This document provides an overview of steganography, the art and science of hidden writing. It defines steganography as communicating in a way that hides the existence of a message. The document then discusses various digital and analog steganography techniques, including embedding messages in images, audio, video and other file types. It also covers the use of machine identification codes in printers, text encoding, and security schemes used to improve steganographic robustness.
Steganography (US Listeni/ˌstɛ.ɡʌnˈɔː.ɡrʌ.fi/, UK /ˌstɛɡ.ənˈɒɡ.rə.fi/) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (στεγανός), meaning "covered, concealed, or protected", and graphein (γράφειν) meaning "writing"
Steganography (US Listeni/ˌstɛ.ɡʌnˈɔː.ɡrʌ.fi/, UK /ˌstɛɡ.ənˈɒɡ.rə.fi/) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (στεγανός), meaning "covered, concealed, or protected", and graphein (γράφειν) meaning "writing"
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos meaning "covered, concealed, or protected", and graphein meaning "writing".
The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. Some implementations of steganography that lack a shared secret are forms of security through obscurity, whereas key-dependent steganographic schemes adhere to Kerckhoffs's principle.
The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages—no matter how unbreakable—arouse interest, and may in themselves be incriminating in countries where encryption is illegal.Thus, whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message.
Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. For example, a sender might start with an innocuous image file and adjust the color of every 100th pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it.
Steganography is the art and science of sending covert messages such that the existence and nature of such a message is only known by the sender and intended recipient.
Steganography has been practised for thousands of years, but in the last two decades steganography has been introduced to digital media. Digital steganography techniques typically focus on hiding messages inside image and audio files; in comparison, the amount of research into other digital media formats (such as video) is substantially limited.
In this talk we will discuss the history of steganography and the categories of steganographic technique before briefly discussing image and audio steganography and how to build such tools. The main body of our talk will focus on how video files are coded and the steganographic techniques that can be used to hide messages inside video files.
The principles discussed in this talk will be illustrated with live demos.
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos meaning "covered, concealed, or protected", and graphein meaning "writing".
The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. Some implementations of steganography that lack a shared secret are forms of security through obscurity, whereas key-dependent steganographic schemes adhere to Kerckhoffs's principle.
The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages—no matter how unbreakable—arouse interest, and may in themselves be incriminating in countries where encryption is illegal.Thus, whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned with concealing the fact that a secret message is being sent, as well as concealing the contents of the message.
Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. For example, a sender might start with an innocuous image file and adjust the color of every 100th pixel to correspond to a letter in the alphabet, a change so subtle that someone not specifically looking for it is unlikely to notice it.
Steganography is the art and science of sending covert messages such that the existence and nature of such a message is only known by the sender and intended recipient.
Steganography has been practised for thousands of years, but in the last two decades steganography has been introduced to digital media. Digital steganography techniques typically focus on hiding messages inside image and audio files; in comparison, the amount of research into other digital media formats (such as video) is substantially limited.
In this talk we will discuss the history of steganography and the categories of steganographic technique before briefly discussing image and audio steganography and how to build such tools. The main body of our talk will focus on how video files are coded and the steganographic techniques that can be used to hide messages inside video files.
The principles discussed in this talk will be illustrated with live demos.
Visual Cryptography Concepts like digital steganography, its principles, requirements, the operations involved, its generic model, the evolution of steganography, and about the types of steganography along with some examples. Also about digital watermarking, the requirements of digital water marking and the types of digital watermarking
Steganography in digital image processing is viewed as a future technology, in processing image and hidden techniques behind sending an image secretly by covering it up something.
Color Cryptography using Substitution Methodijtsrd
In world of computer network, fears come in many different forms. Some of the most common fears today are software attacks. If we want to secure any type of data then we can use encryption method. All traditional encryption methods use substitution and switch. Substitution methods map plain text into ciphertext in which characters, numbers and special symbols are substituted with other characters, numbers and special symbols. In this paper, we are using a creative cryptographic replacement method is to generate a stronger cipher than the existing replacement algorithms. This method focuses on the replacement of characters, numbers and special symbols with color blocks. This algorithm of substitution is based on Play Color Cipher. Yashvanth. L | Dr. N. Shanmugapriya "Color Cryptography using Substitution Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-1 , December 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29360.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/29360/color-cryptography-using-substitution-method/yashvanth-l
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Art of the Pitch: WordPress Relationships and Sales
Steganography
1. Steganography
By
Harsh Madhani
Computer Engineering
Page 1
2. cryptography
κρσπό ς γραυία
hidden writing
A secret manner of writing, … Generally, the art of
writing or solving ciphers.
— Oxford English Dictionary
Page 2
3. cryptology
κρσπός λογια
hidden speaking
1967 D. Kahn, Codebreakers p. xvi, Cryptology is the
science that embraces cryptography and cryptanalysis,
but the term ‘cryptology’ sometimes loosely designates
the entire dual field of both rendering signals secure
and extracting information from them.
— Oxford English Dictionary
Page 3
4. Steganography
στεγαμός γραυία
covered writing
The art of secret (hidden) writing
Page 4
6. Steganography
Art and science of communicating in a way that
hides the existence of a message
signal or pattern imposed on content
– persistent under transmission
– not encryption
• original image/file is intact
– not fingerprinting
• fingerprinting leaves separate file describing contents
Page 6
7. • Steganography includes the concealment of
information within computer files.
• In digital Steganography, electronic
communications may include steganographic
coding inside of a transport layer, such as a
document file, image file, program or protocol.
• Media files are ideal for steganographic
transmission because of their large size.
• As a simple example, a sender might start
with an innocuous image file and adjust the
color of every 100th pixel to correspond to a
letter in the alphabet, a change so subtle that
someone not specifically looking for it is
unlikely to notice it.
Page 7
8. Classic techniques
• Invisible ink (1st century AD - WW II)
• Tatoo message on head
• Overwrite select characters in printed type in
pencil
– look for the gloss
• Pin punctures in type
• Microdots (WW II)
• Newspaper clippings, knitting instructions,
XOXO signatures, report cards, …
Page 8
9. Digital Steganography
• Modern Steganography entered the world in
1985 with the advent of the personal
computer being applied to classical
Steganography problems.
• Over 925 digital Steganography applications
have been identified by the Steganography
Analysis and Research Center.Digital
Steganography techniques include:
• Concealing messages within the lowest bits of
noisy images or sound files.
• Chaffing and winnowing.
Page 9
10. • Concealed messages in tampered executable
files, exploiting redundancy in the targeted
instruction set.
• Pictures embedded in video material
(optionally played at slower or faster speed).
• Injecting imperceptible delays to packets
sent over the network from the keyboard.
• Delays in keypresses in some applications
(telnet or remote desktop software) can mean
a delay in packets, and the delays in the
packets can be used to encode data.
• Image bit-plane complexity segmentation
Steganography
Page 10
11. Chaffing & Winnowing
• Separate good messages from the bad ones
• Stream of unencoded messages with signatures
– Some signatures are bogus
– Need key to test
Alice Bob
M3 M2 M1 M0 M3 M2 M1 M0
Irene × OK × ×
M3 M2 M1 M0
? ? ? ?
Page 11
12. Null Cipher
• Hide message among irrelevant data
• Confuse the cryptoanalyst
Page 12
13. Null Cipher
• Hide message among irrelevant data
• Confuse the cryptoanalyst
Big rumble in New Guinea.
The war on
celebrity acts should end soon.
Over four
big ecstatic elephants replicated.
Page 13
14. Null Cipher
• Hide message among irrelevant data
• Confuse the cryptoanalyst
Big rumble in New Guinea.
The war on
celebrity acts should end soon.
Over four
big ecstatic elephants replicated.
Bring two cases of beer.
Page 14
15. Network Steganography
• Network Steganography utilizes
communication protocols' control elements
and their basic intrinsic functionality.
• Typical network Steganography methods
involve modification of the properties of a
single network protocol.
• Moreover, it is feasible to utilize the relation
between two or more different network
protocols to enable secret communication.
These applications fall under the term inter-
protocol Steganography.[14]
Page 15
16. • Steganophony - the concealment of messages
in Voice-over-IP conversations, e.g. the
employment of delayed or corrupted packets
that would normally be ignored by the
receiver (this method is called LACK - Lost
Audio Packets Steganography), or,
alternatively, hiding information in unused
header fields.
Page 16
17. Image watermarking
• Spatial domain watermarking
– bit flipping
– color separation
• Frequency domain watermarking
– embed signal in select frequency bands (e.g. high
frequency areas)
– apply FFT/DCT transform first
– e.g. Digimarc
– watermark should alter the least perceptible bits
• these are the same bits targeted by lossy image
compression software
Page 17
23. Text
• Text lines shifted up/down (40 lines text
240 codes)
• word space coding
• character encoding - minor changes to shapes
of characters
Page 23
24. Text
• Text lines shifted up/down (40 lines text
240 codes)
• word space coding
• character encoding - minor changes to shapes
of characters
• works only on “images” of text e.g., PDF, postscript Page 24
25. Image Steganography
Image of a tree with a
steganographically hidden Image of a cat extracted
image. The hidden image is
revealed by removing all but from the tree image
the two least significant bits besides.
of each color component and a
subsequent normalization. Page 25
26. Audio
Perceptual coding
– inject signal into areas that will not be detected by humans
– may be obliterated by compression
Hardware with copy-protection
– not true watermarking - metadata present on media
– DAT
– minidisc
– presence of copy protection mechanisms often failed to give
the media wide-spread acceptance
Page 26
27. Video
• Coding still frames - spatial or frequency
• data encoded during refresh
– closed captioning
• visible watermarking
– used by most networks (logo at bottom-right)
Page 27
28. Data Embedding Security Schemes
• One of the areas that improves
steganographic robustness is usage of a key
scheme for embedding messages.Key scheme
term means a procedure of how to use key
steganographic system based on the extent
of its use. However, when the steganographic
robustness is increased a bandwidth of the
whole embedding system is decreased.
Therefore the task of a scheme selection for
achieving the optimal values of the
steganographic system is not trivial.
Page 28
29. The first level of protection is determined only by the choice of
embedding algorithm. This may be the least significant bits
modification algorithm, or algorithms for modifying the frequency or
spatial-temporal characteristics of the container. The first level of
protection is presented in any steganographic channel.
Steganographic system in this case can be represented as shown at
The First Protection Level Scheme figure.
Page 29
30. The second protection level of the steganographic system, as well as all levels of
protection of the higher orders, is characterized by the use of Key (password)
via steganographic modification. An example of a simple key scheme, which
provides a second level of protection, is to write the unmodified or modified
password in the top or bottom of the message; or the distribution of the
password sign on the entire length of the steganographic channel. Such key
schemes do not affect the distribution of messages through the container and
do not use a message preprocessing according to the defined key (see figure The
Second Protection Level Scheme). This kind of steganographic systems are used
in such tasks as, for instance, adding a digital signature for proof of copyright.
Data embedding performance is not changed in comparison with the fastest
approach of the first protection level usage. Page 30
31. Steganographic data channels that use key schemes based distribution of a
message through the container and or preprocessing of an embedded message for
data hiding are more secure. When the third protection level key scheme is used
it affects the distribution of a message through the container (see figure The
Third Protection Level Scheme, where F(P, L) – distribution function of a message
within a container; P – minimum number of container samples that are needed to
embed one message sample; L – step of a message distribution within a container).
Accordingly, the performance of container processing will be lower than in the
case of the first and the second key schemes. Taking into account that P≥L, the
simplest representation of the F(P, L) function could be as following:
F(P, L) = cycle*L + step*P,
Page 31
32. The difference between the fourth protection level scheme and the
third one is that in steganographic system there are two
distribution functions of a message within a container are used. The
first is responsible for a message samples selection according to
some function G(Q, N), and the second function F(P, L) is responsible
for position selection in a container for message sample hiding. Here
Q – the size of message block to be inserted; N – the size (in bits)
of one sample of the message file (see figure The Fourth Protection
Level Scheme).
Page 32
33. Countermeasures and detection
• In computing, detection of steganographically
encoded packages is called steganalysis. The
simplest method to detect modified files,
however, is to compare them to known
originals.
• For example, to detect information being
moved through the graphics on a website, an
analyst can maintain known-clean copies of
these materials and compare them against the
current contents of the site. The
differences, assuming the carrier is the same,
will compose the payload.
• Steganalysis can have a two-sided approach Page 33
34. • Steganalysis can have a two-sided approach
that involves detecting both artifacts and
signatures of known steganography
applications.All files on a suspect filesystem
can be hashed using a hash function and then
compared to a hash table of known
steganography applications to show that a
particular steganography application is, or
was, present on the system at some point in
time. The second step in the steganalysis
process is to search all files on a suspect
filesystem for signatures (uniquely
identifiable byte patterns) that act as
identifiers that are embedded as a result of
hiding the information.
Page 34
35. • Difference between Cryptography and
Steganography & Watermarking
• Cryptography hides the content of the
message, but not the existence of the
message; steganography & watermarking hide
both the contents and existence of the
message.
Page 35
36. • Then what is the difference between
Steganography and Watermarking?
• Steganography performs message hiding such
that an attacker cannot detect the presence
of the message in the image/video/audio;
watermarking hides the message such that an
attacker cannot tamper with the message
contained within the image/video/audio.
Page 36
37. Applications
• Used in modern printers
• Allegedly used by terrorists. e.g. It is alleged
that Al-Queda used Chaffing to encrypt
messages at time of 9/11 and exchanging images
via ebay.com.
• Alleged use by intelligence services: In
2010, the FBI revealed that the Russian foreign
intelligence uses customized steganography
software for embedding encrypted text
messages inside image files for certain
communications with "illegal agents“ stationed
abroad.
• Digital Watermarking
Page 37
38. The Conclusion
• The conclusion is that in this world there are
still
too many secrets
setec astronomy
Page 38