steganography
TRANSCRIPT
![Page 1: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/1.jpg)
STEGANOGRAPHY
![Page 2: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/2.jpg)
AGENDA Etymology What Is Steganography? History Evolution Live Cyber Case Study Some Terminologies Of Steganography Basic Principle in Steganography Live Demonstration Steganography Vs Crptography Steganography Tools Steganalysis Conclusion References
![Page 3: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/3.jpg)
STEGANOGRAPHY
Etymology:
The word steganos means "covered or protected", and graphy means "writing“. Thus steganography means "concealed writing".
![Page 4: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/4.jpg)
WHAT IS STEGANOGRAPHY?
Steganography is the art and science of hiding a message in a medium, such as a digital picture or audio file, so as to defy detection.
Messages are hidden in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.
![Page 5: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/5.jpg)
CONTD.. For an example, a message might be hidden within an image
by changing the least significant bits to be the message bits.
![Page 6: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/6.jpg)
EVOLUTION
Cryptography
Steganography
Watermarking
![Page 7: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/7.jpg)
STEGANOGRAPHY
History:
Greek history – warning of invasion by scrawling it on the wood underneath a wax tablet. To casual observers, the tablet appeared blank.
Both Axis and Allied spies during World War II used such measures as invisible inks -- using milk, fruit juice or urine which darken when heated.
Invisible Ink is also a form of Steganography.
![Page 8: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/8.jpg)
LIVE CYBER CASE STUDY
![Page 9: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/9.jpg)
SOME TERMINOLOGIES
Cover medium (Example-Image)
Embedded message (Message to be hidden)
Stego-key (Key to extract hidden message)
Stego-Object (Seen by casual observer)
Therefore,
Cover-medium + embedded-message = stego-object
![Page 10: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/10.jpg)
BASIC PRINCIPLE IN STEGANOGRAPHY
Encoder
Decoder
Secret MsgCover Image
Stego Object
Original Image
Secret Msg
Communication Channel
Key
![Page 11: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/11.jpg)
LIVE DEMONSTRATION
![Page 12: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/12.jpg)
CONTD…
![Page 13: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/13.jpg)
STEGANOGRAPHY CARRIER FILES
Jpeg Bmp Gif Audio
Wav MP3
Other Types
+
![Page 14: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/14.jpg)
STEGANOGRAPHY TOOLS
• Steganos• S-Tools • StegHide • Invisible Secrets • JPHide• Camouflage• Hiderman• Many others…
![Page 15: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/15.jpg)
STEGANOGRAPHY VS CRYPTOGRAPHY
Steganography(hide existence of the secret
message, but do not use encryption)
Cryptography(encrypt the message,but do
not hide the message)
• Ideally nobody can see both parties are secretly communicating.
• Innocent.
• Anybody can see both parties are communicating in secret.
• Suspicious.
![Page 16: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/16.jpg)
STEGANALYSIS
Identification of hidden files :
•Identifying the existence of a message.
•Not extracting the message.
•Technically, Steganography deals with the concealment of a message, not the encryption of it.
•Steganalysis essentially deals with the detection of hidden content.
•How is this meaningful???
![Page 17: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/17.jpg)
HOW TO IDENTIFY? By identifying the existence of a hidden message, perhaps we
can identify the tools used to hide it.
If we identify the tool, perhaps we can use that tool to extract the original message.
![Page 18: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/18.jpg)
STEGANALYSIS:METHODS OF DETECTION
• Visual Detection (JPEG, BMP, GIF, etc.)• Audible Detection (WAV, MPEG, etc.)• Statistical Detection (changes in patterns of the pixels
or LSB – Least Significant Bit) or Histogram Analysis• Structural Detection - View file properties/contents• Size difference• Date/time difference• Contents – modifications• Checksum
![Page 19: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/19.jpg)
ANOMALY – VISUAL DETECTION
Detecting steganography by just viewing the Stego-object.
Can you see any difference between the two??
![Page 20: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/20.jpg)
ANOMALY – KURTOSIS
Kurtosis The degree of flatness and peakedness of
describing a frequency distribution: Random house dictionary.
![Page 21: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/21.jpg)
ANOMALY – HISTOGRAM ANALYSIS
Histogram analysis can be used to identify a file with a hidden message.
Histogram of Original file.
![Page 22: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/22.jpg)
CONTD…
Histogram of file with embedded message.
Here it can be seen that this histogram has a noticeable repetitive trend unlike the original one.
![Page 23: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/23.jpg)
ANOMALY ANALYSIS - COMPARE FILE PROPERTIES
• Compare the properties of the files• Checksum• C:\GNUTools>cksum a:\before\helmetprototype.jpg
3241690497 240759 a:\before\helmetprototype.jpg• C:\GNUTools>cksum a:\after\helmetprototype.jpg
3749290633 235750 a:\after\helmetprototype.jpg
• Properties 04/04/2003 05:25p 240,759 helmetprototype.jpg 04/04/2003 05:26p 235,750 helmetprototype.jpg
![Page 24: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/24.jpg)
COMPARE THE PROPERTIES OF THE FILESCHECKSUM
C:\GNUTOOLS>CKSUM A:\BEFORE\HELMETPROTOTYPE.JPG3241690497 240759 A:\BEFORE\HELMETPROTOTYPE.JPGC:\GNUTOOLS>CKSUM A:\AFTER\HELMETPROTOTYPE.JPG3749290633 235750 A:\AFTER\HELMETPROTOTYPE.JPG
PROPERTIES04/04/2003 05:25P 240,759 HELMETPROTOTYPE.JPG04/04/2003 05:26P 235,750 HELMETPROTOTYPE.JPG
FILE EXTENSION:
Hex Signature File Extension ASCII Signature
![Page 25: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/25.jpg)
SUMMERY Steganography is used for data hiding to provide security to
confidential infromation. Its a technique which is used to hide the message within
some medium. To further improve the security of the secret message in the
cover image, we have used encryption to encrypt the secret message before it is embedded.
While Steganography deals with hiding the message, Steganalysis deals with identifying the existence of any hidden message within file.
Using steganalysis if we identify the existence of any hidden message then we can easily identify how to extract it.
![Page 26: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/26.jpg)
REFERENCES: Wikipedia
http://en.wikipedia.org/wiki/Steganography StrangeHorizons
http://strangehorizons.com/steganography.shtml TIFR
http://www.tifr.res.in/~sanyal/papers/Soumyendu_Steganography_Steganalysis_different_approaches.html
![Page 27: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/27.jpg)
![Page 28: Steganography](https://reader035.vdocuments.us/reader035/viewer/2022070318/557202fa4979599169a45fde/html5/thumbnails/28.jpg)
QUERIES