robert krenn [email protected] january 21, 2004 steganography implementation & detection
TRANSCRIPT
![Page 2: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/2.jpg)
Overview
● What is steganography?
● Implementations● Detection● Defeating steganography● Conclusion● Questions
![Page 3: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/3.jpg)
What is steganography?
Stega-covered, from the Greek “stegos” or roof
-nographywriting, from the Greek “graphia”
![Page 4: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/4.jpg)
What is steganography?
● The art of hiding information inside information
Since everyone can read, encoding text
in neutral sentences is doubtfully effective
![Page 5: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/5.jpg)
What is steganography?
● The art of hiding information inside information
Since everyone can read, encoding text
in neutral sentences is doubtfully effective
Since Everyone Can Read, Encoding Text
In Neutral Sentences Is Doubtfully Effective
⇒ Secret inside
![Page 6: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/6.jpg)
What is steganography?
What is it used for?● Hiding the fact that you are sending messages● Hiding several messages inside data● Digital watermarking
Kerckhoffs' principle● Secure with knowlegde of the system● Message can only be read with secret key
![Page 7: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/7.jpg)
What is steganography?
Hiding several messages● Deniable cryptography● Knowledge of encrypted data● No proof of how much information is stored● Rubberhose (http://www.rubberhose.org)
![Page 8: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/8.jpg)
What is steganography?
Digital watermarking● Not really hiding information● Important: not modificable● Uses the hiding-property of steganography● Recent: MPAA hides watermarks in movies
![Page 9: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/9.jpg)
Implementation
Hiding information● Text / Webpages● Images● Audio● Video
![Page 10: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/10.jpg)
Implementation
Text / Webpages● Use of a codebook● Layout of texts● Every Nth character● Use of whitespaces and newlines● Can be difficult to detect and decode
![Page 11: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/11.jpg)
Implementation
Text / Webpages
In the midway of this our mortal life,I found me in a gloomy wood, astrayGone from the path direct: and e'en to tellIt were no easy task, how savage wildThat forest, how robust and rough its growth,Which to remember only, my dismayRenews, in bitterness not far from death.Yet to discourse of what there good befell,All else will I relate discover'd there.How first I enter'd it I scarce can say
![Page 12: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/12.jpg)
Implementation
Text / Webpages
In the midway of this our mortal life,I found me in a gloomy wood, astrayGone from the path direct: and e'en to tellIt were no easy task, how savage wildThat forest, how robust and rough its growth,Which to remember only, my dismayRenews, in bitterness not far from death.Yet to discourse of what there good befell,All else will I relate discover'd there.How first I enter'd it I scarce can say
06081913030629170827 ⇒ meet at dawn
![Page 13: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/13.jpg)
Implementation
Images● Cover image● Identify redundant data● Replace (a subset of) redundant bits with data
![Page 14: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/14.jpg)
Implementation
Images● JPEG uses discrete cosine transformations (DCT)● Transform pixel blocks to DCT coefficients● Get least significant bit of each DCT coefficient● Replace LSB with secret message bit● Insert modified DCT into output image
![Page 15: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/15.jpg)
Implementation
Images
Original image Data embedded inside
![Page 16: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/16.jpg)
Implementation
Images● JPEG stegencryption
●Operates in transformation space●No visual changes
● GIF and BMP stegencryption●Operates in low bit planes●Subject to visual attacks
![Page 17: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/17.jpg)
Implementation
Images
Original image Data embedded inside
![Page 18: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/18.jpg)
Implementation
Audio
● Use frequencies inaudible to humans● Embed data using the LSB● Encoding musical tones
![Page 19: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/19.jpg)
Implementation
Video
● Visible signals (gestures, movements)● Same techniques as with images● Same techniques as with audio
![Page 20: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/20.jpg)
Detection
Text
● Look for (disturbings of) patterns● Odd use of language● Line heights and whitespaces
![Page 21: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/21.jpg)
Detection
Images
● Examine color palette● Size of the image● Differences:
− Format
− Last modified date
![Page 22: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/22.jpg)
Detection
Images
● Statistical analysis● Analyze frequency of DCT coefficients● Entropy of redundant data
− Hidden content »⇒ higher entropy
![Page 23: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/23.jpg)
Detection
Images
● Apply filters to steganograms ● Visible representation of statistical data
![Page 24: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/24.jpg)
Detection
Filtered
Original image Embedded data
![Page 25: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/25.jpg)
Detection
Filtered
Original image Embedded data
![Page 26: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/26.jpg)
Detection
Audio
● Statistical analysis● Analyze patterns in background noise● Distortions● Measure inaudible frequencies
![Page 27: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/27.jpg)
Detection
Video
● Look for distinguishing movements● Same techniques as with images● Same techniques as with audio
![Page 28: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/28.jpg)
Defeating steganography
Text
● Change spacing, interpunction● Modify line heights, layout● Add or remove words
![Page 29: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/29.jpg)
Defeating steganography
Images
● Compress with lossy compression● Convert to different format● Resize the image● Modify colors
![Page 30: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/30.jpg)
Defeating steganography
Audio
● Compress with lossy compression● Change bitrate● Alter / limit frequency spectrum
![Page 31: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/31.jpg)
Defeating steganography
Video
● Same techniques as with images● Same techniques as with audio
![Page 32: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/32.jpg)
Conclusion
● Hide data practically everywhere
● Detection of steganography
−Possible, but can be difficult
−Hard when valid to Kerckhoffs' principle● Defeating steganography is not hard
![Page 33: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/33.jpg)
Steganography
● Questions?
![Page 34: Robert Krenn rkrenn@xidc.nl January 21, 2004 Steganography Implementation & Detection](https://reader035.vdocument.in/reader035/viewer/2022062410/56649e4a5503460f94b3e5bd/html5/thumbnails/34.jpg)
Steganography