steganography - universitetet i oslofolk.uio.no/infmkt/mkt10c-steg.pdfsteganography security through...

11
Steganography Security through obscurity stegano graphy covered writing The art of hiding information in ways that prevents the detection of hidden messages. (hide a small needle of information in a large hay stack of dummy information). Added level of protection to cryptography

Upload: others

Post on 27-Feb-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Steganography - Universitetet i oslofolk.uio.no/infmkt/mkt10c-steg.pdfSteganography Security through obscurity stegano graphy covered writing The art of hiding information in ways

1

Steganography

Security through obscurity

stegano graphycovered writing

The art of hiding information in ways that prevents the detection of hidden messages.

(≈hide a small needle of information in a large hay stack of dummy information).

Added level of protection to cryptography

Page 2: Steganography - Universitetet i oslofolk.uio.no/infmkt/mkt10c-steg.pdfSteganography Security through obscurity stegano graphy covered writing The art of hiding information in ways

2

Traditional techniques

Invisible ink

Microdots

Character arrangement

Spread spectrum

WW II

Apparently neutral’s protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetables oil.

Apparently neutral’s protest isthoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetables oil.

Pershing sails from NY June 1.

Page 3: Steganography - Universitetet i oslofolk.uio.no/infmkt/mkt10c-steg.pdfSteganography Security through obscurity stegano graphy covered writing The art of hiding information in ways

3

Today

Dear Friend ; You made the right decision when you signed up for our mailing list . This is a one time mailing there is no need to request removal if you won't want any more ! This mail is being sent in compliance with Senate bill 1621 , Title 5 , Section 301 ! This is not a get rich scheme ! Why work for somebody else when you can becomerich inside 84 DAYS ! Have you ever noticed how long the line-ups are at bank machines and people love convenience ! Well, now is yourchance to capitalize on this ! WE will help YOU SELL MORE and SELL MORE . The best thing about our system is that it is absolutely risk free for you . But don't believe us . Mrs Jones who resides in Virginia tried us and says "Now I'm rich, Rich, RICH" . This offer is 100% legal. ...

www.spammimmic.com

== ‘Password: 123abc’

Overview

Message

Encrypt message

Embed in cover data

Message

Decrypt message

Remove from cover data

Insecure channel

Page 4: Steganography - Universitetet i oslofolk.uio.no/infmkt/mkt10c-steg.pdfSteganography Security through obscurity stegano graphy covered writing The art of hiding information in ways

4

Criteria for a good algorithm

• Perceptual transparency + -/+• Hiding capacity + -• Robustness - +

• Computational complexity - -/+

Stegano Watermark

Least Significant Bit insertion (LSB)

01101011 10100101 00101101 11111101 00011001 01100001

11101000 10000111 10101111 00101101 00011101 11100000

01101011 10101101 00101101 11101101 00000001 01100011

H 01001000

e 01100101

l 01101100

l 01101100

o 01101111

01101010 10100101 00101100 11111100 00011001 01100000

11101000 10000110 10101110 00101101 00011101 11100000

01101010 10101101 00101100 11101101 00000000 01100011

H 01001000

e 01100101

l 01101100

l 01101100

o 01101111

Header

Image raster

Page 5: Steganography - Universitetet i oslofolk.uio.no/infmkt/mkt10c-steg.pdfSteganography Security through obscurity stegano graphy covered writing The art of hiding information in ways

5

Bit 0Bit 2Bit 3Bit 4Bit 5Bit 6Bit 7OriginalBit 1

Structure at bit index

Hiding data in single bit (35kb)

Bit 7Bit 6Bit 5Bit 4Bit 3Bit 2Bit 1Bit 0

Page 6: Steganography - Universitetet i oslofolk.uio.no/infmkt/mkt10c-steg.pdfSteganography Security through obscurity stegano graphy covered writing The art of hiding information in ways

6

LSB

Diff(x,y)=abs(f(x,y)-f_stego(x,y))*200

LSB in uncompressed images

• Ease of detection depends on size and placement of payload.

• High capacity (93kb for a 500*500 image).

• Very easy to destroy.

• Computationally inexpensive

Page 7: Steganography - Universitetet i oslofolk.uio.no/infmkt/mkt10c-steg.pdfSteganography Security through obscurity stegano graphy covered writing The art of hiding information in ways

7

GIF files

Unsorted Sorted

Gif images have max 256 distinct colours. Each pixel indexes into colour table.

= Sort colour table and use LSB insertion in image raster.

=Hide info in the arrangement og the colour table itself. 255bit - 1.6 kbit.

GIF files (S-Tools)

Original +40 kb

Page 8: Steganography - Universitetet i oslofolk.uio.no/infmkt/mkt10c-steg.pdfSteganography Security through obscurity stegano graphy covered writing The art of hiding information in ways

8

GIF files (S-Tools)

Diff(x,y)=abs(f(x,y)-f_stego(x,y))*3

Frequency domain (JPG)

T (u,v)f (x,y) T’ (u,v)DCT T (u,v) / Q(u,v)

Page 9: Steganography - Universitetet i oslofolk.uio.no/infmkt/mkt10c-steg.pdfSteganography Security through obscurity stegano graphy covered writing The art of hiding information in ways

9

Hiding information in frequency domain

LSB in n last coefficients

Relative size of two medium /(low) frequency coefficients

Hiding information in spatial domainT (u,v)f (x,y) T’ (u,v)

IDCT T’ (u,v) * Q(u,v)

JPG steganography (JPHS)

Original + 4kb data

Page 10: Steganography - Universitetet i oslofolk.uio.no/infmkt/mkt10c-steg.pdfSteganography Security through obscurity stegano graphy covered writing The art of hiding information in ways

10

Diff(x,y)=abs(f(x,y)-f_stego(x,y))*50

JPG steganography (JPHS)

Detecting hidden contentPerceptual transparency not good enough!

First order statistics: Changes in frequency distribution of pixels values (histogram changes)

As with cryptography, counterattack has to be tailored to stenographic algorithm, as each reduces image structure in characteristic ways (statistical signatures).

Before After

Page 11: Steganography - Universitetet i oslofolk.uio.no/infmkt/mkt10c-steg.pdfSteganography Security through obscurity stegano graphy covered writing The art of hiding information in ways

11

Detecting hidden content

Higher order statistics: Detect lack of correlation/covariance between pixels in LSB.

JPG: Not all patterns of DCT coefficients possible after quantization.

Model expected level of entropy and compare to measured. (Add random noise to LSB).