage.ppt
SteganographyonImage.ppt
Santu Chall
 
Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganography
Xavier Prathap
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
ThusharaBAmigoz1
 
Steganography
SteganographySteganography
Steganography
ShriSailaxmiS
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Steganography
SteganographySteganography
SteganographySonam M
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
AkashBhosale50
 
8-steg.ppt
8-steg.ppt8-steg.ppt
8-steg.ppt
ragsahao2
 
Color Cryptography using Substitution Method
Color Cryptography using Substitution MethodColor Cryptography using Substitution Method
Color Cryptography using Substitution Method
ijtsrd
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
misbanausheenparvam
 

Similar to Steganography (20)

Steganography
SteganographySteganography
Steganography
 
Information and data security steganography and watermarking
Information and data security steganography and watermarkingInformation and data security steganography and watermarking
Information and data security steganography and watermarking
 
Steganography
SteganographySteganography
Steganography
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
 
Steganography(Presentation)
Steganography(Presentation)Steganography(Presentation)
Steganography(Presentation)
 
18-steganography.ppt
18-steganography.ppt18-steganography.ppt
18-steganography.ppt
 
art of Steganography
art of Steganography art of Steganography
art of Steganography
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
SteganographyonImage.ppt
SteganographyonImage.pptSteganographyonImage.ppt
SteganographyonImage.ppt
 
Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganography
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
 
Steganography
SteganographySteganography
Steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
8-steg.ppt
8-steg.ppt8-steg.ppt
8-steg.ppt
 
Color Cryptography using Substitution Method
Color Cryptography using Substitution MethodColor Cryptography using Substitution Method
Color Cryptography using Substitution Method
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Ppt nc
Ppt ncPpt nc
Ppt nc
 
Info hiding
Info hidingInfo hiding
Info hiding
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Steganography

  • 1. Steganography By Harsh Madhani Computer Engineering Page 1
  • 2. cryptography κρσπό ς γραυία hidden writing A secret manner of writing, … Generally, the art of writing or solving ciphers. — Oxford English Dictionary Page 2
  • 3. cryptology κρσπός λογια hidden speaking 1967 D. Kahn, Codebreakers p. xvi, Cryptology is the science that embraces cryptography and cryptanalysis, but the term ‘cryptology’ sometimes loosely designates the entire dual field of both rendering signals secure and extracting information from them. — Oxford English Dictionary Page 3
  • 4. Steganography στεγαμός γραυία covered writing The art of secret (hidden) writing Page 4
  • 5. PATS A HORNY EGG STEGANOGRAPHY Page 5
  • 6. Steganography Art and science of communicating in a way that hides the existence of a message signal or pattern imposed on content – persistent under transmission – not encryption • original image/file is intact – not fingerprinting • fingerprinting leaves separate file describing contents Page 6
  • 7. • Steganography includes the concealment of information within computer files. • In digital Steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. • Media files are ideal for steganographic transmission because of their large size. • As a simple example, a sender might start with an innocuous image file and adjust the color of every 100th pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it. Page 7
  • 8. Classic techniques • Invisible ink (1st century AD - WW II) • Tatoo message on head • Overwrite select characters in printed type in pencil – look for the gloss • Pin punctures in type • Microdots (WW II) • Newspaper clippings, knitting instructions, XOXO signatures, report cards, … Page 8
  • 9. Digital Steganography • Modern Steganography entered the world in 1985 with the advent of the personal computer being applied to classical Steganography problems. • Over 925 digital Steganography applications have been identified by the Steganography Analysis and Research Center.Digital Steganography techniques include: • Concealing messages within the lowest bits of noisy images or sound files. • Chaffing and winnowing. Page 9
  • 10. • Concealed messages in tampered executable files, exploiting redundancy in the targeted instruction set. • Pictures embedded in video material (optionally played at slower or faster speed). • Injecting imperceptible delays to packets sent over the network from the keyboard. • Delays in keypresses in some applications (telnet or remote desktop software) can mean a delay in packets, and the delays in the packets can be used to encode data. • Image bit-plane complexity segmentation Steganography Page 10
  • 11. Chaffing & Winnowing • Separate good messages from the bad ones • Stream of unencoded messages with signatures – Some signatures are bogus – Need key to test Alice Bob M3 M2 M1 M0 M3 M2 M1 M0 Irene × OK × × M3 M2 M1 M0 ? ? ? ? Page 11
  • 12. Null Cipher • Hide message among irrelevant data • Confuse the cryptoanalyst Page 12
  • 13. Null Cipher • Hide message among irrelevant data • Confuse the cryptoanalyst Big rumble in New Guinea. The war on celebrity acts should end soon. Over four big ecstatic elephants replicated. Page 13
  • 14. Null Cipher • Hide message among irrelevant data • Confuse the cryptoanalyst Big rumble in New Guinea. The war on celebrity acts should end soon. Over four big ecstatic elephants replicated. Bring two cases of beer. Page 14
  • 15. Network Steganography • Network Steganography utilizes communication protocols' control elements and their basic intrinsic functionality. • Typical network Steganography methods involve modification of the properties of a single network protocol. • Moreover, it is feasible to utilize the relation between two or more different network protocols to enable secret communication. These applications fall under the term inter- protocol Steganography.[14] Page 15
  • 16. • Steganophony - the concealment of messages in Voice-over-IP conversations, e.g. the employment of delayed or corrupted packets that would normally be ignored by the receiver (this method is called LACK - Lost Audio Packets Steganography), or, alternatively, hiding information in unused header fields. Page 16
  • 17. Image watermarking • Spatial domain watermarking – bit flipping – color separation • Frequency domain watermarking – embed signal in select frequency bands (e.g. high frequency areas) – apply FFT/DCT transform first – e.g. Digimarc – watermark should alter the least perceptible bits • these are the same bits targeted by lossy image compression software Page 17
  • 18. UV Watermarking Page 18
  • 19. Machine ID codes in laser printers See http://www.eff.org/Privacy/printers/ Page 19
  • 20. Machine ID codes in laser printers Page 20
  • 21. Machine ID codes in laser printers Page 21
  • 22. Machine ID codes in laser printers Page 22
  • 23. Text • Text lines shifted up/down (40 lines text  240 codes) • word space coding • character encoding - minor changes to shapes of characters Page 23
  • 24. Text • Text lines shifted up/down (40 lines text  240 codes) • word space coding • character encoding - minor changes to shapes of characters • works only on “images” of text e.g., PDF, postscript Page 24
  • 25. Image Steganography Image of a tree with a steganographically hidden Image of a cat extracted image. The hidden image is revealed by removing all but from the tree image the two least significant bits besides. of each color component and a subsequent normalization. Page 25
  • 26. Audio Perceptual coding – inject signal into areas that will not be detected by humans – may be obliterated by compression Hardware with copy-protection – not true watermarking - metadata present on media – DAT – minidisc – presence of copy protection mechanisms often failed to give the media wide-spread acceptance Page 26
  • 27. Video • Coding still frames - spatial or frequency • data encoded during refresh – closed captioning • visible watermarking – used by most networks (logo at bottom-right) Page 27
  • 28. Data Embedding Security Schemes • One of the areas that improves steganographic robustness is usage of a key scheme for embedding messages.Key scheme term means a procedure of how to use key steganographic system based on the extent of its use. However, when the steganographic robustness is increased a bandwidth of the whole embedding system is decreased. Therefore the task of a scheme selection for achieving the optimal values of the steganographic system is not trivial. Page 28
  • 29. The first level of protection is determined only by the choice of embedding algorithm. This may be the least significant bits modification algorithm, or algorithms for modifying the frequency or spatial-temporal characteristics of the container. The first level of protection is presented in any steganographic channel. Steganographic system in this case can be represented as shown at The First Protection Level Scheme figure. Page 29
  • 30. The second protection level of the steganographic system, as well as all levels of protection of the higher orders, is characterized by the use of Key (password) via steganographic modification. An example of a simple key scheme, which provides a second level of protection, is to write the unmodified or modified password in the top or bottom of the message; or the distribution of the password sign on the entire length of the steganographic channel. Such key schemes do not affect the distribution of messages through the container and do not use a message preprocessing according to the defined key (see figure The Second Protection Level Scheme). This kind of steganographic systems are used in such tasks as, for instance, adding a digital signature for proof of copyright. Data embedding performance is not changed in comparison with the fastest approach of the first protection level usage. Page 30
  • 31. Steganographic data channels that use key schemes based distribution of a message through the container and or preprocessing of an embedded message for data hiding are more secure. When the third protection level key scheme is used it affects the distribution of a message through the container (see figure The Third Protection Level Scheme, where F(P, L) – distribution function of a message within a container; P – minimum number of container samples that are needed to embed one message sample; L – step of a message distribution within a container). Accordingly, the performance of container processing will be lower than in the case of the first and the second key schemes. Taking into account that P≥L, the simplest representation of the F(P, L) function could be as following: F(P, L) = cycle*L + step*P, Page 31
  • 32. The difference between the fourth protection level scheme and the third one is that in steganographic system there are two distribution functions of a message within a container are used. The first is responsible for a message samples selection according to some function G(Q, N), and the second function F(P, L) is responsible for position selection in a container for message sample hiding. Here Q – the size of message block to be inserted; N – the size (in bits) of one sample of the message file (see figure The Fourth Protection Level Scheme). Page 32
  • 33. Countermeasures and detection • In computing, detection of steganographically encoded packages is called steganalysis. The simplest method to detect modified files, however, is to compare them to known originals. • For example, to detect information being moved through the graphics on a website, an analyst can maintain known-clean copies of these materials and compare them against the current contents of the site. The differences, assuming the carrier is the same, will compose the payload. • Steganalysis can have a two-sided approach Page 33
  • 34. • Steganalysis can have a two-sided approach that involves detecting both artifacts and signatures of known steganography applications.All files on a suspect filesystem can be hashed using a hash function and then compared to a hash table of known steganography applications to show that a particular steganography application is, or was, present on the system at some point in time. The second step in the steganalysis process is to search all files on a suspect filesystem for signatures (uniquely identifiable byte patterns) that act as identifiers that are embedded as a result of hiding the information. Page 34
  • 35. • Difference between Cryptography and Steganography & Watermarking • Cryptography hides the content of the message, but not the existence of the message; steganography & watermarking hide both the contents and existence of the message. Page 35
  • 36. • Then what is the difference between Steganography and Watermarking? • Steganography performs message hiding such that an attacker cannot detect the presence of the message in the image/video/audio; watermarking hides the message such that an attacker cannot tamper with the message contained within the image/video/audio. Page 36
  • 37. Applications • Used in modern printers • Allegedly used by terrorists. e.g. It is alleged that Al-Queda used Chaffing to encrypt messages at time of 9/11 and exchanging images via ebay.com. • Alleged use by intelligence services: In 2010, the FBI revealed that the Russian foreign intelligence uses customized steganography software for embedding encrypted text messages inside image files for certain communications with "illegal agents“ stationed abroad. • Digital Watermarking Page 37
  • 38. The Conclusion • The conclusion is that in this world there are still too many secrets setec astronomy Page 38
  • 39. Hanky Out IT MEANS: THANK YOU Page 39