SlideShare a Scribd company logo
STEGANOGRAPHY
The art and science of hiding communication!!

Firdous Ahmad1 Khan
102/10
CSE @ NIT SXR
TABLE OF CONTENTS
• Introduction
• Different Than Cryptography
• Historical Perspective
• Steganography in Written Text
• Modern Steganography
• Text In Image
• Image in Image
• Audio & Video Steganography

• UV Watermarking

• Network Steganography
• Steganalysis
• Conclusion
• References

2
INTRODUCTION
• Derived from the Greek words steganos (στεγανός) meaning "covered or
protected," and graphei (γραυή) meaning "writing."

• It is the art of hiding stuff in stuff so that others can’t see your stuff.
• Steganography is the practice of hiding data in other data in an effort to keep third
parties from knowing that the intended message is even there !

• Encryption's ugly step brother !
• It has art aspects since human judgment is involved.
• Principle : Principle Of Steganography.mp4
3
DIFFERENT THAN CRYPTOGRAPHY
• Cryptography is the essence to prepare a message in such a way that unauthorized
parties aren’t able to understand it while as Steganography is the essence to
embed secret messages within seemingly innocent carriers such that unauthorized
parties are unaware of the communication.
• Cryptography provides privacy, Steganography is intended to provide secrecy.
• Steganography
– hide, without altering
– obfuscates the fact of communication, not the data
– preventative - deters attacks

• Cryptography
– alter, without hiding
– obfuscates the data, not the fact of communication
– curative - defends attacks

4
HISTORICAL PERSPECTIVE
• Dates back to 400 BC when Histaeus sent a message, by shaving the
head of his most trusted slave, then tattooed a message on the slave's
scalp, to his friend Aristagorus, urging revolt against the Persians.
• Demaratus tells Athens of Persia’s attack plans by writing the secret
message on a tablet, & covers it with wax.
• Chinese wrote messages on silk and encased them in balls of wax. The
wax ball, "la wan," could then be hidden in the messenger.

• A more subtle method, nearly as old, is to use invisible ink( lemon juice,
milk, or urine, all of which turn dark when held over a flame).
• Microdots used by Germany in WW2 documents shrunk to the size of a
dot & embedded within innocent letters. Inkjet dots smaller than human
eyes can see.
5

Wentworth Miller
[Prison Break Serial]
b. Microdot

c. First Publication on Steganography

Also the first book on Steganography was entitled “Steganograpia” written by Johannes Trithemius in the
6
XVI century.
• Proposed by Girolamo Cardano in XV century.
• Carden grille was a sheet of parchment with
apertures for writing text.

• Pricking pin holes above or below the letters in a
newspaper or article.
7
• Used by Nazi Forces in WW2.
PRISONER’S PROBLEM
• In 1984 Gustavus Simmons formulated this
problem.
• Two accomplices are arrested in separate
cells & are allowed to communicate via
warden who can look into the contents of
their communication.
• The prisoners are to agree on an escape
plan without raising suspicion of the warden.
• Solution is to create a subliminal
channel(communicate secretly in normal
looking communication over an insecure
channel)

8
STEGANOGRAPHY IN WRITTEN TEXT
• Covert text can be embedded in printed matter or in text.
• Embedding can also be by means of altering the
appearance of text as
a) Skewing
b) Altering

space

c) Offsetting
d) Font color alterations.

9
In 2004 it was revealed that several printer manufactures use steganography to hide
information about printer serial numbers and the manufacturing code to track
counterfeits.
Brother, Canon, Dell, Epson, HP, IBM, Konica Minolta, Kyocera, Lanier, Lexmark,
Ricoh, Toshiba, Xerox

10
• An actual message from German spy “read second letter in each word”
(example of NULL CIPHER)

“Apparently neutral's protest is thoroughly discounted and ignored.
Isman hard hit. Blockade issue affects pretext for embargo on byproducts, ejecting suets and vegetable oils”.
Pershing sails from NY June 1
• We explore new steganographic and cryptographic algorithms and
techniques throughout the world to produce
wide variety and
security in the electronic web called the Internet.
Explore The World Wide Web
• Use Different fonts to indicate 0/1 of letter encodings(Francis Bacon
Cipher)
• Laser printers can adjust spacing of lines and characters by less
than 1/300th of an inch. To hide a zero, leave a standard space,
and to hide a one leave 1/300th of an inch more than usual. Varying
the spacing over an entire document can hide a short binary
message that is undetectable by the human eye.
11
MODERN STEGANOGRAPHY
• Hiding one message within another(“container”)
• Most containers are rich media
 Images, audio, video are very redundant, can be tweaked without affecting human eye/ear
 US argued that Al_QAIDA implanted instructions within taped interviews.

• Copyright notices embedded in digital art
 Prove ownership(Watermarking)
 Serial number embedded to prevent replication
 Seek infringements on the web using spiders/crawlers

• Digital cameras EXIF(Exchangeable Image File Format) tags
 Not secretive but hidden from the eye
 Embed info such as camera type, date, shutter speed, focal length..

• Similarly, possible to embed messages in invisible part of html pages
12
TEXT IN IMAGE (2 METHODS)
• Consider a 8-bit grey scale image
 One pixel of information is stored using 8 bits.
 There are 256 different variations of grey.

• As a simple example of least significant bit(LSB) substitution, imagine "hiding" the character 'G'
across the following eight bytes of a carrier file (the least significant bits are underlined):
10010101 00001101 11001001 10010110
00001111 11001011 10011111 00010000
• A 'G' is represented in the American Standard Code for Information Interchange (ASCII) as the binary
string 01000111. These eight bits can be "written" to the least significant bit of each of the eight carrier
bytes as follows:
10010100

00001101

11001000 10010110

00001110

11001011

10011111 00010001

• In the sample above, only half of the least significant bits were actually changed (shown above in
italics). This makes some sense when one set of zeros and ones are being substituted with another
13
set of zeros and ones.
LSB ADVANTAGES AND DISADVANTAGES

Advantages
• Does not change the size of the file

• Is harder to detect than other steganography
techniques

Disadvantages
• Normally must use the original program to
hide and reveal data
• If the picture with the hidden information is
converted to another format, then the hidden
data may be lost
14
CAN YOU TELL THE DIFFERENCE

Original

Before Encoding:
255,0,0
FF,00,00
11111111,00000000,00000000

After Encoding “101”:
255,0,1
FF,00,01
11111111,00000001,00000001

Same file with “I should
be able to hold 37
bytes!!!” encoded

15
IMAGE IN IMAGE

The Image used for embedding should be 8 times greater than the image which is supposed to be kept
hidden.

16
AUDIO & VIDEO STEGANORAPHY
AUDIO

VIDEO

• Data is hidden by modifying sample data.

• Coding still frames - spatial or frequency

• Uncompressed audio formats

• data encoded during refresh

 – WAV (Waveform Audio File Format)
 – BWF (Broadcast Wave Format)

 – MBWF (Multichannel Broadcast Wave
Format)

• Compressed audio formats

 closed captioning

• visible watermarking
 used by most networks (logo at bottom-right)
Example : Audio Steganography.mp4

 Lossy
• MP3
• Advanced Audio Coding (AAC)

 Lossless
• Free Lossless Audio Codec (FLAC)
• Direct Stream Transfer (DST)

17
UV WATERMARKING
Spatial domain watermarking
• bit flipping
• color separation

Frequency domain watermarking

• embed signal in select frequency bands (e.g. high frequency areas)

18
NETWORK STEGANOGRAPHY
• Network Steganography
 Information hiding techniques which can be utilized to exchange steganograms in telecommunication networks.
 Can be Intra-protocol or Inter-protocol
 unused bits in packet headers
 IP(Type of service, Flags, fragment offset, etc.)
 TCP(Sequence Number)

• LACK(Lost Audio Packet Steganography)
 Hide information in packet delay.

• HICCUPS (Hidden Communication System for Corrupted Networks)
 Disguise information as natural “distortion” or noise.

• Operating System
 unused memory
slack space(Fragmentation issue)
unallocated space
 hidden partition
 normally used to hide data from investigators

19
STEGANOGRAPHY VS WATERMARKING

Goal of steganography
• Intruder cannot detect a message
• Primarily 1:1 communication

Goal of Watermarking
• Intruder cannot remove or replace the message
• Primarily 1:* communication
• Example : Watermarks.mp4
20
STEGANALYSIS
• The art and science of steganalysis is intended to detect or estimate hidden information
based on observing some data transfer.

• In some cases, just being caught sending a message can bring suspicion, or give
information to the 3rd party
• Why is this person hiding something?
• Why all the communication right now?

• Steganalysis techniques can be classified in a similar way as cryptanalysis methods, largely
based on how much prior information is known
• Steganography-only attack: The steganography medium is the only item available for analysis.
• Known-carrier attack: The carrier and steganography media are both available for analysis.
• Known-message attack: The hidden message is known.
• Chosen-steganography attack: The steganography medium and algorithm are both known.
• Chosen-message attack: A known message and steganography algorithm are used to create
steganography media for future analysis and comparison.
• Known-steganography attack: The carrier and steganography medium, as well as the
steganography algorithm, are known discipline with few articles appearing before the late 1990s.

21
STEGANOGRAPHY TOOLS
• Steganos
• S-Tools (GIF, BMP)
• StegHide (WAV, BMP)
• Invisible Secrets (JPEG)
• OpenPuff(BMP, JPEG, PNG)

• Camouflage
• MP3Stego(Open Source tool for audio)
• OpenStego (Open Source tool for images)
22
QUICK RECAP

23
CONCLUSION
• Steganography & Steganalysis are still at an early stage of research.
• Although in principle secure schemes exist, practical ones with reasonable capacity are known.
• Notion for security & capacity for steganography needs to be investigated.
• Since it obvious that no system of data hiding is totally immune to attacks. However,
steganography has its place in security. It in no way can replace cryptography, but is
intended to supplement it. Its application in watermarking for use in detection of unauthorized,
illegally copied material is continually being realized and developed.
• The growing number of communication protocols, services and computing environments
offers almost unlimited opportunities for displaying a whole spectrum of steganographic
methods.

24
REFERENCES
• http://www.petitcolas.net/fabien/steganography/history.html
• http://en.wikipedia.org/wiki/Steganography
• http://www.fbi.gov/about-us/lab/forensicsciencecommunications/fsc/july2004/research/2004_03_research01.htm
• http://stegano.net/tutorial/steg-history.html
• http://www.strangehorizons.com/2001/20011008/steganography.shtml
• http://www.docstoc.com/docs/53840814/Steganography-and-History-ofCryptography
• http://www.securitytube.net/video/905
25
THANK YOU 

26

More Related Content

What's hot

Steganography
SteganographySteganography
Steganography
Madhani Harsh
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Ankit Gupta
 
PPT steganography
PPT steganographyPPT steganography
PPT steganographyparvez Sharaf
 
Steganography
SteganographySteganography
Steganography
PREMKUMAR
 
Steganography
SteganographySteganography
Steganography
Jaykrishna Thakkar
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
Ahmed Raza Shaikh
 
Steganography
SteganographySteganography
Steganography
Daksh Verma
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
BSheghembe
 
Steganography
SteganographySteganography
Steganography
sandeipz
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
Abdelhamid Limami
 
Steganography
SteganographySteganography
SteganographySonam M
 
steganography
steganographysteganography
steganography
Manika Arora
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReportekta sharma
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
Chandni Verma
 
Image steganography
Image steganographyImage steganography
Image steganography
vaidya_sanyu
 

What's hot (20)

Steganography
SteganographySteganography
Steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
Steganography
SteganographySteganography
Steganography
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
SteganographySteganography
Steganography
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Steganography
SteganographySteganography
Steganography
 
steganography
steganographysteganography
steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Image steganography
Image steganographyImage steganography
Image steganography
 

Viewers also liked

Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
CSCJournals
 
Steganography (Distributed computing)
Steganography (Distributed computing)Steganography (Distributed computing)
Steganography (Distributed computing)Sri Prasanna
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
IJRES Journal
 
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACH
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACHGRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACH
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACH
Journal For Research
 
Image stegnography and steganalysis
Image stegnography and steganalysisImage stegnography and steganalysis
Image stegnography and steganalysis
Prince Boonlia
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Bikash Chandra Prusty
 
Audio steganography - LSB
Audio steganography - LSBAudio steganography - LSB
Audio steganography - LSBMohab El-Shishtawy
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
James Ridgway
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis ppt
Om Vishnoi
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
Saurabh Nambiar
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
Sreelekshmi Sree
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis zaidsalfawzan
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Hushen Savani
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
IJMER
 
Haptic Technology ppt
Haptic Technology pptHaptic Technology ppt
Haptic Technology pptArun Sivaraj
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
Leslie Samuel
 

Viewers also liked (18)

Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography
Steganography Steganography
Steganography
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
 
Steganography (Distributed computing)
Steganography (Distributed computing)Steganography (Distributed computing)
Steganography (Distributed computing)
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACH
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACHGRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACH
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACH
 
Image stegnography and steganalysis
Image stegnography and steganalysisImage stegnography and steganalysis
Image stegnography and steganalysis
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
Audio steganography - LSB
Audio steganography - LSBAudio steganography - LSB
Audio steganography - LSB
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis ppt
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Haptic Technology ppt
Haptic Technology pptHaptic Technology ppt
Haptic Technology ppt
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Similar to Steganography(Presentation)

Chapter 13 steganography and watermarking
Chapter 13   steganography and watermarkingChapter 13   steganography and watermarking
Chapter 13 steganography and watermarkingamitchauhan1990
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
ThusharaBAmigoz1
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
Mohamed Talaat
 
Information and network security 17 steganography
Information and network security 17 steganographyInformation and network security 17 steganography
Information and network security 17 steganography
Vaibhav Khanna
 
Steganography
SteganographySteganography
Steganography
ShriSailaxmiS
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
AkashBhosale50
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
misbanausheenparvam
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
guest6caaab
 
Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganography
Xavier Prathap
 
digital stega slides
digital stega slidesdigital stega slides
digital stega slidesJames Eglinton
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganographyPrashant Shukla
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
Kiakaha17
 
art of Steganography
art of Steganography art of Steganography
art of Steganography
Joshpin Bala.B
 
Steganography
SteganographySteganography
Steganography
ShawaizBajwa
 
Presentation1
Presentation1Presentation1
Presentation1guestb8230c
 
Steganography
SteganographySteganography
Steganography
Hassan Aftab
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
Avinash Mishra
 

Similar to Steganography(Presentation) (20)

Chapter 13 steganography and watermarking
Chapter 13   steganography and watermarkingChapter 13   steganography and watermarking
Chapter 13 steganography and watermarking
 
Visual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptxVisual Cryptography part 1-1.pptx.pptx
Visual Cryptography part 1-1.pptx.pptx
 
Finalmarch4 th
Finalmarch4 thFinalmarch4 th
Finalmarch4 th
 
Data hiding - Steganography
Data hiding - SteganographyData hiding - Steganography
Data hiding - Steganography
 
Information and network security 17 steganography
Information and network security 17 steganographyInformation and network security 17 steganography
Information and network security 17 steganography
 
Steganography
SteganographySteganography
Steganography
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Phd T H E S I Sproposal
Phd T H E S I SproposalPhd T H E S I Sproposal
Phd T H E S I Sproposal
 
Computer forensics and steganography
Computer forensics and steganographyComputer forensics and steganography
Computer forensics and steganography
 
digital stega slides
digital stega slidesdigital stega slides
digital stega slides
 
83747965 steganography
83747965 steganography83747965 steganography
83747965 steganography
 
SteganographySecond
SteganographySecondSteganographySecond
SteganographySecond
 
art of Steganography
art of Steganography art of Steganography
art of Steganography
 
Isit1
Isit1Isit1
Isit1
 
shilpa
shilpashilpa
shilpa
 
Steganography
SteganographySteganography
Steganography
 
Presentation1
Presentation1Presentation1
Presentation1
 
Steganography
SteganographySteganography
Steganography
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

Steganography(Presentation)

  • 1. STEGANOGRAPHY The art and science of hiding communication!! Firdous Ahmad1 Khan 102/10 CSE @ NIT SXR
  • 2. TABLE OF CONTENTS • Introduction • Different Than Cryptography • Historical Perspective • Steganography in Written Text • Modern Steganography • Text In Image • Image in Image • Audio & Video Steganography • UV Watermarking • Network Steganography • Steganalysis • Conclusion • References 2
  • 3. INTRODUCTION • Derived from the Greek words steganos (στεγανός) meaning "covered or protected," and graphei (γραυή) meaning "writing." • It is the art of hiding stuff in stuff so that others can’t see your stuff. • Steganography is the practice of hiding data in other data in an effort to keep third parties from knowing that the intended message is even there ! • Encryption's ugly step brother ! • It has art aspects since human judgment is involved. • Principle : Principle Of Steganography.mp4 3
  • 4. DIFFERENT THAN CRYPTOGRAPHY • Cryptography is the essence to prepare a message in such a way that unauthorized parties aren’t able to understand it while as Steganography is the essence to embed secret messages within seemingly innocent carriers such that unauthorized parties are unaware of the communication. • Cryptography provides privacy, Steganography is intended to provide secrecy. • Steganography – hide, without altering – obfuscates the fact of communication, not the data – preventative - deters attacks • Cryptography – alter, without hiding – obfuscates the data, not the fact of communication – curative - defends attacks 4
  • 5. HISTORICAL PERSPECTIVE • Dates back to 400 BC when Histaeus sent a message, by shaving the head of his most trusted slave, then tattooed a message on the slave's scalp, to his friend Aristagorus, urging revolt against the Persians. • Demaratus tells Athens of Persia’s attack plans by writing the secret message on a tablet, & covers it with wax. • Chinese wrote messages on silk and encased them in balls of wax. The wax ball, "la wan," could then be hidden in the messenger. • A more subtle method, nearly as old, is to use invisible ink( lemon juice, milk, or urine, all of which turn dark when held over a flame). • Microdots used by Germany in WW2 documents shrunk to the size of a dot & embedded within innocent letters. Inkjet dots smaller than human eyes can see. 5 Wentworth Miller [Prison Break Serial]
  • 6. b. Microdot c. First Publication on Steganography Also the first book on Steganography was entitled “Steganograpia” written by Johannes Trithemius in the 6 XVI century.
  • 7. • Proposed by Girolamo Cardano in XV century. • Carden grille was a sheet of parchment with apertures for writing text. • Pricking pin holes above or below the letters in a newspaper or article. 7 • Used by Nazi Forces in WW2.
  • 8. PRISONER’S PROBLEM • In 1984 Gustavus Simmons formulated this problem. • Two accomplices are arrested in separate cells & are allowed to communicate via warden who can look into the contents of their communication. • The prisoners are to agree on an escape plan without raising suspicion of the warden. • Solution is to create a subliminal channel(communicate secretly in normal looking communication over an insecure channel) 8
  • 9. STEGANOGRAPHY IN WRITTEN TEXT • Covert text can be embedded in printed matter or in text. • Embedding can also be by means of altering the appearance of text as a) Skewing b) Altering space c) Offsetting d) Font color alterations. 9
  • 10. In 2004 it was revealed that several printer manufactures use steganography to hide information about printer serial numbers and the manufacturing code to track counterfeits. Brother, Canon, Dell, Epson, HP, IBM, Konica Minolta, Kyocera, Lanier, Lexmark, Ricoh, Toshiba, Xerox 10
  • 11. • An actual message from German spy “read second letter in each word” (example of NULL CIPHER) “Apparently neutral's protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on byproducts, ejecting suets and vegetable oils”. Pershing sails from NY June 1 • We explore new steganographic and cryptographic algorithms and techniques throughout the world to produce wide variety and security in the electronic web called the Internet. Explore The World Wide Web • Use Different fonts to indicate 0/1 of letter encodings(Francis Bacon Cipher) • Laser printers can adjust spacing of lines and characters by less than 1/300th of an inch. To hide a zero, leave a standard space, and to hide a one leave 1/300th of an inch more than usual. Varying the spacing over an entire document can hide a short binary message that is undetectable by the human eye. 11
  • 12. MODERN STEGANOGRAPHY • Hiding one message within another(“container”) • Most containers are rich media  Images, audio, video are very redundant, can be tweaked without affecting human eye/ear  US argued that Al_QAIDA implanted instructions within taped interviews. • Copyright notices embedded in digital art  Prove ownership(Watermarking)  Serial number embedded to prevent replication  Seek infringements on the web using spiders/crawlers • Digital cameras EXIF(Exchangeable Image File Format) tags  Not secretive but hidden from the eye  Embed info such as camera type, date, shutter speed, focal length.. • Similarly, possible to embed messages in invisible part of html pages 12
  • 13. TEXT IN IMAGE (2 METHODS) • Consider a 8-bit grey scale image  One pixel of information is stored using 8 bits.  There are 256 different variations of grey. • As a simple example of least significant bit(LSB) substitution, imagine "hiding" the character 'G' across the following eight bytes of a carrier file (the least significant bits are underlined): 10010101 00001101 11001001 10010110 00001111 11001011 10011111 00010000 • A 'G' is represented in the American Standard Code for Information Interchange (ASCII) as the binary string 01000111. These eight bits can be "written" to the least significant bit of each of the eight carrier bytes as follows: 10010100 00001101 11001000 10010110 00001110 11001011 10011111 00010001 • In the sample above, only half of the least significant bits were actually changed (shown above in italics). This makes some sense when one set of zeros and ones are being substituted with another 13 set of zeros and ones.
  • 14. LSB ADVANTAGES AND DISADVANTAGES Advantages • Does not change the size of the file • Is harder to detect than other steganography techniques Disadvantages • Normally must use the original program to hide and reveal data • If the picture with the hidden information is converted to another format, then the hidden data may be lost 14
  • 15. CAN YOU TELL THE DIFFERENCE Original Before Encoding: 255,0,0 FF,00,00 11111111,00000000,00000000 After Encoding “101”: 255,0,1 FF,00,01 11111111,00000001,00000001 Same file with “I should be able to hold 37 bytes!!!” encoded 15
  • 16. IMAGE IN IMAGE The Image used for embedding should be 8 times greater than the image which is supposed to be kept hidden. 16
  • 17. AUDIO & VIDEO STEGANORAPHY AUDIO VIDEO • Data is hidden by modifying sample data. • Coding still frames - spatial or frequency • Uncompressed audio formats • data encoded during refresh  – WAV (Waveform Audio File Format)  – BWF (Broadcast Wave Format)  – MBWF (Multichannel Broadcast Wave Format) • Compressed audio formats  closed captioning • visible watermarking  used by most networks (logo at bottom-right) Example : Audio Steganography.mp4  Lossy • MP3 • Advanced Audio Coding (AAC)  Lossless • Free Lossless Audio Codec (FLAC) • Direct Stream Transfer (DST) 17
  • 18. UV WATERMARKING Spatial domain watermarking • bit flipping • color separation Frequency domain watermarking • embed signal in select frequency bands (e.g. high frequency areas) 18
  • 19. NETWORK STEGANOGRAPHY • Network Steganography  Information hiding techniques which can be utilized to exchange steganograms in telecommunication networks.  Can be Intra-protocol or Inter-protocol  unused bits in packet headers  IP(Type of service, Flags, fragment offset, etc.)  TCP(Sequence Number) • LACK(Lost Audio Packet Steganography)  Hide information in packet delay. • HICCUPS (Hidden Communication System for Corrupted Networks)  Disguise information as natural “distortion” or noise. • Operating System  unused memory slack space(Fragmentation issue) unallocated space  hidden partition  normally used to hide data from investigators 19
  • 20. STEGANOGRAPHY VS WATERMARKING Goal of steganography • Intruder cannot detect a message • Primarily 1:1 communication Goal of Watermarking • Intruder cannot remove or replace the message • Primarily 1:* communication • Example : Watermarks.mp4 20
  • 21. STEGANALYSIS • The art and science of steganalysis is intended to detect or estimate hidden information based on observing some data transfer. • In some cases, just being caught sending a message can bring suspicion, or give information to the 3rd party • Why is this person hiding something? • Why all the communication right now? • Steganalysis techniques can be classified in a similar way as cryptanalysis methods, largely based on how much prior information is known • Steganography-only attack: The steganography medium is the only item available for analysis. • Known-carrier attack: The carrier and steganography media are both available for analysis. • Known-message attack: The hidden message is known. • Chosen-steganography attack: The steganography medium and algorithm are both known. • Chosen-message attack: A known message and steganography algorithm are used to create steganography media for future analysis and comparison. • Known-steganography attack: The carrier and steganography medium, as well as the steganography algorithm, are known discipline with few articles appearing before the late 1990s. 21
  • 22. STEGANOGRAPHY TOOLS • Steganos • S-Tools (GIF, BMP) • StegHide (WAV, BMP) • Invisible Secrets (JPEG) • OpenPuff(BMP, JPEG, PNG) • Camouflage • MP3Stego(Open Source tool for audio) • OpenStego (Open Source tool for images) 22
  • 24. CONCLUSION • Steganography & Steganalysis are still at an early stage of research. • Although in principle secure schemes exist, practical ones with reasonable capacity are known. • Notion for security & capacity for steganography needs to be investigated. • Since it obvious that no system of data hiding is totally immune to attacks. However, steganography has its place in security. It in no way can replace cryptography, but is intended to supplement it. Its application in watermarking for use in detection of unauthorized, illegally copied material is continually being realized and developed. • The growing number of communication protocols, services and computing environments offers almost unlimited opportunities for displaying a whole spectrum of steganographic methods. 24
  • 25. REFERENCES • http://www.petitcolas.net/fabien/steganography/history.html • http://en.wikipedia.org/wiki/Steganography • http://www.fbi.gov/about-us/lab/forensicsciencecommunications/fsc/july2004/research/2004_03_research01.htm • http://stegano.net/tutorial/steg-history.html • http://www.strangehorizons.com/2001/20011008/steganography.shtml • http://www.docstoc.com/docs/53840814/Steganography-and-History-ofCryptography • http://www.securitytube.net/video/905 25