steganography. c ontents defination steganography history steganalysis steganography v/s...

23
STEGANOGRAPHY

Upload: charles-clarke

Post on 24-Dec-2015

332 views

Category:

Documents


18 download

TRANSCRIPT

Page 1: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic

STEGANOGRAPHY

Page 2: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic

CONTENTS• Defination• Steganography History• Steganalysis • Steganography v/s Cryptography• Steganography Under Various Media• Steganographic methods• Merits of Steganography• Threats of Steganography• Conclusion• References

Page 3: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic

DEFINITION Steganography is the science of hiding

information in such a way that no one suspects the information exists

Steganography is a Greek word. Means “concealed writing”

The purpose of steganography is covert communication to hide a message from a third party

Page 4: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic

Steganography hides the covert message but not the fact that two parties are communicating with each other.

The steganography process generally involves placing a hidden message in some transport medium, called the carrier.

The secret message is embedded in the carrier to form the steganography medium.

Page 5: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic

STENOGRAPHY HISTORY

Steganography has been used since ancient Greece.

Herodotus(485-525 BC) is a great historian. His great work, The Histories has a story which has used ancient stenography.

Page 6: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic

These messages were sent by the German embassy in World War I. This is called a null cipher.

PRESIDENT'S EMBARGO RULING SHOULD HAVE IMMEDIATE NOTICE. GRAVE SITUATION AFFECTING INTERNATIONAL LAW. STATEMENT FORESHADOWS RUIN OF MANY NEUTRALS. YELLOW JOURNALS UNIFYING NATIONAL EXCITEMENT IMMENSELY.

APPARENTLY NEUTRAL'S PROTEST IS THOROUGHLY DISCOUNTED AND IGNORED. ISMAN HARD HIT. BLOCKADE ISSUE AFFECTS PRETEXT FOR EMBARGO ON BYPRODUCTS, EJECTING SUETS AND VEGETABLE OILS.

Taking the first letter in each word of message 1 or second letter in message 2 reveals the hidden text.

Page 7: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic

PERSHING SAILS FROM NY JUNE 1.

Page 8: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic

STENOGANALYSIS

Steganalysis is the art and science of detecting messages hidden using steganography.

The goal of steganalysis is to identify suspected packages, determine whether or not they have a payload encoded into them, and, if possible, recover that payload.

Page 9: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic

STENOGANALYSIS V/S CRYPTOGRAPHY

With cryptography the information is known to exist, but it is encoded in such a way that only the intended recipient can read it.

Steganography disguises the messages as something else, so the interceptor doesn’t even know there’s a message buried in there.

The goal of cryptography is to make data unreadable by a third party.

Page 10: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic

The goal of steganography is to hide the data from a third party.

EXAMPLE : Memo to the Director

Subject: Letter of Recommendation —————————————————————- Jane S., a chief sub editor and editor, can always be found

hard at work in her cubicle. Jane works independently, withoutwasting company time talking to colleagues. She neverthinks twice about assisting fellow employees, and she alwaysfinishes given assignments on time. Often Jane takes extendedmeasures to complete her work, sometimes skippingcoffee breaks. She is a dedicated individual who has absolutely novanity in spite of her high accomplishments and profoundknowledge in her field. I firmly believe that Jane can beclassed as a high-caliber employee, the type which cannot bedispensed with. Consequently, I duly recommend that Jane bepromoted to executive management, and a proposal will besent away as soon as possible.

Project Leader————————————————————————————————

Page 11: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic

(Later that afternoon another memo was sent…)

Memo to the Director:

————————————————————— Sorry about the earlier memo. Jane was looking over my shoulder

as I wrote it. Kindly read every other line (i.e. 1, 3, 5, 7…) for my trueassessment of her.

Regards,Project Leader

—————————————————————

HdlLQRPQdrmnWskKznOSarxq4GjpRTQo4hpCRJJ5aU7tZO9HPTZXFG6iRIT0wa47AR5nvkEKoIAjW5HaDKiJriuWLdtN4OXecWvxFsjR32ebz76U8aLpAK87GZEyTzBxdV+lH0hwyT/y1cZQ/E5USePP4oKWF4uqquPee1OPeFMBo4CvuGyhZXD/18Ft/53YWIebvdiCqsOoabK3jEfdGExce63zDI0==MpRf

Page 12: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic

This is a previous one is the perfect

example of steganography. A message disguised as something else with a “key” (reading every other line) provided to expose the original message.

The later one is the perfect encrypted form of cryptography.

Page 13: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic

STEGANOGRAPHY UNDER VARIOUS MEDIA

Steganography is not limited to the above examples of text.

Steganography is also done in the various types of media.

Steganography is done by hiding text in the bits of images.

Steganography is done by hiding messages in audio files.

Page 14: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic
Page 15: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic
Page 16: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic
Page 17: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic
Page 18: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic

STEGANOGRAPHIC METHODS

The simplest and most common type of steganography is LSB (least significant bit). The one’s bit of a byte is used to encode the hidden information.

Suppose we want to encode the letter A (ASCII 65 or binary 01000001) in the following 8 bytes of a carrier file.

01011101 11010000 00011100 1010110011100111 10000111 01101011 11100011

becomes

01011100 11010001 00011100 1010110011100110 10000110 01101010 11100011

Page 19: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic

Is the difference between level 37,243 and 37,242 detectable by the human ear? Probably not.

Typical .wav file uses 16 bit sampling.

Page 20: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic

MERITS & USES

Digital Watermarking

By using steganography user might acquire an embedded image.

Secret message can be trans mitted without the fact that transmission was done.

The more obvious uses of steganography relate to secret communications.

Page 21: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic

THREATS It requires a lot of overhead to hide a

relatively few bits of information.

The hiding of malware into seemingly safe files such as pictures, audio and email attachments. This method is used to hide any type of malware ranging from viruses to worms from spyware to Trojans.

An example was the Anna Kournikova virus which was sent via email as an attachment “AnnaKournikova.jpg.vbs”.

Page 22: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic

CONCLUSION The objective of this paper was to

demonstrate our Steganography, which is based on a property of the human visual system

We are very convinced that this steganography is a very strong information security technique, especially when combined with encrypted embedded data.

Always be aware while using technology it can be much more than what you can see.

Page 23: STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic

REFRENCES http://home.comcast.net/~ebm.md/stego.html http://en.wikipedia.org/wiki/Steganography http://www.fbi.gov/hq/lab/fsc/backissu/july2004/

research/2004_03_research01.htm http://www.textscience.com/

NetworkServiceAndSecurityInWeb2-0.htm http://eccc.hpiweb.de/static/books/

Derandomizing_some_number_theoretic_and_algebraic_algorithms/

http://www.tech-faq.com/steganography.html http://mozaiq.org/decrypt/view/