Internet Society © 1992–2016
‫املعلومات‬ ‫أخفاء‬
Steganography
Muheeb Ghallab
Security and network engineer
muheeb0gh@gmail.com
12/2/2018
1
2
3
What is Steganography?
Origin of the term: steganos: secret – graphy: writing
4
5
Types of Digital Steganography
 Governments : hide sensitive data
 Businesses : Digital Watermarking
 Individuals : working
6
Types of Digital Steganography
Hiding a Message inside Text
Hiding a Message inside Images
Hiding a Message inside Audio and Video Files
Supporting content outlining
the following section.
Sub-section divider title
7
How Steganography works ?
8
 Detecting and decoding the hidden data within a
given medium
 Even if secret content is not revealed, modifying the
cover medium changes the medium’s statistical
properties
 Distributed Dictionary Attack
9
Steganalysis
Supporting content outlining
the following section.
Sub-section divider title
10
11
Steganography ToolsSteganalysis Tools
12
Also, phone
Hiding a Message inside
Audio or Videos Files
13
Advantages
 Human limitations – 20.000 Hz.
 Large amount of data that can be hidden inside
 Hard to recognize because of because of the continuous
flow of information (moving stream of images and sound)
Practical example
14
15
Steganography and Cryptography are closely related
The difference is in their goals...
Cryptography: although encypted and unreadable, the existence of data is not hidden
Steganography: no knowledge of the existence of the data
*Steganography and Cryptography can be used
together to produce better protection
16
 The most important use of steganographic techniques will probably lie
in the field of digital watermarking .
 Copyright.
 Might become limited under laws - governments claimed that
criminals use steganography to communicate.
 It will be used in media for protecting workers
in this field .
 Support private communication .
Future of Steganography
Questions
18
Thank you.
Visit us at
www.internetsociety.org
Follow us
@internetsociety
Galerie Jean-Malbuisson 15,
CH-1204 Geneva,
Switzerland.
+41 22 807 1444
1775 Wiehle Avenue,
Suite 201, Reston, VA
20190-5108 USA.
+1 703 439 2120
Muheeb Ghallab
19
20
Ref.
- Wikipedia
- CEH
Visit us at
www.internetsociety.org
Follow us
@internetsociety
Galerie Jean-Malbuisson 15,
CH-1204 Geneva,
Switzerland.
+41 22 807 1444
1775 Wiehle Avenue,
Suite 201, Reston, VA
20190-5108 USA.
+1 703 439 2120
Get involved.
There are many ways to support
the Internet. Find out today how
you can make an impact.
21

Steganography - Muheeb Ghallab

  • 1.
    Internet Society ©1992–2016 ‫املعلومات‬ ‫أخفاء‬ Steganography Muheeb Ghallab Security and network engineer muheeb0gh@gmail.com 12/2/2018 1
  • 2.
  • 3.
    3 What is Steganography? Originof the term: steganos: secret – graphy: writing
  • 4.
  • 5.
    5 Types of DigitalSteganography  Governments : hide sensitive data  Businesses : Digital Watermarking  Individuals : working
  • 6.
    6 Types of DigitalSteganography Hiding a Message inside Text Hiding a Message inside Images Hiding a Message inside Audio and Video Files
  • 7.
    Supporting content outlining thefollowing section. Sub-section divider title 7 How Steganography works ?
  • 8.
  • 9.
     Detecting anddecoding the hidden data within a given medium  Even if secret content is not revealed, modifying the cover medium changes the medium’s statistical properties  Distributed Dictionary Attack 9 Steganalysis
  • 10.
    Supporting content outlining thefollowing section. Sub-section divider title 10
  • 11.
  • 12.
  • 13.
    Hiding a Messageinside Audio or Videos Files 13 Advantages  Human limitations – 20.000 Hz.  Large amount of data that can be hidden inside  Hard to recognize because of because of the continuous flow of information (moving stream of images and sound)
  • 14.
  • 15.
    15 Steganography and Cryptographyare closely related The difference is in their goals... Cryptography: although encypted and unreadable, the existence of data is not hidden Steganography: no knowledge of the existence of the data *Steganography and Cryptography can be used together to produce better protection
  • 16.
    16  The mostimportant use of steganographic techniques will probably lie in the field of digital watermarking .  Copyright.  Might become limited under laws - governments claimed that criminals use steganography to communicate.  It will be used in media for protecting workers in this field .  Support private communication . Future of Steganography
  • 18.
  • 19.
    Thank you. Visit usat www.internetsociety.org Follow us @internetsociety Galerie Jean-Malbuisson 15, CH-1204 Geneva, Switzerland. +41 22 807 1444 1775 Wiehle Avenue, Suite 201, Reston, VA 20190-5108 USA. +1 703 439 2120 Muheeb Ghallab 19
  • 20.
  • 21.
    Visit us at www.internetsociety.org Followus @internetsociety Galerie Jean-Malbuisson 15, CH-1204 Geneva, Switzerland. +41 22 807 1444 1775 Wiehle Avenue, Suite 201, Reston, VA 20190-5108 USA. +1 703 439 2120 Get involved. There are many ways to support the Internet. Find out today how you can make an impact. 21